. Military Space News .




.
CYBER WARS
Children learn hacker ways at DefCon
by Staff Writers
Las Vegas, Nevada (AFP) Aug 7, 2011

Nine-year-old Anna focused intently as she screwed a circuit board into place in a first-ever "DefCon Kids village" created to tutor children in the ways of hacking.

Her 10-year-old brother, Jake, was working on a similar task and beginning to suspect that the screws he was using were refusing to cooperate.

"I'm not really a hacker, but my brother is," Anna confided as her dad stood proudly nearby in a room set aside for child-oriented sessions at the world's largest hacker gathering. "I'd like to be a hacker."

Anna and her brother were building small robots that paint on spherical objects such as ping pong balls or Easter eggs.

Jake told of being no stranger to cracking computer software.

"The secret is you don't add code," he said. "You just move the code around."

Chris Hadnagy and other DefCon Kids tutors were adamant that in a world where children are surrounded by technology it is smart to provide guidance and a place where they can safely, and legally, test hacker skills.

Hadnagy, whose book Social Engineering: The Art of Human Hacking came out this year, tailored a "Capture the Flag" game for the event.

The game included deciphering clues, picking locks, coaxing information out of people, and reading subtle facial expressions.

About ten pairs of children competed, with the average age being 9.5 years old.

The teams, shadowed by supportive parents, darted about DefCon chasing clues and getting strangers in the notoriously edgy assembly to reveal secrets or do odd things.

Each of the teams finished the contest, with one almost conning its way to first place by talking people into revealing hints instead of decoding ciphers.

"For DefCon it was a very weird experience," Hadnagy said.

"Kids were hugging their moms and hanging out with them," he continued. "I am used to people walking around with Mohawk (haircuts) and boobs hanging out...I might have to go drink something."

Top prize in the "social engineering" contest was night-vision goggles and a remote control helicopter equipped with a surveillance camera.

"Some of these kids have skills," Hadnagy said. "They are amazing."

Lock-cracker Marc Weber Tobias enthralled children with Japanese puzzle boxes as he provided a glimpse into the mind of a lock-picker.

"They loved it," Tobias said. "Their parents were amazed that the kids hunkered down for hours trying to open puzzle boxes."

DefCon Kids sessions included hacking hardware, software and websites.

"They are really in their element here," Earl Malmrose said of his children, Jake and Anna. "They really jumped in."

Malmrose, a software engineer who has a computer company, smiled as he noted how badly his two children want lock picks. He was considering the buy.

"Our second oldest, now in college, was about 10 when we lost a key to our fireproof safe," Malmrose recalled.

"He looked up how to pick a lock on his own and he opened it for us with a paperclip," he continued. "That was useful."

The 10-year-old daughter of a pair of DefCon stalwarts unveiled a new way to hack games on smartphones or tablets running on Apple or Android mobile software.

The girl, who went by the hacker name CyFi, found the vulnerability after she got tired of waiting for virtual crops to grow in farming games. She figured out a way to tamper with in-game time.

Her discovery was deemed a new class of vulnerability and shared with makers of the software.

Since DefCon debuted in 1993, many once-nefarious attendees have become computer security good guys bent on defending companies and homes against cyberattacks.

DefCon founder Jeff Moss, whose hacker handle is Dark Tangent, is on a White House homeland defense council and heads security for the agency in charge of Internet addresses.

Some have also become parents keen on sharing the hacker world with their offspring.

Government agents once flushed out in a game called "Spot the Fed" are now welcomed on panels such as "Meet the Fed," a version of which was tailored for DefCon Kids at the notorious hacker gathering that ended Sunday in Las Vegas.

The US National Security Agency, which recruits talented hackers at the event, brought a cryptography exhibit to show the children.




Related Links
Cyberwar - Internet Security News - Systems and Policy Issues

.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries




Smooth talk a slick hacker tool
Las Vegas, Nevada (AFP) Aug 7, 2011 - Hackers at DefCon have long understood that there is no patch for human stupidity.

Skills honed by software renegades at the renowned hacker gathering that ended Sunday included the art of talking workers into revealing information that can be used to crack into computer networks.

A "Schmooze Strikes Back" contest challenged hackers to test their "social engineering" skills on companies such as Apple, Oracle, Symantec, and Walmart. The contest debuted at the annual DefCon gathering in Las Vegas last year.

"The results are worse than they were last year," said Chris Hadnagy, a social engineering specialist running the contest.

"From what we found, we would own everyone on of these companies."

Hackers were able to talk workers at various companies into disclosing anything from the versions of software used in networks to who provided cafeteria food service.

Knowing specifics about software in company computers lets hackers figure out weaknesses to exploit, and sharing operational information could enable someone intent on corporate espionage to sneak into facilities.

The most effective ruses involved calling companies and posing as a potential customer out to be reassured about the safety of doing business together, according to Hadnagy.

Pretending to be calling from another department in a company, or a remote technical support team, proved to be another effective tactic for hackers.

Retail operations were consistently harder targets, possibly because they are more accustomed to interacting with customers, according to Hadnagy.

"Women seemed to be more security conscious," he said of the contest findings, which will be published in a report later this year.

"We call back and get a guy on the phone and we get everything we want," continued Hadnagy, who runs the social-engineer.org website.





. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
Raytheon Chosen by DARPA for Critical Cybersecurity Research Program on Insider Threats
Dulles, VA (SPX) Aug 08, 2011
Raytheon has been selected to support an insider threat research program led by the Defense Advanced Research Projects Agency (DARPA). The goal of the DARPA Anomaly Detection at Multiple Scales (ADAMS) program is to create, adapt and apply technology to the problem of anomaly characterization and detection in large data sets. In order to build algorithms to better detect anomalous be ... read more


CYBER WARS
Moscow warns NATO against extending missile shield

US destroys missile over Pacific in test

Israel tests advanced missile interceptor

US senators voice worry over radar deal with Turkey

CYBER WARS
Lockheed Martin JASSM Lot 8 Software Validated During Flight Test

Iran says fired missiles into Indian Ocean

Northrop Grumman-Led ICBM Prime Integration Team Participates in Test Launch of Minuteman III Missile

Taiwan testfires own sub-launched missile: report

CYBER WARS
Israel deploys drones over offshore gas fields: report

Japanese inventor develops flying sphere drone

HALE-D Demonstrated During Abbreviated Flight

Germany gets first Euro Hawk

CYBER WARS
Raytheon Develops Miniature Antenna To Extend Millimeter Wave Friendly ID Technology

China launches another experimental satellite

USAF Approves Production of NGC Deployable Digital Wireless System for Remote Warfighters

Raytheon BBN Technologies Awarded DoD Contract to Develop a Secure, Attributed Military Network System

CYBER WARS
Raytheon and Tobyhanna Army Depot Enter a Public-Private Partnership

Lockheed Martin Delivers First Advanced F-16s To Morocco

Eighth C-5B Inducted To Become Super Galaxy

Five More Boeing Super Hornets Arrive at RAAF Base Amberley

CYBER WARS
Israel 'seeks 20 more F-35 stealth jets'

Brazil's arms buying up for review again

US-Bahrain defense pact renewed

Bulgaria to sell 36% stake in defence giant Arsenal

CYBER WARS
Belarus, S. Ossetia cool on joining Russia

China attacks Japan over defence paper

Outside View: An uncommon defense, Part 3

Locke sworn in as new US ambassador to China

CYBER WARS
Boeing and BAE Systems to Develop Integrated Directed Energy Weapon for US Navy

System Integration of High Energy Laser Technology Demonstrator Completed

Raytheon Acquires Directed Energy Capabilities of Ktech Corporation


Memory Foam Mattress Review
Newsletters :: SpaceDaily Express :: SpaceWar Express :: TerraDaily Express :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News
.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement