Basement Innovators

advertisement
INNOVATION
Basement Innovators
One man’s hacker is another man’s dream employee
By Zachary Fillingham
Illustration: Blair Kelly
Most people operate under the assumption that all hackers are possessed
– they want to crash Wall Street and bring down the government. The
truth is that most hackers, from the illegal “black hats” to the legit “white
hats,” are primarily motivated by curiosity. They want to knock down
complex security barriers just to see if it’s possible. Ironically enough,
these skills are highly valued in the workplace, and companies the world
over are on a never-ending hunt to recruit employees who are able to
pounce on problems and rip them to shreds.
Perhaps this is why so many hackers eventually trade in their black hat
for a white one. Whether it’s Kevin Mitnick or Canada’s “Mafiaboy,” there
are plenty of examples of hackers coming out of the shadows to become
highly paid Internet security consultants or even penning books about their
exploits. After all, the only difference between black and white hacking is
whether or not the hacker decides to stick it to the man after finding some
kind of vulnerability. In the end, getting paid big bucks to do what you love
sounds a lot better than going to prison for computer fraud – a rap that
would register fairly low on the intimidation scale for other prisoners.
So, here it is! How to become a white collar hacker:
Learn to program, using computer languages
(Java, Python, C, LISP, and more).
Learn to use an Open-Source Unix, the operating system
of the Internet (Linux, OpenSolaris and others).
Learn HTML, the crux of World Wide Web coding.
These are the basics, and only the basics. You can learn independently,
or you can use your educational opportunities to assist. Take computer
courses, maths and sciences in high school, and open up options in
post-secondary related to computers. Coding, programming, software
engineering – there are tons of relevant options. Hack yourself silly.
32
FUEL INC. 2010/2011
Five Black-Hat Hacker Attacks
2000 – 15-year-old Mafiaboy causes the websites for CNN, Yahoo, Amazon,
eBay and Dell to crash, costing the companies a combined $1 billion.
2003 – Networks at Lockheed Martin, Sandia National Laboratories and
NASA are compromised in a coordinated attack against American computers
codenamed Titan Rain.
2006 – Max Vision (aka Iceman) hacks into an underground marketplace for
stolen ID and credit card information. He is eventually caught and charged with
stealing two million credit cards.
2009 – The Conficker worm drives security analysts insane as it tears through
the Internet. At its peak, it infects as many as 15 million computers around the
world. The coders behind Conficker remain unknown.
2009 – A denial-of-service attack knocks out Twitter and causes Facebook to
move in slow motion, leaving people the world over unable to let their friends
know that they’re hungover or that they hate raisins.
Check it Out:
George Stromboulopoulos interviewed Michael Calce (aka Mafiaboy)
on CBC’s The Hour in October 2008. Check out the video on YouTube.
There is an annual contest called Pwn2Own in which white-hat hackers
compete to find vulnerabilities in browsers and mobile phone software.
For more details, check out the CanSecWest conference in BC.
A network support technician can make anywhere from $35-48k a year
CSIS – Canadian Security Intelligence Service is Canada’s version of the
FBI. They’re always looking for new recruits – before you even consider
applying, you have to be a Canadian citizen and meet Top Secret
security clearance requirements. Yeah, you could be the next Canadian
Bond. James Bond. www.csis.gc.ca
Download