Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Elite US cyber team courts hackers to fight terrorists
by Staff Writers
Las Vegas (AFP) Aug 1, 2010


US hackers eye alliances with kindred spirits in China
Las Vegas, Nevada (AFP) Aug 2, 2010 - Veteran US hackers are on their way to China on a quest to foster alliances with peers and dispel notions that all of their kindred spirits there are cyber spies. The budding effort was unveiled at an infamous DefCon hacker gathering in Las Vegas known for attracting rogue software savants that have found ways to crack things ranging from smartphones and Web browsers to power plants. "We want to create understanding between the two hacker cultures," said Colin Ames, who was part of a scouting team setting out for an XCon information security conference that starts Wednesday in Beijing. "It's nonsense that all Chinese hackers are evil and hack for the government."

US hackers have long claimed to be wrongly branded cyber criminals or vandals when they are more often bright minds passionate about outwitting the way computer-run devices work. The perception has been changing, with federal agents switching from sneaking into DefCon undercover to openly attending with badges on their belts and job offers on their lips. "The fear of the unknown was replaced by the desire to get the mission done," said Matt Lewis, a longtime member of the DefCon community whose hacker name is 'Barkode. '"As soon as they stopped trying to throw us in jail we were able to become legitimate."

Lewis recalled using a fake name for his first flight to the annual DefCon event about 15 years ago, and having federal police raid his home. While police began seeing hackers more as allies in the Internet Age and less as bad guys, teenagers that lived on glory in the virtual realm were growing up and realizing they needed to earn livings in the real world, according to Lewis. "Those 15-year-olds hacking had to grow up at one point and move out of mom's basement," Lewis said. "It turns out it is a lot more profitable to work with law enforcement than to flip burgers." Members of US military, spy, and police agencies mix openly with renegade DefCon hackers. One branch of the US military recruited 62 hackers from DefCon last year, according to organizers.

An elite US cyber team that has stealthily tracked Internet villains for more than a decade pulled back its cloak of secrecy on Sunday to recruit hackers at a DefCon. Vigilant was described by its chief Chet Uber as a sort of cyber "A-Team" taking on terrorists, drug cartels, mobsters and other enemies on the Internet. "We do things the government can't," Uber said. "This was never supposed to have been a public thing." Vigilant is an alliance of slightly more than 600 volunteers and its secret ranks reportedly include chiefs of technology at top firms and former high-ranking US cyber spies.

The group scours Internet traffic for clues about online attacks, terrorists, cartels and other targets rated as priorities by members of the democratically run private organization. "There should be companies coming here to recruit people," Uber said at DefCon. "There is just the fear of people with spiked green hair." Ames has teamed with Hong Kong-based computer security researcher Anthony Lai to bring Chinese hackers and their impressive research into the DefCon fold. "China has good hackers the same as other nations," Lai said. "This is an East-meets-West, and I hope this culture can be extended to other countries."

An elite US cyber team that has stealthily tracked Internet villains for more than a decade pulled back its cloak of secrecy to recruit hackers at a DefCon gathering here Sunday.

Vigilant was described by its chief Chet Uber as a sort of cyber "A-Team" taking on terrorists, drug cartels, mobsters and other enemies on the Internet.

"We do things the government can't," Uber said. "This was never supposed to have been a public thing."

Vigilant is an alliance of slightly more than 600 volunteers and its secret ranks reportedly include chiefs of technology at top firms and former high-ranking US cyber spies.

The group scours Internet traffic for clues about online attacks, terrorists, cartels and other targets rated as priorities by members of the democratically run private organization.

Vigilant also claimed to have "collection officers" in 22 countries that gather intelligence or coordinate networks in person.

"We go into bars, look for lists of bad actors, get tips from people..." Uber said.

"But, a significant amount of our intelligence comes from our monitoring the Internet. We are looking at everything on websites, and websites are public."

He was adamant that Vigilant stays within US law while being more technologically nimble than government agencies weighed down by bureaucracy and internal rivalries.

"Intelligence is a by-product of what our research is," Uber said. "Our research is into attacks, why they happen and how we can prevent them."

Vigilant shares seemingly significant findings with US spy agencies, and is so respected by leading members of the hacker community that Uber was invited to DefCon to recruit new talent.

