Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

White Hat Hacker Culture

Outline of lecture given for public and new college students about the computer culture milieu in which personal identification information may be stolen and those who who are involved with digital criminal forensics.

Overview of Talk: information - whose is it? who keeps it? who understands it? A.) Experiences B.) white hat hacking C.) trust enabled in social systems there electronic systems Experience: liked dismantling locks and putting them together, reading, nature bird watching, birds of prey - Latvia - learning from a hacker in exchange for English classes - bartered - Univ. Mich. - access to grad. students labs - Mosaic/Netscape/Foxfire - M.A. Philosophy "Problems of Universals Reconsidered" - Linux - download & install distributed PGP internationally in '93 - '94, Phil Zimmerman Web of trust with no centralized key holders Bruce Schneier joined CERT using NIST for time/standards - establish alkhemy.com '95; left job programming/installing/teaching pre-press software systems - beta-tested online financial transactions - http://sanskritdocuments.org/ - '96 SysAdmin, interest - coding/webtext in different text - Buddhism ? Hindu - telecommuting to AT&T developing their first website of the Mid-West Ma-BElls WHITE HACKER events - wacko in Alaska / teacher goes of meds, disapeers into deadly snowstorm with 2-3 year old daughter receive email of thanks - Estonian hacker break into internet1 in '96: lost computer priov.s after being reported, got apologies & unlimited bar priv.s - cDc (cult of the black cow) - Black Orifice - remotely control Windows OS systems - lØpht - used/tested @stake - bought by Symantec - L0phtCrack used at work for lost passowrd on Windo$se systems is a password auditing and recovery application (now called L0phtCrack 6) - '98-00 - web editor for MSU Agricultural scientific periodicals -'99 - helping linuxagogo.com - NSA virus collection website - '01 - Stockholm, SE - worked on streaming video tech. QBRICK.com - joke BING! - '02 - '09 - consultant, Grad. law (logic). MBA (business ethics), English teacher '09 - '13 Raytheon - King Abdullah Air Defense Academy "Sr. Multimedia Development Specialist" '14 - return to Latvia ~~~~~~~~~~~~~~~~~~~~~~~~~~ Definition: "In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge.[1] The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community.[2] While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks,[3] they are rarely used in mainstream context. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker,[4] not making a difference between computer criminals (black hats) and computer security experts (white hats).[5]" - Wikipedia script kiddies penetration testing of informations systems and personal/privacy DoS attacks / turning off system social engineering = tricking people/org. s to give crucial info.; dumpster diving security scanners exploits red teams/ blue teams = attackers vs. defenders Security Administrator Tool for Analyzing Networks (SATAN). Dan Armer & Wietse Venema 1995 Social systems - trusting them: @ Social networks rely on :regularity, efficiency, reliability, representativeness, fairness, accountability and benevolence. Sztompka, P. (2000). Trust: a Sociological Theory. Cambridge University Press. Cambridge, UK. @ Attitude - feeling of trust focusing on what happens into an individual's mind when he trusts someone else. @ Environment - Recent research suggests that regional and national differences in trust do exist. Social distance - in-groups @ (ir) rationality - need to trust, distrust forces to remain locked into distrust. "once distrust has set in it soon becomes impossible to know if it was ever in fact justified, for it has the capacity to be self-fulfilling, to generate a reality consistent with itself. It then becomes individually 'rational' to behave accordingly, even for those previously prepared to act on more optimistic expectations. Only accident or a third party may set up the right kind of 'experiment' to prove distrust unfounded (and even so, cognitive inertia may prevent people from changing their beliefs)." - Diego Gambetta "rational to trust trust and distrust distrust" @ short-term versus long-term interaction (David Good, Univ. of Oxford) "the greater the amount of communication there is between the players in a wide variety of games, the greater the likelihood of there being a mutually beneficial outcome." @ social capital: Putnam social capital inheres in the structure of social relations, as a potential for much social energy to be released. Social capital refer to three features of social life, namely social networks, shared norms and inter-personal trust. information flows (e.g. learning about jobs, learning about candidates running for office, exchanging ideas at college, etc.) depend on social capital; norms of reciprocity (mutual aid) are dependent on social networks: bonding networks that connect folks who are similar sustain particularized (in-group) reciprocity, bridging networks that connect individuals who are diverse sustain generalized reciprocity; collective action depends upon social networks (e.g., the role that the black church played in the civic rights movement) although collective action also can foster new networks; broader identities and solidarity are encouraged by social networks that help translate an "I" mentality into a "we" mentality. David Putnam @ Ethical hacking IT risk Critical thinking skills: logic/reason, imagination, intution, instinct "best way to have a secure home is to leave the door open that way the door is not broken down"