Ethical Hackers "hax0rs" Starting an InfoSec Career.
In Times When Public Institutions, & Agencies Are Weakening the Trust of the Public
How do you protect the fact finding process?
Ethical Hackers "hax0rs" ~ hacker-speak for hackers
The thing that distinguishes hacktivism from financially motivated attackers is that they're loud and they preannounce;
Who will be the Che Guevara of the tech world? An AI names CHE with some clever acronym? “Computing with High Ethics”.
Ethical hackers can earn 16 times a software engineers' salary,
report 2018
https://www.scmagazineuk.com/ethical-hackers-can-earn-16-times-a-software-engineers-salary-report/article/737765/
A recent HackerOne survey found that some bug bounties bounty-hunters are earning more than 16 times
what they would have earned as a software engineer in their own country.
THIS IS EXACTLY WHAT IS WRONG! THIS IS BACKWARDS <ETHICAL OR NOT>
EVERYONE SHOULD Y GET PAID MORE MONEY TO CODE WITHOUT MISTAKES - - -
BETTER CODE = BETTER PAY
BUT THEY ARE BEING PAID MORE MONEY TO FIND MISTAKES INSTEAD!!!!!
June 24th 2018 Google Engineers Refused to Build Security Tool to Win Military
Contracts
https://www.bloomberg.com/news/articles/2018-06-21/google-engineers-refused-to-build-security-tool-to-win-military-contracts
How to keep your ISP's nose out of your browser history with encrypted DNS | Ars Technica
Chen Xiangmei the
"legendary steel butterfly"
Anna Chennault aka Chen Xiangmei, was a stylish fixture on Washington DC's political circuit but also an
unofficial diplomat who skilfully navigated [social engineered] the currents and eddies of 20th Century
politics may have been a figure of intrigue, but as Chen Xiangmei she was seen as someone quite different.
She
first married US Maj Gen Claire Chennault, the leader of the Flying Tigers and one of her late husband's
companies was purchased by the CIA and was reportedly used for anti-communist activities. And then there was
the infamous "Chennault affair".
In 1968, the FBI secretly recorded Mrs Chennault telling the South Vietnamese government to boycott the
Paris
peace talks. A secret liaison for Nixon, she had essentially sabotaged a peace deal in order to improve his
chances in the US presidential election. She was accused of treason by outgoing president Lyndon B Johnson.
But days later Nixon won the election, and she was never prosecuted.
China, still holds the Flying Tigers and Claire Chennault in high regard, she has primarily been seen as the
keeper of her husband's flame. In 2015, she even received a medal from Chinese President Xi Jinping.
Here's @Wired from 2006. AT&T Whistle Blower's Evidence
FORMER AT&T TECHNICIAN Mark Klein is the key witness in the Electronic Frontier Foundation's
class-action
lawsuit against the company, which alleges that AT&T illegally cooperated in an illegal National
Security
Agency domestic-surveillance program.
@EFF broke this via FOIA requests.
How Hacking got started.
The Rise of the Underground Engineer By Larry Lange Hobbit, Mudge and Yobie refer to it simply as "The Dinner.'' Mudge and six others founded the L0pht pretty much out of necessity in the early 1990s. "Everybody had apartments or rooms, but the 'significant others' were complaining that there were computers in the bathtub, software strewn all over the place and reams of computer paper all over," Mudge relates. "So we decided if we all chipped in we could afford a loft space."
FINALLY 2018 COMPUTER SCIENCE ETHICS COURCES
2018 WHITE HAT TRAINING CAMP
CERTIFICATION
How
to Take Control of Nearly Any Windows Machine by Creating a Malicious Word file. Metasploit Basics,
Part
11: Exploiting Fileformat Vulnerabilities in MS Word
Tech's ethical Dark Side Harvard, Stanford and others want to address this. They waited till 2018 ! ! !
They amount to an open challenge to a common Silicon Valley attitude that has generally dismissed ethics as a hindrance. Compared to transportation or doctors, your daily interaction with physical harm or death or pain is a lot less if you are writing software for apps. Tools (think FaceBook) could ultimately alter human society, ex: Children who use it report more depression. Fake news on Facebook, Fake Twitter Followers, build it first apologize later mindset. Consider the ramifications of innovations — like autonomous weapons or self-driving cars — before those products go on sale.
Security Education and Training
DO NOT GET STUCK IN YOUR 1 AREA OF KNOWLEDGE !
EXPLOITS ARE NOT STATIONARY
Programmers are having a huge discussion about the unethical and illegal things they've been asked to do. Software developers 'kill people' Martin argues in that talk that software developers better figure out how to self-regulate themselves and fast. He pointed out that "there are hints" that developers will increasingly face some real heat in the years to come. He cited Volkswagen America's CEO, Michael Horn, who at first blamed software engineers for the company's emissions cheating scandal during a Congressional hearing, claimed the coders had acted on their own "for whatever reason." Horn later resigned after US prosecutors accused the company of making this decision at the highest levels and then trying to cover it up. But Martin pointed out, "The weird thing is, it was software developers who wrote that code. It was us. Some programmers wrote cheating code. Do you think they knew? I think they probably knew."
"Code I'm Still Ashamed Of." written by programmer and teacher Bill Sourour and the Comments
EthicalHacker.com http://www.ethicalhacker.net/content/view/182/1/
explains that there is free downloadable software on the Net that allows malicious hackers to steal
users'
passwords. Kids are just not educated enough on good security practices, or show a lack of common sense with
this stuff. Parents, make sure your kids practice good computer security - choose hard-to-guess passwords,
don't share them with friends, change them fairly often, and choose different ones for different sites
and
services.
80% of life just comes from people showing up ~ Woody Allen
Just Show Up and learn How to Get
People to Like You
How to Sell! win friends and influence people
@deviantollam @J0hnnyXm4s joins talk the ranks of @ihackstuff @textfiles & @evanbooth a great
speaker
Attack Paths: How to Get a Job in Infosec? talk, this instructional session discusses the specifics behind
building up the soft skills necessary to effectively socialize and network with other human beings. This
seminar will go beyond the obvious ?do this; don?t do that? information and focus heavily on how, where and
what to practice in order to refine your skills. While most of the information will apply to all social
situations, this seminar will have a career focus (not just InfoSec!), helping to provide information for
not
only job interviews, but also for professional networking to get those interviews in the first place.
Guaranteed to be something in here for everyone, from the Basement Nerd to the Social Engineering Expert.
Alex Stamos the Security guy who quit on Yahoo because they choose to allowed the feds to spy on everyone's email.
[DEFCON 21] An Open Letter - The White Hat's Dilemma: Professional Ethics
FOR PROFIT CODING SCHOOLS
tech bootcamps are a freaking joke
Why Silicon Valley's leading tech firms avoid hiring
coding school graduates.
many recruiters are unwilling to hire coding school graduates due to lack of skills once they enter the
workplace. Some are questioning the value of coding schools as Silicon Valley's leading tech firms shy away
from hiring the graduates, citing subpar skills. Coding House claimed its graduates could earn an average
starting salary of $91,000, according to Bloomberg. But last month the Bureau for Private Postsecondary
Education, which regulates coding schools in California, assessed Coding House founder Nicholas James a
$50,000 fine and ordered the school to shut down due to complaints from students. Regulators also told the
school to give refunds to all students since it opened in 2014. Coding House has filed an appeal.
10/12/15 Starting
an InfoSec Career - The Megamix - Chapters 1-3
By @hacks4pancakes [Lesley Carhar, Full Spectrum Cyber-Warrior Princess]
Although I've touched on security education and training quite a bit, I'm continually asked
to provide a resource for people who are trying to transition from school or other fields into Information
Security roles. Ours is a healthy job market and we do need qualified and motivated applicants. The jobs
exist, but we repeatedly see candidates being given false advice to get them. With tremendous and very much
appreciated help from many of my colleagues and friends in the field, I have endeavored to compile a
comprehensive blog about starting an InfoSec career.
- SECURITY PEOPLE
- Certified Ethical Hackers
- 10 Most Notorious Hackers of All Time
- Emmanuel Goldstein's sensitive description of Phiber Optik's last day of freedom underscores the need to rethink contemporary prison philosophy
- Fight for your right to privacy and against Big Data
- Ethics Google Hacking
- ISA Hackers Hacking is an art not a crime
- HACKER TRADECRAFT - Media Training is an OPSEC skill
- @ETHICALHACKX PENTESTING, HACKING, CRACKING , PROGRAMING, Linux, Website Hacking
- Work for the Feds: computer network defenders (CNDs)
- Opinion: This is how hackers create maximum damage
Digital Disruption - ETHICS and Toxic Cultures
The Internet and related technologies are giving the boldest entrepreneurs among us the opportunity to
‘mess'
with very new and exciting ways of doing things. Ways that challenge, undermine, subvert, and often
completely
replace the ways things have historically been done:
NOTHING ILLEGAL HERE HOW LAWYERS LAUNDER MONEY
Blackhatonomics - Economics Of Cybercrime by James Lyne
Keren Elazar (read more below about Barnaby Jack)
A DIY Guide for those without the
patience to wait for whistleblowers
--[ 1 ]-- Introduction
"I'm not writing this to brag about what an 31337 h4x0r I am and what m4d sk1llz it took to 0wn Gamma.
I'm writing this to demystify hacking, to show how simple it is, and to hopefully inform and inspire you to
go
out and hack shit. If you have no experience with programming or hacking, some of the text below might look
like a foreign language. Check the resources section at the end to help you get started. And trust me, once
you've learned the basics you'll realize this really is easier than filing a FOIA request.
--[ 2 ]-- Staying Safe
This is illegal, so you'll need to take same basic precautions:
--[ 10 ]-- Outro You'll notice some of this sounds exactly like what Gamma is doing. Hacking is a tool. It's
not selling hacking tools that makes Gamma evil. It's who their customers are targeting and with what
purpose
that makes them evil. That's not to say that tools are inherently neutral. Hacking is an offensive tool. In
the same way that guerrilla warfare makes it harder to occupy a country, whenever it's cheaper to attack
than
to defend it's harder to maintain illegitimate authority and inequality. So I wrote this to try to make
hacking easier and more accessible. And I wanted to show that the Gamma Group hack really was nothing fancy,
just standard sqli, and that you do have the ability to go out and take similar action. Solidarity to
everyone
in Gaza, Israeli conscientious-objectors, Chelsea Manning, Jeremy Hammond, Peter Sunde, anakata, and all
other
imprisoned hackers, dissidents, and criminals!"
Definition of Script Kiddy
Definition of a "script kiddie," someone who needs the simplified and automated tools created by
others to mount attacks that he couldn't manage if left to his own devices.
Challenge
Can You, using only free tools and the resources of the Internet, successfully:
-
Find a set of passwords to crack
-
Find a password cracker Find a set of high-quality wordlists and
-
Get them all running on commodity laptop hardware in order to
-
Successfully crack at least one password
-
In less than a day of work?
1972 Steve Jobs' first business was selling “blue boxes” that allowed users
to
get free phone service illegally. These boxes were designed in 1972 by Jobs' close friend and future
co-founder of Apple, Steve Wozniak. The idea to sell them was supposedly Jobs'. The two learned about blue
boxes from famed “phreaker” (phone freak/hacker) John “Cap'n Crunch”
Draper. (This nickname was alluding to a whistle given away in the 1960s in Cap'n Crunch
cereal which produced the perfect tone, 2600 Hz, to allow a person to enter operator mode on AT&T's
phone
system. Draper later briefly worked at Apple, even while serving a five year jail sentence for his
phreaking
escapades.) Jobs and Wozniak became intrigued with the idea of trying to make one of these boxes. As Jobs
explained in a 1995 interview, "We were so fascinated by them (blue boxes) that Woz and I figured out
how
to build one. We built the best one in the world; the first digital blue box in the world. We would give
them
to our friends and use them ourselves. And you know, you rapidly run out of people you want to call. But
it
was the magic that two teenagers could build this box for $100 worth of parts and control 100′s of billions
of
dollars of infrastructure in the entire telephone network in the whole world…
Experiences like that taught us the power of ideas. The power of understanding that if you could build this
box, you could control 100's of billions of dollars around the world, that's a powerful thing. If we
wouldn't
have made blue boxes, there would have been no Apple."
2015
The Surprisingly ‘Not Sexy' Life of 24/7 White Hat Hackers
Rob Bagnall, the founder of Maverick Cyber Defense. “In the end, it's ensuring the mission. We are
sanitation
engineers more than anything else. We're taking out the trash. When we're doing it right, it's mostly not
sexy; it's like being a PI."
CyberHarassment and CyberBullies
Bully: @ShadowDXS vs. American Patriot:
Troll Redemption is possible ~ Branndon Pike aka shadowdxs
I love trolling people. The reason why is, I love to see people laugh. But I found a more effective way getting a chuckle out of people, real people. And 90% of them are not people like you. I now keep a very small social footprint that a large number of people have bitched about for the past two years. I follow around 20 or less people on the only social network that I'm addicted to by choice. It's not because I'm trying to cool or some bullshit like that. Truth is, I hate what most of you people have to say. Most of the people I used to talk to, are nothing but cancer. I chose to cut the cancer out and move on. You'd be shocked to learn that once all the voices of petty drama are gone, the world gets less noisy and more interesting. I've had time to focus my life on things that benefit me. Time to asses who my real, no-shit friends are. Time to work towards a carer that I enjoy.
2014
Spectacles of Insecurity: Top 10 Greatest White-Hat Hacks Hats off to the white hats. These hackers, who break into computer networks and digital devices to find holes before the bad guys do, have led to some of the most significant advances in securing the online world. Their findings have reshaped the way e-mail accounts, credit card numbers, and even ATMs and medical devices are protected from cyber-criminals.
RIP Barnaby Jack
"White hats" like Jack play a critical role in uncovering security flaws early so they can be fixed before real damage occurs.
His efforts pushed the manufacturers. Medtronic, one of the world's biggest medical device makers, hired security teams and coordinated with the U.S. Department of Homeland Security to implement anti-hacking changes to its insulin pumps and other products in light of research from Jack and others.
The Spotlight is a Necessary Evil:
Jack's family and longtime friends portray a much different person, one who was uncomfortable with being in
the spotlight at the annual Black Hat and DefCon conventions
Barnaby's dad, former Radio Hauraki pirate DJ Mike Jack, despaired their son would ever make anything of his life. He went on the dole and taught himself about computers from books he ordered from a fledgling Amazon. Barnaby Jack was a white-hat hacker, one of the good guys. One of the best of the good guys. He showed, with all the flair of a Vegas magician, how he could remotely hack into an ATM. Bank notes flew all over the stage, his peers cheered, and Barnes stood at the podium and nearly pissed himself laughing. Jack's hack — Jackpotting, as it became known — was featured on news channels around the world. Overnight he became hacker royalty. “I'm on the good side of the fence,” he told interviewers. “I couldn't really bring myself into a criminal life. Besides, my mum wouldn't like it if I was in jail.” When sister Amberleigh jokingly suggested he might eradicate evidence of her student loan, he reckoned it could be done — but he'd have to erase thousands of them or he'd be fingered.
ETHICS
2014 Ethical hacking organization hacked, website defaced with Edward
Snowden's passport. The EC-Council, a US professional organization that offers a respected
certification in ethical...
The EC-Council, a US professional organization that offers a respected certification in
ethical hacking, was itself hacked this weekend. Passport and photo ID details of more than 60,000 security
professionals who have obtained or applied for the EC-Council's Certified Ethical Hacker certification are
at
risk after the breach, many of whom work in sensitive political and military positions. They include members
of the US military, FBI, United Nations, and National Security Agency. Among their number is Edward Snowden,
whose passport and application email for the certification were used to deface the EC-Council's homepage,
alongside the message “Defaced again? Yep, good job reusing your passwords morons.”
Help for Hacked Sites' series includes articles and 80+ minutes of video to help you, and to help you help others.
2014 Hacker School
describes ways they inadvertently deterred or misjudged
female candidates and what they're doing to improve
Excerpts:
We no longer believe people must "love" programming to come to Hacker School.
We learned that many of our alumni nearly didn't apply because they worried they didn't really
"love" programming. Around the same time, Hacker School alumna Sunah Suh recommended the excellent
book Unlocking the Clubhouse, which presents strong evidence that this language is gendered.
We've since stopped saying that people must "love" programming (see my post about the word
"hacker").
1. We don't compare applicants to alumni who share superficial characteristics or demographics. This mistake
is a bit different from the others because it's not something we ever intentionally did. We realized about a
year ago that we frequently found ourselves saying, "applicant X reminds me a lot of Y," where X
and
Y more often than not shared the same race and gender, or other irrelevant demographics or traits. A similar
voice or speech pattern can conjure up feelings, good or bad, about someone else and lead you to wrongly
project other less superficial attributes onto that person. Given this, we now have a policy of not making
comparisons betweens people who share superficial characteristics and call each other out any time we
do.
2. We shouldn't have named our company "Hacker School." Both parts of our name
have caused us trouble: Hacker because so many people take it to mean a person who breaks into computers
rather than a clever programmer.
3.
School because it implies a rigid and traditional approach to education that we
emphatically reject. This mistake is different from the others on this list because we haven't yet corrected
it, and probably never will, given how time-consuming and costly it would be.
10/6/14 China Internet Security Conference in Beijing. A 13-year-old "internet
security
prodigy" prefers to be seen as 'an ethical hacker'. "I think those who hack all day for profit are
immoral," said Wang. "It is interesting to look for website security risks and I am overwhelmed
with
joy when I find one. But I will not use my talent for something illegal." From the mouths of babes/the
government's newest darling.
China's Youngest Hacker Speaks
2013
Ankit Fadia Revealed by Charles Assisi
Media Literacy - Check the Facts about Ankit Fadia - he is a brand out of thin air. Anyone can offer a
certificate. Insist, Exaggerate, Evade, Pursue, Empathise, Court, I'm awestruck at the genius you've
deployed in getting to where you are without being anywhere close to the real hackers I know
The FBI Needs Hackers, Not Backdoors By Matt Blaze and Susan Landau The FBI wants to massively expand the wiretap mandate beyond phone services to internet-based services. There's no need to mandate wiretap backdoors. That's because there's already an alternative in place: buggy, vulnerable software.
2012 Learn to
Hack Attack servers, crack passwords, exploit services, beat encryption - everything you
need
to protect yourself from evil. Only try this at home…
Let's be clear - breaking in to computer systems is illegal. You don't actually have to do damage or steal
any
data to get in trouble. In most countries, just trying to break in to a system is a serious offence.
Fortunately, virtualisation software allows us to test out the techniques that hackers employ using a single
computer, as the examples here show. If you have a home network, you could easily set that up in a similar
manner and try these out across multiple computers. Trying out these attacks helps you stop yourself falling
prey to them. However, if you try these techniques out against a live server then - unless you have written
permission from the owner of the machine - you will be opening yourself up to serious legal ramifications.
Just don't do it.
1/2011 In an age where the government threatens to restrict access to the Internet, people need to arm themselves with the knowledge to work around any attempts at censorship. Suggestions such as using Google Translate and viewing Web pages as emails, to more complex systems such as setting up VPNs (virtual private networks) and information about proxies.There is no point in trying to go after digital pirates. Ankit Fadia's official site got hacked by a group called Team Grey Hat. The hackers seem to have gotten access to the files on his server. A Pastebin dump has been setup that shows screenshots of the files. Since the blocks can be circumvented easily, as you show in your book, does it matter if the government tries to ban/block websites?
It matters a lot - there is always a way to work around things, and I'm going to release updated versions of this book over time as more tips surface to make it even more useful - but people shouldn't have to do all this. While some people will work around bans, the majority won't, just like in China. In order to punish a few genuine offenders, the government will negatively affect most Internet users, and that is a real problem. Educating people about technology is, of course, one way around it, but things shouldn't have to reach that stage at all.
http://www.livemint.com/2012/01/24210113/The-digital-hacktivist.html
2010
Hacking Culture - Defcon
Richard Thieme - Hacking Biohacking and the Future of Humanity
DEFCON 17: Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
1993
Date: Thu, 9 Dec 1993 10:58:52 -0800
From: fen@IMAGINE.COMEDIA.COM (Fen Labalme)
Subject: File 2--Federal Prison Regs on Computer Classes/Books
((MODERATORS' NOTE: Fen Labalme heard a rumor that "computer books" could not be sent to
federal
prisoners. So, he tracked down the information. Here's what he found)).
Well, after quite a few calls and re-directions, I finally got through to one Tom Metzker at the federal
bureau of prisons public affairs office (202/307-3198). He was quite helpful, if a little
"tentative" as we talked.
He told me of a new (June 1993) prison policy that states that "no computer training" will be done
in federal prisons. This includes (but is not limited to!) "programming techniques, computer languages,
and computer repairs". He went on to say that programming includes "macros; for example, no DBase
commands may be taught".
Tom informed me that many prisons now have computers for use by the inmates, but that "people who
exhibit
a propensity towards computers may be denied access to them".
I asked "what is the harm of learning a trade, such a C programming, that could be useful when the
prisoner leaves?" He said that the rule was worded (as, he allowed, most such rules were) in a vague
way
that ultimately left it up to the warden as to what would or would not be allowable, and that special
exceptions could be made by the warden in any case.
Anyway, this all sounds pretty unfair to me. I could understand, perhaps, if a person's crime was
committed on computers that part of the punishment may be denial of access to a computer. But my friend was
growing pot (a terrible crime -- aren't you glad that his punishment is greater, thanks to those
wonderful
mandatory minimum sentences, than if he had committed rape?) and now wants to learn about computers as a
legitimate way to make money in today's information-centric world.
I think the prison system is failing us, the American society, if we don't allow inmates to learn
valuable, socially beneficial skills while incarcerated. What can be
done?
Servers are at Risk
Servers are at risk, not because the hackers are so talented, but because the companies and governments that run them are so bad at what they do.
Firewalls
They are only as effective as the rules that govern their operation. There are many holes in firewalls which must be identified and addressed to ensure security.
IRCs
IRCs are popular hangouts were critical information is discussed in private rooms that get infiltrated by
spooks who will prove themselves by performing a series of actions to validate their credentials as a
knowledgeable and technically competent hacker. If they are able to gain the trust by demonstrating their
capabilities, they may get chosed to be the “payload master.” There is a misplaced belief that anyone in
law
enforcement will not hack into sites to prove they are ok to deal with. THIS IS NOT THE SAME THING AS
undercover drug agents and their inability to actually make deliveries as dealers to prove they are not
the police.
IF hackers actually believe that law enforcement can only monitor sites and log chat room traffic but
cannot be proactive they are making a big mistake because while that may in part be true,
private
cyber-security agents are not bound by the Constitution and often have far greater
latitude.
Metasploit Unleashed
This free information security training is brought to you in a community effort to promote
awareness
and raise funds for underprivileged children in East Africa. Through a heart-warming effort by several
security professionals, we are proud to present the most complete and in-depth open course about the
Metasploit Framework.
The "best ideas" about Piracy have nothing to do with legislation, because legislation is
tackling the wrong problem. No amount of legislation or enforcement stops piracy.
That's been shown over and over again. What does help deal with infringement is offering a better
service
that gives consumers more of what they want in a reasonable and convenient manner.
Nat Torkington's brilliant response is this old joke:
How does that apply to this situation? Same thing. The tech industry keeps sending Hollywood the tools it needs to save itself... and Hollywood keeps "waiting" for some miraculous savior, while missing all of the tools it's been offered to save itself:Heavy rains start and a neighbour pulls up in his truck. "Hey Bob, I'm leaving for high ground. Want a lift?" Bob says, "No, I'm putting my faith in God." Well, waters rise and pretty soon the bottom floor of his house is under water. Bob looks out the second story window as a boat comes by and offers him a lift. "No, I'm putting my faith in God." The rain intensifies and floodwaters rise and Bob's forced onto the roof. A helicopter comes, lowers a line, and Bob yells "No, I'm putting my faith in God."
Well, Bob drowns. He goes to Heaven and finally gets to meet God. "God, what was that about? I prayed and put my faith in you, and I drowned!"
God says, "I sent you a truck, a boat, and a helicopter! What the hell more did you want from me?"
All I can think is: we gave you the Internet. We gave you the Web. We gave you MP3 and MP4. We gave you e-commerce, micropayments, PayPal, Netflix, iTunes, Amazon, the iPad, the iPhone, the laptop, 3G, wifi--hell, you can even get online while you're on an AIRPLANE. What the hell more do you want from us?
Take the truck, the boat, the helicopter, that we've sent you. Don't wait for the time machine, because we're never going to invent something that returns you to 1965 when copying was hard and you could treat the customer's convenience with contempt.
Ethics Guidelines for Public Media Employees
On the Clock or Off: Public Service Ethics the Same in Today's Networked World. "Public Media
Ethics
Never Log Off: Guidelines for Public Media Employees in Their Off-Hours" is posted at the Public Media
Integrity Project website. pdf download here
Lawrence Lessig Lectures = Institutional Corruption - Opening Lecture
Setting the Framework for the Question of Institutional Corruption
In his inaugural lecture as director of the Edmond J. Safra Foundation Center for Ethics,
Professor
Lawrence Lessig presented both a plan of and call to action as the Center embarks on its five-year
investigation of the problem of institutional corruption.
Having introduced these ideas of an "economy of influence" and "institutional
independence," Professor Lessig went on to introduce a third key concept underlying his understanding
of
the problem of institutional corruption, that of "responsibility." Institutional corruption ought
to
be understood as activities that, despite their being in accordance with existing institutional rules,
either
result in or from some improper influence within that institution's economy of influence that brings
about
either 1) a weakening of the effectiveness of that institution, or 2) a weakening of the public's trust
of
that institution. See: The Sociology of Power
See: Character Education
2009 Teen hacking seen as casual activity
Casual hacking is as almost as established a part of teen life as downloading music to an iPod, a new survey
of
the age group has claimed. According to Panda Security, we should take seriously the statistic it gathered
from a survey of over 4,000 15 to 18 year-olds that nearly one in five of them have the knowledge to use
'advanced' Internet-distributed hacking tools. Of that group, nearly a third claimed to have used
them
on at least one occasion.Two thirds of the group said they had actually succeeded in hacking instant
messaging
or social network accounts of people known to them, with 20 percent admitting to having published
embarrassing
photographs or videos of acquaintances on the Internet. Apart from mischief-making and competition with
their
peer group, the main motivation for trying out hacking appears to be curiosity, with 86% citing that as the
point from which their involvement started. Casual hacking is as almost as established a part of teen life
as
downloading music to an iPod, a new survey of the age group has claimed.
According to Panda Security, we should take seriously the statistic it gathered from a survey of over 4,000
15
to 18 year-olds that nearly one in five of them have the knowledge to use 'advanced'
Internet-distributed hacking tools. Of that group, nearly a third claimed to have used them on at least one
occasion.Two thirds of the group said they had actually succeeded in hacking instant messaging or social
network accounts of people known to them, with 20% admitting to having published embarrassing photographs or
videos of acquaintances on the Internet. Apart from mischief-making and competition with their peer group,
the
main motivation for trying out hacking appears to be curiosity, with 86% citing that as the point from which
their involvement started.
VIRTUAL ACTIVIST TRAINING
GUIDE
NetAction's self-guided training course is a comprehensive guide to Internet outreach and advocacy.
Defcon 18 Pwned By the owner: What happens when you steal a hackers computer zoz part.
Hackers are often perceived as isolated, alienated individuals, working alone or in small groups. In reality, hackers are quite social, frequenting online forums and chat rooms to brag about their exploits, exchange tips and share knowledge. Online forums are critical to the hacking community, and are used by hackers and crackers to learn, communicate and collaborate with other like-minded individuals. The forums are generally not easily discoverable or accessible to everyone, but interested newbies will find plenty of resources and support to get started.
Stealing Sensitive Data from Thousands of Systems
Simultaneously with OpenDLP
"HACKER ETHIC" - White Hat - Grey Hat - Black Hat Hackers Curious if Unconventional Researchers
ORIGIN AND DEFINITION
The terms hack and hacker originated in the 1950s at The Model Railroad Club at the MIT.
Hackers Find Bugs
Kevin Finisterre isn't the type of person you expect to see in a nuclear power plant. With a beach
ball-sized Afro, aviator sunglasses and a self-described "swagger," he looks more like Clarence
Williams from the '70s TV show "The Mod Squad" than an electrical engineer. But people like
Finisterre, who don't fit the traditional mold of buttoned down engineer, are playing an increasingly
important role in the effort to lock down the machines that run the world's major industrial systems.
Finisterre is a white-hat hacker. He prods and probes computer systems, not to break into them, but to
uncover
important vulnerabilities. He then sells his expertise to companies that want to improve their security.
Hackers are not hireable by a national laboratory. Finisterre caught the attention of INL in 2008, when he
released attack code that exploited a bug in the CitectSCADA software used to run industrial control
environments. He'd heard about the INL program, which helps prepare vendors and plant operators for
attacks on their systems, and he thought he'd drop them a line to find out how good they really were.He
was not impressed.
[http://features.techworld.com/security/3311064/after-stuxnet-a-rush-to-find-bugs-in-industrial-systems/]
"FREE AS AIR, FREE AS WATER, FREE AS
KNOWLEDGE"
"In fall 1984, at the first Hackers' Conference, I said in one discussion
session: "On the one hand information wants to be expensive, because it's so valuable. The right
information in the right place just changes your life. On the other hand, information wants to be free,
because the cost of getting it out is getting lower and lower all the time. So you have these two fighting
against each other." That was printed in a report/transcript from the conference in the May 1985
*Whole
Earth Review*, p. 49. Note that this refers to the original use of the term
'hacker', as programmer, not as cracker.