Uber said that Vigilant came up from underground after 14 years of operation in a drive to be at "full capacity" by adding 1,750 "vetted volunteers" by the year 2012.

"We are good people not out to hurt anybody," Uber said. "Our one oath is to defend the US Constitution against all enemies foreign and domestic."

Anything that can be looked at legally on the Internet is fair game for Vigilant, with email and encrypted transactions such as online shopping off limits.

The holy grail for Vigilant is finding out who is behind cyber attacks. Inability to figure out who launches online assaults routinely leaves companies or governments without targets to fire back at.

"This is a completely unsolved problem," Uber said. "We've probably been working on it as long as the government has."

Vigilant has developed its own "obfuscation" network to view "bad actors" on the Internet without being noticed.

He told of uncovering evidence of fraud in the latest presidential election in Iran while testing a way for people to slip information out of countries with oppressive regimes.

The information obtained was given to US officials.

"They expected fraud but they didn't expect the wholesale fraud that we passed along," Uber said.

Vigilant's network claimed a role relaying Twitter messages sent by Iranian protestors in the aftermath of the election.

The group is bent on gathering intelligence by any legal means and then putting the pieces together to see bigger pictures.

"The wholesale tapping of the Internet around the world can't be done," Uber said. "We are looking at what people write, how people attack, how attacks happen...we don't care who that person is."

Uber is working on a mathematical model to spot when terrorist organizations are recruiting teenagers online. The group has 100 projects in the works.

"Our end goal is to provide software as a service to government agencies so we can get out of the business of intelligence," Uber said.

Along with technology savants, Vigilant is recruiting sociologists, psychologists, and people with other specialties.

The wall between "feds" and hackers has been crumbling at DefCon, which has become a forum for alliances between government crime fighters and civilians considered digital-age "ninjas."

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Hacker makes mobile phone snooping affordable
Las Vegas (AFP) Aug 1, 2010
A hacker on Saturday brought mobile phone snooping to the modestly financed, showing how to build a call-catching system for about 1,500 dollars (US). Chris Paget demonstrated his creation for more than a thousand people crammed into a grand room at a DefCon gathering of hackers in Las Vegas, warning them to turn off their phones if they wanted to be spared. "I can intercept cell phone c ... read more


CYBER WARS
Neil Armstrong, first man on the moon, to turn 80

NASA's ATHLETE Warms Up For High Desert Run

Japan experts call for robot expedition to moon

GRAIL Spacecraft Takes Shape

CYBER WARS
Opportunity Back To Normal Operations

NASA And ESA's First Joint Mission To Mars Selects Instruments

Caltech And CSA Awarded NASA Project To Develop Spectrometer Headed To Mars

Spirit May Never Phone Home Again

CYBER WARS
Wyle Scientist To Study Stress In Haughton-Mars Project Spaceflight Analog

Planetary Society Urges Debate On NASA Authorization Bill

Astronomer: Manned missions less likely

Panel considers cost of space tourism

CYBER WARS
China Contributes To Space-Based Information Access A Lot

China Sends Research Satellite Into Space

China eyes Argentina for space antenna

Seven More For Shenzhou

CYBER WARS
Spacewalks Set For Friday And Monday

NASA plans two challenging spacewalks to fix ISS pump

Spacewalk Preparations Continue After Loss Of Cooling Loop

Space station drama as cooling system fails

CYBER WARS
New Rocket Launch Period In And Around Tanegashima

Kourou Spaceport Welcomes New Liquid Oxygen And Liquid Nitrogen Production Facility

Sea Launch Signs Agreement With EchoStar

Ariane 5 Is Ready For Its Payload Integration

CYBER WARS
Planets In Unusually Intimate Dance Around Dying Star

Detector Technology Could Help NASA Find Earth-Like Exoplanets

NASA Finds Super-Hot Planet With Unique Comet-Like Tail

Recipes For Renegade Planets

CYBER WARS
China Leads In Outer Space Pollution

MetOp-B Module Passes Crucial Vacuum Test

Safe And Efficient De-Orbit Of Space Junk Without Making The Problem Worse

RIM unleashes BlackBerry Torch to take on iPhone




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement