Tag

computer security

Browsing

By James R. Lint
Faculty Member, School of Business, American Military University

It is that time of the year. Hackers, corporate computer security personnel, network penetration testers and federal government computer security professionals are going to Las Vegas for DEF CON 24, running from August 4-7.

Origins of DEF CON

DEF CON is one of the oldest and largest hacker conferences. It started out as a 1992 Las Vegas party for a friend of DEF CON’s founder, Jeff Moss. The event was so popular that people wanted to hold it again.

There are many discussions about how the name DEF CON originated. One story says that the name came from the Matthew Broderick movie “WarGames,” featuring a teen hacker. The movie used the military term “DEFCON,” meaning “Defense Condition.” The other story is that the “DEF” is from the #3 key on a phone. The “CON” came from “conventions.”

Quirks of DEF CON

DEF CON does not allow the use of credit cards to pay or pre-register. This rule is to appease the concerns of the registrants. In the beginning, there were individuals who were very talented with phones and computers, and maybe some of their skills were unlawful. One of the registrants’ worst fears was that the FBI would collect the information on their registration forms and use that information to arrest people.

But the lack of registration caused consternation for other participants. In later years, many federal employees and investigators wanted to learn about the techniques of the hacker community. The lack of a registration receipt made it difficult for them to be reimbursed for attending DEF CON.

DEF CON Appeal’s to Computer Security Experts

DEF CON is a great learning and networking place for everyone. As a retired federal employee, I look forward to DEF CON to see my federal friends.

DEF CON is a place to discover out-of-the-box thinkers who may have ideas for computer security that have not been explored. For example, NSA General Keith Alexander spoke at DEF CON in 2013. He planted the seed in the hacker community that they should explore working for the U.S. government.

Many government employees support this hiring effort. As a nation, it is critical for us to grow this type of talent in computer security. Those future employees will work with large budgets and impact international operations.

DEF CON is also a target-rich recruiting event. The FBI will have a booth at DEF CON, staffed by FBI professionals assigned to the FBI Cyber Division. They will also provide special 10-15 minute presentations on FBI cyber capabilities and recruitment efforts.

Furthermore, this conference appeals to former military servicemembers transitioning to corporate computer security. They want to learn the newest computer security defense measures and see the corporate security programs that are offered.

DEF CON Affects the Future of Computer Security

My first DEF CON was in 2005. Since then, the computer security industry has seen computer whiz kids graduate from college and create excellent computer penetration testing companies.

These network penetration testers, also known as white hat hackers, test computer systems for high pay. Many high-security companies are required to have penetration testing every six to 12 months to maintain their insurance. This is the evolution of “evil hackers” to well-paid corporate penetration testers.

DEF CON 24 is the birth of new ideas and new connections. Ideas and conversations held while participants are standing in line or in hallways will inspire new companies, new techniques, and maybe new industries.

About the Author

James R. Lint recently retired as the (GG-15) civilian director for intelligence and security, G2, U.S. Army Communications Electronics Command. He is an adjunct professor at AMU. Additionally, James started the Lint Center for National Security Studies, a nonprofit charity that recently awarded the 40th scholarship for national security students and professionals. He has 38 years of experience in military intelligence within the U.S. Marine Corps, U.S. Army, contractor and civil service.

James was also elected as the 2015 national vice president for the Military Intelligence Corps Association. He has served in the DHS Office of Intelligence and Analysis and at the Department of Energy’s S&S Security Office. James had an active military career in the Marine Corps for seven years and also served 14 years in the Army. His military assignments include South Korea, Germany and Cuba in addition to numerous CONUS locations. James has authored a book published in 2013, “Leadership and Management Lessons Learned,” and a new book “8 Eyes on Korea, A Travel Perspective of Seoul, Korea.”

In July 2015, hackers accessed account information of millions of users of the Ashley Madison, Cougar Life, and Established Men websites. These websites facilitate extramarital affairs as well as romantic and sexual encounters. While this stolen information could result in identity theft and fraud, it may have longer-lasting effects for the criminal justice community. AMU’s Dr. Chuck Russo writes about how this hack could impact current and future law enforcement professionals.