The original meaning of the word hacker: someone who enjoys stretching the capabilities of a system and solving hard problems. http://www.catb.org/~esr/jargon/html/H/hacker.html
Eric Raymond's article about ``The Hacker Milieu as Gift Culture'' makes clear the
difference: http://www.catb.org/~esr/writings/cathedral-bazaar/homesteading/ar01s06.html
Real hackers have given us Unix and Emacs and the Macintosh and apache and BSD and Linux
and
sendmail and numerous other high quality gifts, because that's what they enjoy and that's how they
build their reputations.
How to Become a Hacker
1983 Hacker "one who gains unauthorized access to computer records" from slightly earlier tech slang
1976 Hacker " one who works like a hack at writing and experimenting with software, one who enjoys computer programming for its own sake," reputedly coined at Massachusetts Institute of Technology.
1984 Hack (v.) "illegally enter a computer system" is first recorded
Social Engineer and the The art of human hacking
Which tactic works best for a scamming social engineer? Acting like an authority figure and requiring a
victim
to answer questions and give up sensitive information? Or acting like a nice, trustworthy person who strikes
up a friendly conversation and just needs the victim to tell
them a few things to help them out?
That was the question asked by the team behind the web site social-engineer.org.
They have just released results of a several-months long poll that laid out two different scenarios of how a
social engineer might try and elicit information from a victim.
The first showed how the principle of endearment and how it may be used by a malicious social engineer. The
example given was a social engineer who attempts to get strangers to engage in very personal conversation
with
him with little effort. Dressed very casually he grabbed a prop that he felt would endear people to him, a
small sign that had a funny slogan on it. As he walked around, looking like a tourist with his prop, he was
able to engage people in conversation. "The fact is we like to deal with people who are like
us,
but even more powerfully we like to deal with those who LIKE us," said Christopher Hadnagy,
"Endearment makes a person feel liked and, in turn, like you. Endearment is used by getting on the same
plane as the target, or giving them reasons to like you." [...]
csoonline.com/article/691910/new-social-engineering-poll-reveals-which-scam-works-better
Hacktivism
Hacktivism as a praxis was born in December 1997 when Critical Art Ensemble member and software engineer Carmin Karasic was so appalled by the events of the Acteal Massacre - 45 Zapatistas were murdered at the hands of the Mexican government - that she set out to create a Web interface that would perform political protest as an aesthetic act. Three other Critical Art Ensemble members joined her in forming a new collective they named the Electronic Disturbance Theatre. (The group's name is drawn from the concept of civil disobedience first proposed by Henry David Thoreau.) Their electronic civil disobedience engine is named FloodNet; funded by RTMark and launched in September 1998, it is Karasic's brainchild in her war against injustice.
- Hacktivists - "hacktivism," hacking with an ethical or political end, they
are
not cyberterrorists
- "Crackers" the dark-side, hackers who illegally break into systems to vandalize them
- Cypherpunk - a movement devoted to using networking technology and strong encryption to grasp freedoms denied by oppressive governments.
- ANNONYMOUS / JOHN GILMORE CYPHERPUNK
Background on Assange's rage against the state & Cypherpunks - Cyberpunk - a subgenre of science fiction focussing on computer and technological
undergrounds in dystopian anarchocapitalist futures.
- Phreaks - people who hack the telephone system.
- Jargon File, a
comprehensive compendium of hacker slang illuminating many aspects of hackish
tradition, folklore, and humor.
- The annual Las Vegas hacker convention called Def Con was founded by Jeff Moss in 1993.
- IEEE Computer Society
- The Ethical
Hacker Network - Essential Wireless Hacking Tools
Anyone interested in gaining a deeper knowledge of wireless security and exploiting vulnerabilities will need a good set of base tools with which to work. Fortunately, there are an abundance of free tools available on the Internet. This list is not meant to be comprehensive in nature but rather to provide some general guidance on recommended tools to build your toolkit.
Interview with Security Expert Marcus Ranum 06/29/05 AND (listen to his speech) Marcus Ranum replies:
I'm wondering why you say 'hackers' instead of <'crackers'...> thats who is causing problems...
Crackers, hackers, as*holes, you can call 'em whatever you like. Did you understand what I was saying? Then let's not worry about whether my vocabulary is politically correct or not. (By the way the earliest references to "Computer Hackers" were in memos about MIT's timesharing system and phone system being screwed up by "so-called hackers" -- and it was definitely not a term of kindness. I see these discussions about "hacker" versus "cracker" or "technophile" or "cybercriminal" or whatever as a linguistic dodge to whitewash the unpleasant truth: there is a very large grey area between acceptable and unacceptable action and a lot of people are seeking a comfort-zone that justifies their doing things that annoy other people. No matter how you cut it, if it's damaging, annoying, or just plain rude, it's not proper behavior.) ~ mjr.
RICHARD STALLMAN FREEDOM FIRST:
Unethical Products that restrict freedom.
Richard Stallman - Happy Hacking Free software movement started in 1983 by Richard Stallman. Freedom and community are the moral goals of software freedom. He wrote version gnu 1, 2, and now 3 with the help of a contract lawyer. GNU public License protects the freedom on every user. Free computer programs - copyright vs. copyleft.
Facism:
Gov't toadies to big business Disney, Intel, Sony, Microsoft conspiracy.
HDTV plot to control technology available to the public. After 2013 Analog video outputs will be
forbidden and won't be allowed to be manufactured.
DEMOCRACY
Pirates - where true democracy was born because the crew always had a vote.
"His crew were a really rough, tough bunch - often coming from prisons and being escaped slaves.
"But Sir Henry didn't have any noticeable problems with leadership and seemed to be accepted by his
crew."
MIT OpenCourseWare: Ethics
This OpenCourseWare offering from MIT begins fittingly, with an architectural detail of Libra the Scales
from
the Autun Cathedral in France. This course was originally taught in the fall of 2009 by Professor Julia
Markovits, and the course is a seminar on "classic and contemporary work on central topics in
ethics." Some of the questions addressed by these
materials include "What makes our actions right or wrong?" and "What is virtue?"
Visitors
to the site will find the course syllabus, readings, lecture notes, and some assignments. The lecture notes
include sessions on moral explanations, moral judgments, and utilitarianism. Also, visitors can look over
the
reading lists and offer their own feedback on the course.
WHITE HAT ETHICS
Johnny Long Christian, Hacker, Author, Pirate and Ninja is the descendant of Captain Sir Henry Morgan, 7th century buccaneer "one of the most notorious and successful privateers [.from wales..] and one of the most dangerous pirates that lurked in the Spanish Main.” is the penetration tester for Computer Sciences Corporation (nyse: CSC ) security team. Long is paid to probe weak points in a company's information security. His job as a "white-hat" hacker is to think like the bad guys--the more evil genius he can summon up, the better. His job as a "white-hat" hacker is to think like the bad guys. Google Hacking Mini-Guide By Johnny Long May 7, 2004 and Article about No Tech Hacking then you should watch No Tech Hacking DefCon video about this topic. Johnny has written or contributed to several books, including Google Hacking for Penetration Testers, InfoSec Career Hacking, Aggressive Network Self-Defense, Stealing the Network: How to Own an Identity, and OS X for Hackers at Heart. Google Hacking. Hacking Hollywood Style - Is it in You?
- Stangdawg.com and his personal blog
- Hacker Public Radio
- The Revolution will be Digitized Hack TV
- Binary Revolution Forums
- Welcome to Rixstep.
Where business is the usual. Where the industry is watched because it needs watching. Where software products are watched for the same reason. Where you can actually unbelievably enough learn things. And where you'll find heaps of scrumptious software, some of it even for free. Rixstep are a constellation of programmers and support staff from Radsoft Laboratories who tired of Windows vulnerabilities, Linux driver issues, and cursing x86 hardware all day long. - Ethical Hacking and Penetration Testing - Discussion on ethical hacking and penetration testing subjects.
- Internet Security - Phrack
- Jeremiah Grossman is the founder and Chief Technology Officer of WhiteHat Security lists 5 Great Web security blogs you haven't heard of.
- Cryptogram Newsletter
- How File-Sharers Will Bypass UKs Anti-Piracy Act 2010 how file-sharers will easily avoid the measures that have been introduced by the new legislation.
NTRO's ethical hackers to conquer China
Monday, 03 October 2011The plan, sources said, is to put in place a group of hackers with special emphasis
on
countering the threats emanating from Chinese hackers. Sources also said that the Chinese hackers have the
capability to disrupt the communication links of the satellites and drain out the information from the
space-based assets. The Government swung into action following two major offensive operations from the
Chinese
hackers — Operation Shadow in the Cloud and Operation Shady RAT—that were into action for three to five
years
for theft of classified defence data before being detected by the McAfee (a cyber security company) and
Canadian researchers respectively.
The National Technical Research Organisation (NTRO), premier technical intelligence agency, has hired a team
of ethical hackers to counter the ever-increasing threat of Red Army — a state-funded
group of Chinese hackers — to sensitive Government websites, critical infrastructure and secure the
space-based assets from cyber attacks. The Red Army or the Red Team is estimated to have on board 10,000
hackers and poses threat to the entire world, a realization resulting in strengthening of the cyber warfare
capabilities by countries like the US and India.
The NTRO is a tactical intelligence gathering agency that relies on technology for collection of information
for securing the country's security interests, including threats to critical infrastructure and reports
directly to the Prime Minister's Office.The agency has appointed a Chinese language tutor to help the
hackers learn Mandarin, the language of the Chinese so that national critical infrastructure is protected
from
the offensive operations of the Red Army. Insiders said the hacking team would help the agency in tracking,
analysis, minimization of impact from cyber attacks and counter action against such offensives. This
besides,
they would also aid in launching offensive operation against an adversary.
dailypioneer.com/pioneer-news/todays-newspaper/10751-ntros-ethical-hackers-to-conquer-china.htmlb
BLACK HAT
- Full Disclosure * Privacy * Security * Surveillance * Blog Black Hat
- The User's Manifesto: in defense of hacking, modding, and jailbreaking
2015 TERRIBLE - Hacking Team assisted some of the world's most repressive
regimes
- from Bahrain to Uzbekistan, Ethiopia to Sudan - to spy on their citizens. We know from investigations by
Citizen Lab that these tools are used to target human rights activists and pro-democracy supporters at home
and abroad.
clients #Mexico #Colombia #Italy #Surveillance #policestate #NWO @citizenlab #freedomofexpression
Massive leak reveals Hacking Team explaining the evilest technology on earth. > FBI
Spent $775K on Hacking Team's Spy Tools > The data stolen from the firm contains several gigabytes
worth of exploits, malware and other very sensitive information. Among them, a new Flash
Player
zero day affecting Flash Player up to version 18.0.0.194
Since 2011 just because a country is not on the UN blacklist doesn't mean it is ethical to sell surveillance tools to them. Hacking Team employee Daniele Milan joked about gathering enough Bitcoins to pay for
the
assassination of Christopher Soghoian, the ACLU's Principal Technologist. HackingTeam had a generator that
embeds their SWF 0day
exploit into MSWord, Powerpoint and Excel for emailing. Hacking Team's competitors ARE UK-based Gamma
International or Israeli NSO Group.
Dark Cloud Hovers Over Black Hat
.
CISCO AND MICHAEL LYNN
Last week Black Hat, the Vegas security conference that was at the center of the Ciscogate controversy last
summer, was purchased by CMP Media. The sale has the internet hens clucking about whether ownership by a
larger, wealthier corporation will protect Black Hat from future legal challenges, or make it more
susceptible
to pressure from companies wanting to control vulnerability disclosures.
The more worrisome question is why Black Hat and other purveyors of security information must worry so much
about what they disclose. For better or worse, the settlement I negotiated with Cisco in its case against
researcher Michael Lynn kept some important legal issues from reaching a
courtroom, and these unsettled questions cast a long shadow over security research today.
As a brief background, Michael, my client, worked for ISS, a company that provides security products and
services. While there, Michael's job was to study Cisco products, to figure out how they worked and to
analyze them for security flaws. Cisco did not give ISS or its employees Cisco source code and ISS had no
nondisclosure agreement, or NDA, with Cisco. Michael had the typical NDA with ISS that he would not reveal
confidential information obtained during the course of his employment there.
When Michael discovered the now-famous Cisco flaw, ISS initially was pleased to have Michael tout the
success
at Black Hat. Michael's presentation demonstrated for the first time that it was possible to execute
remote code on Cisco routers, and encouraged systems administrators running vulnerable versions to upgrade
fast.
But in the weeks leading up to the conference, Cisco and ISS butted heads over what information Michael
would
reveal about the router code. The day before the conference, Cisco and ISS cut a deal and informed Black Hat
that it had to cut Michael's presentation out of the conference materials. Michael, concerned that
important information was being suppressed, gave an edited version of his talk anyway, and by that
afternoon,
Cisco and ISS had jointly filed a federal lawsuit against Michael and Black Hat.
Among other claims, the lawsuit alleged that Michael and Black Hat misappropriated trade secrets by
revealing
Cisco code in his presentation. In California, where Cisco is located and the lawsuit was filed,
misappropriation means "acquisition by improper means, or disclosure without consent by a person who
used
improper means to acquire the knowledge." Improper means "includes theft, bribery,
misrepresentation, breach or inducement of a breach of a duty to maintain secrecy, or espionage through
electronic or other means." Importantly, "Reverse engineering or independent derivation alone
shall
not be considered improper means" under the law. Michael didn't steal anything, and he never had
access to confidential Cisco source code. He took the binary distributed with every Cisco router, decompiled
it into machine code and used some pointers to the machine code to illustrate the claims made in his
presentation.
Machine code is probably copyright-protected, but copyright's fair-use
doctrine allows some copying for the purpose of critique and study.
California law makes it clear that people are allowed to study products on the market, and that a trade
secret loses its special status when a company sells it to the public. When a company
distributes confidential information to insiders, it can assure that that information remains protected by
requiring the employee or contractor to sign an NDA.
Since Michael was not under an NDA with Cisco, he and Black Hat should have been in the clear. (At some
point,
Cisco and ISS lawyers claimed that Michael's NDA with ISS prevented him from reporting information he
learned on the job about Cisco products, but arguing that Cisco flaws are ISS confidential information is a
real stretch.)
EULA
But what about the Cisco End User License Agreement that ships with the router
code? That's where things get interesting, and troubling for Black Hat's future.
Almost every piece of software today comes with a click-through EULA that purports to regulate how customers can use the product,
including a limitation on reverse engineering.
Companies have argued that the EULA has the exact same effect as an NDA - essentially letting every single customer in on a "secret" that they're legally obliged to protect.
If courts adopt this view, instead of keeping insiders loyal, trade-secret law can help companies force the public not to discuss published information. And if EULAs do confer trade-secret protection, that might mean magazines, newspapers and conferences have a duty to screen information to make sure it wasn't obtained by prohibited reverse engineering.
Be careful what you agree to when you click that EULA. Suppose I had put this into my
DUC terms of use and you'd have to have clicked OK in order to get on DUC? So that was then. How about
now? I'm feeling greedy . . . I'd like to lasso all your soul right outta the cyberspace skys . .
.
are you ready to give it up? c'mon how 'bout it??
I'm your Bareback Ridin' Bronco Bustin'CowGirrrrl -- Lassoing
java
applets right out of the Cyberrodeo of life!
Yippee kiyi, yippee-aaaa I'll be ridin' the cybertrails all day.... -- KE
In a variety of cases, courts have held that the press has a right to disseminate information of a public
concern even if it was illegally obtained.
In the Pentagon Papers case, The New York Times battled the Nixon White House over its right to
publish a secret Department of Defense report on U.S. involvement in Vietnam that had been leaked by DOD
employee Daniel Ellsberg. The Times won and the documents were published, calling the government version of
the nation's decision to go to war into question.
In Barnicki v. Vopper, the Supreme Court said that a radio station could not be sued for playing a tape of
an
illegally intercepted telephone call between two union leaders involved in a matter of public interest, even
though it knew that the person who recorded the call did so illegally, in violation of the Wiretap Act.
Those
are good decisions. But one of the only cases that addressed the issue of trade-secret publishers went the
other way.
In a lawsuit filed by the DVD Copy Control Association against a
California man who posted the DeCSS DVD-decryption code on his website, the California Supreme Court
held that the First Amendment doesn't mean courts can't stop people from publishing trade secrets
when
the publisher knows or has reason to know that the information was acquired by improper means. That case is
different from the Pentagon Papers case and Barnicki because the court found that DeCSS wasn't a matter
of
public interest. Of course, most security vulnerabilities are, especially those that affect the machines
that
form the backbone of the internet. Today, it's unclear how a court would rule in a trade-secret case
where
Cisco sued ISS for violating the prohibition against reverse engineering.
The rule should be that EULAs don't make published information secret, under any
circumstance.
The contrary would be dangerous for Black Hat, Michael, future bug finders and computer
security. And while trade-secret law can prohibit accomplices and co-conspirators from
publishing stolen data, reporters who merely know that information was improperly obtained should have a
free-speech right to publish -- especially if the information reaches a matter of public interest, like the
safety and security of the foundation of the internet.
Reporters Without Borders For educators designing lesson plans on journalism, the Reporters Without Borders site can offer insights into the lives of journalists working around the world. Readers may browse the site according to region, including information on Africa, Americas, Asia, Europe/Ex-USSR, and Middle East/North Africa. Selecting any of these tabs triggers a drop down menu of respective countries. Selecting any of the countries navigates to an archive of all the articles published about that country written in the past decade or so. Other important features of the site include a World Press Freedom Index, which evaluates each nation on a number of variables to assign them a yearly ranking. In the 2015 rankings,for instance, Finland was found to be the most powerful proponent of a free press in the world, while the United States was ranked number 49, after South Africa, Samoa, El Salvador, and many other nations.
2007 World's
Most Ethical Companies
This ranking arose from an evaluation of "more than 5,000 companies across 30 separate industries
looking
for true ethical leadership" in areas such as litigation and conflict resolution, corporate
citizenship,
pan-industry participation, and governance. Includes a description of methodology, a list of winning
companies, and brief additional material about selected winners.
Further information read about UCITA
HOW TO getsecurity WORK
How young upstarts can get their big security break in 6 steps
Here's the problem: The future of information security is in the hands of the youth. That may seem a
clichd statement; so obvious it sounds stupid. But it's a fact. Here are a few things you can do to
break
through and make it in the industry. Think of it as
suggestions for becoming a security rock star, which you almost have to be to make a difference these days.
Learn how to talk, dress, master social networking, write, work with suits AND
mohawks, and get to conferences.
facebooks reward for bug hunters January 26, 2012
http://www.businessweek.com/magazine/facebooks-reward-for-bug-hunters-01262012.html
Tal Be'ery was happy helping Facebook fight hackers for free. In 2010, when the computer security
professional
was looking into how identity thieves, spammers, and other con artists used fake Facebook profiles to mount
scams, he discovered a flaw that put new users' passwords at risk of interception.
So Be'ery did what ethical hackers are supposed to do: He ignored the payday he undoubtedly could get from
selling the information to criminals and alerted Facebook, which quickly fixed the problem. In recognition,
the world's biggest social media company added Be'ery's name to a public list of researchers who have
responsibly disclosed Facebook bugs.
At the time, that was reward enough for the Tel Aviv resident. Today the 32-year-old wishes he had something
more tangible to show for his diligence—namely one of the debit cards Facebook began handing out to bug
catchers in July. The Visa-branded (V) cards are loaded with as little as $500 or as much as $5,000—amounts
vary depending on the severity of the bug. More important, the shiny black cards are brimming with geek
cachet. There's a whiff of exclusivity about them: Think American Express's (AXP) by-invitation-only
Centurion
cards, which are also ebony. “That would be so great to get that,” says Be'ery. “To tell your grandchildren,
‘Papa was a hacker once.' Just for the symbolic value.”
The cheeky conceit behind Facebook's debit cards underlines a serious issue. Technology companies are torn
about how to engage with application developers or security researchers who spot bugs in the course of their
professional work or hobbies. Many businesses ignore unsolicited tips from so-called white-hat hackers. Some
even threaten them with legal action. Criminals, governments, and sketchy middlemen are willing to pay top
dollar for the nastiest bugs—experts say black market prices can go as high as $1 million.
[...]
Work for the FEDS
2010 DoD Requires Hacker Certification
Official government cyber defenders are now required to have the skills of a hacker according to a
mandatory certification approved this week by the Department of Defense. The DoD now requires its computer
network defenders (CNDs) pass Certified Ethical Hacker certification program from the International Council
of
E-Commerce Consultants (EC-Council) to fulfill baseline skills. The Certified Ethical
Hacker
qualification tests someone's knowledge in the mindset, tools, and techniques of a hacker. CNDs -- who
are
part of the DoD's information assurance workforce -- protect, monitor, analyze, detect, and respond to
unauthorized activity within DoD information systems and computer networks. Assistant Secretary of Defense
John Grimes officially instated the Certified Ethical Hacker requirement in late February under DoD
Directive
8570, which provides guidance for how DoD information workers
should be trained and managed. [...] DSS
You can work for Jim Christy dod cyber crime response team.
2006 Hackers can work for the Feds - NO DEGREE REQUIRED
Traditional requirements like college degrees and polygraph tests were no longer strictly required for
government employment. They also said security clearances are being approved quickly. FBI combats criminal hackers, fraud and abuse.
The government is streamlining its process of attracting hacking talent and has hired several people without
degrees. "Very gifted" have the chance of being hired even without a high-school degree. The
government is willing to accept people gaining skills away from schools.Many employees, contractors and even
people in the senior executive service do not have degrees. Becoming a contractor first is the "easiest
and quickest" way to eventually getting a government job and said 60% of his organization is composed
of
contractors. Government hiring procedures often can be "slow and antiquated" and working with
contractors sometimes is the only option to complete a critical job, It can take "two to three
years" for that position to be created. Hires can receive an interim secret clearance in about 3 to 4
weeks. According to Christy, the interim check consists of a "quick little" background inquiry and
a
check for warrants and convictions. " Strict polygraph requirement only exists at some agencies - like
the NSA. Polygraphs are usually not required for other government agencies polygraphs are not required for
most secret level jobs. Everyone doesn't have to be polygraphed. In certain programs, up to 90% are not
polygraphed. Other factors that could disqualify an applicant are financial problems and drug use. Financial
responsibility is the "number one" disqualifier, but Christy adds that drug use is also a major
disqualifier. "If you used drugs in the last year, you would probably be precluded.
Mark Loveless, a.k.a. “Simple Nomad” Hacker for 25 years, is a Senior Security Analyst at BindView Corporation. Mark works on the company's highly regarded RAZOR Research Team. He is also the founder of the Nomad Mobile Research Center, an international group of hackers that explore technologies. He has spent years developing and testing security strengths for a broad range of computer systems. He has also authored numerous papers, tools and articles, all dealing with the computer security and insecurity. Mark is a frequently sought lecturer at security conferences and industry events around the globe. He has been quoted in print, online and television media outlets regarding computer security and privacy.
Who does your OWN security company work for?It's Not You!
You pay a company to keep the bad stuff out of your machine right? BUT Do they get paid off not to?
BEFORE Mark Russinovich's expose of Sony BMG's use of stealth technology in a DRM (digital rights management) scheme, "rootkit" was a techie word. Now, the word is being used in marketing material for every anti-virus vendor, cementing Russinovich's status as a Windows internals guru with few equals.The Sony rootkit discovery highlighted the fact that anti-virus vendors were largely clueless about the threat from stealth malware and forced security vendors to build anti-rootkit scanners into existing products. Russinovich, who now works at Microsoft after Redmond acquired Sysinternals, spent most of 2006 expanding on his earlier rootkit warnings and building new malware hunting tools and utilities.
Sony Rootkit DRM
Sony Rootkit DRM apple
Sony Rootkit plagiarism
ADWARE COMPANY
QUIBBLES WITH LABEL
A company that makes and distributes adware has filed a lawsuit against a computer security company that
identifies the adware company's products as "high risk." The adware purveyor, 180solutions,
contends that Zone Labs erred in saying that some of 180solutions's applications try to monitor mouse
movements and keystrokes. Although
some of its applications employ a technology that could be used in such a manner, those applications do not
in
fact work that way, according to 180solutions. Representatives from 180solutions said they tried to explain
the situation to Zone Labs but were forced to file the lawsuit when Zone Labs refused to remove the
applications in question from its list of high-risk tools. Eric Howes, a spyware researcher at the
University
of Illinois, said that despite its protestations, 180solutions remains "a perfectly legitimate target
for
anti-spyware companies." According to Howes, security professionals continue to "find unethical
and
illegal installations of 180's software." ZDNet, 1 December 2005
HACKER ETHICS Computer Women
Hackers Who Left a Mark on 2006
These folks disclosed serious vulnerabilities in the technologies we take for granted, forced software
vendors
to react faster to flaw warnings and pushed the vulnerability research boat into new, uncharted
waters.
1) H.D. Moore has always been a household nameand a bit of a rock starin hacker circles. As
a
vulnerability researcher and exploit writer, he built the Metasploit Framework into a must-use penetration
testing tool. In 2006, Moore reloaded the open-source attack tool with new tricks to automate exploitation
through scripting, simplify the process of writing an exploit, and increase the re-use of code between
exploits. Moore's public research also included the MoBB (Month of Browser Bugs) project that exposed
security flaws in the world's most widely used Web browsers; a malware search engine that used Google
search queries to find live malware samples; the MoKB (Month of Kernel Bugs) initiative that uncovered
serious
kernel-level flaws; and the discovery of Wi-Fi driver bugs that could cause code execution attacks.
Moore's work nudged the security discussion to the mainstream media.
2) Jon "Johnny Cache" Ellch and David Maynor
At the Black Hat Briefings in Las Vegas, Jon "Johnny Cache" Ellch teamed up with former
SecureWorks
researcher David Maynor to warn of exploitable flaws in wireless device drivers. The presentation triggered
an
outburst from the Mac faithful and an ugly disclosure spat that still hasn't been fully resolved. For
Ellch and Maynor, the controversy offered a double-edged sword. In many ways, they were hung out to dry by
Apple and SecureWorks, two companies that could not manage the disclosure process in a professional manner.
In
some corners of the blogosphere, they were unfairly maligned for mentioning that the Mac was
vulnerable.However, security researchers who understood the technical natureand severity of their findings,
Ellch and Maynor were widely celebrated for their work, which was the trigger for the MoKB (Month of Kernel
Bugs) project that launched with exploits for Wi-Fi driver vulnerabilities. Since the Black Hat talk, a slew
of vendorsincluding Broadcom, D-Link, Toshiba and Applehave shipped fixes for the same class of bugs
identified by Ellch and Maynor, confirming the validity of their findings.Maynor has since moved on, leaving
SecureWorks to launch Errata Security, a product testing and security consulting startup.
Joanna Rutkowska In a standing-room-only presentation,
she dismantled the new driver-signing mechanism in Windows Vista to plant a rootkit on the operating system
and also introduced the world to "Blue Pill," a virtual machine rootkit that remains "100
percent undetectable," even on Windows Vista x64 systems.
Quotes for inspiration:
"They came for the communists, and I did not speak up because I wasn't
a
communist;
They came for the socialists, and I did not speak up because I was not a socialist;
They came for the union leaders, and I did not speak up because I wasn't a union leader;
They came for the Jews, and I didn't speak up because I wasn't a Jew.
Then they came for me, and there was no one left to speak up for me."
"Take sides. Neutrality helps the oppressor, never the victim. Silence encourages the tormentor, never the tormented. "
The only real difference between hacking and Quality Assurance is that a QA engineer generally gets compensated for finding flaws in a product before the general public (and our hacker kindred) have the opportunity to. Flaws that QA engineers work around or take for granted, when shipped to the consumer, become vulnerabilities that any halfway decent hacker can exploit.
"Never belong to any party, always oppose privileged classes and public plunderers, never lack sympathy with the poor, always remain devoted to the public welfare, never be satisfied with merely printing news, always be drastically independent, never be afraid to attack wrong, whether by predatory plutocracy or predatory poverty."
ETHICS OF OPEN GOV'T
USE LIMEHOUSE.COM
Limehouse was a central place where you could comment on individual paragraphs of the plan. Not only could you submit your comments, but you could see what others were saying. You could agree or disagree with those comments as well.
Using email to share feedback with local government only goes so far. It's a great tool for communication, but not so much for collaboration, sharing, and transparency. Avoiding email for feedback might actually help city employees do their jobs. Instead of being stuck at their desk answering emails, they can use their skills more efficiently.
Raleigh's On-Line Document Center and Interactive Portal
On this website you will be able to search, navigate and read on-line versions of important documents right in your browser. Registered users will also be able to comment on draft documents that have been posted for input, as well as participate in specific surveys.
If you have not done so, please register at the link above access all the features of this website and to receive automatic notifications when documents are posted. A guided tour showing how to use the site is available at the link to the left, and help files are available at the link on the upper right hand corner of this page.
What you can do without registering on this portal:
- Read on-line versions of documents.
What you can do when you register on this portal:
-
Comment on all or part of documents posted for public review.
-
Read other people's comments on the documents.
-
Take surveys and participate in bulletin boards.
-
Keep up with other means of participating in on-going projects, such as attending public meetings.