|FROM ||From: "Inker, Evan"
|SUBJECT ||Subject: [hangout] Enlisting the Young as White-Hat Hackers
|From owner-hangout-desteny-at-mrbrklyn.com Wed Jun 4 17:51:15 2003
Received: from www2.mrbrklyn.com (localhost [127.0.0.1])
by mrbrklyn.com (8.12.3/8.11.2/SuSE Linux 8.11.1-0.5) with ESMTP id h54LpFIP011665
for ; Wed, 4 Jun 2003 17:51:15 -0400
Received: (from mdom-at-localhost)
by www2.mrbrklyn.com (8.12.3/8.12.3/Submit) id h54LpF13011664
for hangout-desteny; Wed, 4 Jun 2003 17:51:15 -0400
X-Authentication-Warning: www2.mrbrklyn.com: mdom set sender to owner-hangout-at-www2.mrbrklyn.com using -f
Received: from mail9.messagelabs.com (mail9.messagelabs.com [188.8.131.52])
by mrbrklyn.com (8.12.3/8.11.2/SuSE Linux 8.11.1-0.5) with SMTP id h54LpEIP011659
for ; Wed, 4 Jun 2003 17:51:14 -0400
Received: (qmail 26206 invoked from network); 4 Jun 2003 21:54:11 -0000
Received: from unknown (HELO w2gw-ldn02.gam.com) (184.108.40.206)
by server-28.tower-9.messagelabs.com with SMTP; 4 Jun 2003 21:54:11 -0000
Received: from ntas-ldn15.gam.com (unverified) by w2gw-ldn02.gam.com
(Content Technologies SMTPRS 4.3.1) with ESMTP id
for ; Wed,
4 Jun 2003 22:54:11 +0100
Received: by ntas-ldn15.gam.com with Internet Mail Service (5.5.2653.19) id
; Wed, 4 Jun 2003 22:54:11 +0100
From: "Inker, Evan"
Subject: [hangout] Enlisting the Young as White-Hat Hackers
Date: Wed, 4 Jun 2003 22:54:23 +0100
X-Mailer: Internet Mail Service (5.5.2653.19)
Reply-To: "Inker, Evan"
List: New Yorker GNU Linux Scene
Admin: To unsubscribe send unsubscribe name-at-domian.com in the body to hangout-request-at-www2.mrbrklyn.com
Can anyone explain in any real sense why Maine provides so well for its
Students yet in NY, you don't even have Internet Access in all schools yet
or an adequate number of PC's?
Enlisting the Young as White-Hat Hackers
By JULIE FLAHERTY
ESTBROOK, Me. -- ON a Wednesday evening, in an office suite appointed with
Pentium II's and little else, 10 teenagers were doing Andrew Robinson's
bidding. Fortified by pizza and soda, they studied a computer system's
weaknesses, looking for ways to break in and steal information. Mr. Robinson
urged them on, like a modern-day Fagin goading his band of pickpockets.
Mr. Robinson, 38, who runs a small information security company in nearby
Portland, had less-than-nefarious plans in mind, however. His free
after-school program is intended to teach teenagers the basics of ethical
hacking, or protecting a company's computer system from attack by learning
how to attack it yourself.
The program, called Tiger Team, named for the professional consultants who
analyze system security risk, teaches young hackers to use their skills for
good instead of evil. Working as two teams, the teenagers play a virtual
game of capture the flag, trying to crack the other team's network and do
damage while defending their own. An honor code keeps them from creating
mischief outside their labs.
Mr. Robinson got the idea for this "information security sandbox" three
years ago at a job fair, where he met a teenager who had been arrested for
low-level hacking. Mr. Robinson saw his setbacks as a waste, considering the
constant demand for information security professionals. So he created a
nonprofit organization, the Information Security Foundation, dedicated to
educating the public about information security. Its pilot project, Tiger
Team, began last month.
"Here's how you can do this legally, within a moral and ethical framework,
and make a good amount of money doing it," Mr. Robinson said. "It fills the
need of the companies, and more and more since 9/11, it fills the need of
the country for cybersecurity."
It could also fill a need for the state of Maine, which loses many of its
skilled young people to jobs in other states. Mr. Robinson estimated that
someone with five years of experience in information security could command
a salary of $70,000 to $90,000 here.
"That's in the top 1 percent of wage earners in the state," he said. "For at
least a few hundred kids, perhaps we can provide an alternative to leaving.
They can do this from their homes, and a lot of people do."
Finding participants was easy. About 50 teenagers from southern Maine
contacted Mr. Robinson after reading about his idea in the local newspapers.
More than a third said they had done something that could be construed as
"There were a couple who refused to answer the question about whether they
had been in trouble for it," Mr. Robinson said. "I think most of that was
He doubts he will convert anyone truly attracted to hacking's antisocial
side. "Somebody who was sort of the Elite Hackzor, or whatever you want to
call it, would probably not have applied for this program." he said. "If
they were already in the dark side, they would probably not come here."
The teenagers, boys who average about 16 years in age, do wield some power.
All were required to have experience configuring different kinds of
operating systems, including a Mac or Unix-based one, and writing computer
"They weren't script kiddies," Mr. Robinson said, referring to system
crackers who wage attacks with programs written by savvier coders, often
without understanding them. "They have all the skills that they need to
cause trouble, and some of them may have even started doing some of those
things just for fun."
The most serious breaches the applicants confessed to were outwitting a Web
site's access controls to view content that they shouldn't have. "You can
use your imagination for what that might be for, in this case, all teenage
boys," Mr. Robinson said.
In the second week of the seven-week program, the students sat patiently
through two presentations on the business side of information security, from
creating a risk assessment to securing management support. But the third
speaker had trouble getting through his talk on finding a system's
weaknesses because the students interrupted with questions.
"We put the interesting things last," said Justin Smith, 27, a Tiger Team
volunteer and a network analyst in Mr. Robinson's company, NMI InfoSecurity
Solutions. Mr. Smith said the students had performed so well that the
instructors had to accelerate the instruction.
"I kept saying that we were going to have a hard time staying ahead of these
guys," he said. (Indeed, they were bright enough to cajole Mr. Robinson into
ordering them pizza.)
Between lectures, the two teams zipped off to their separate lab rooms,
where competition was already building.
"There's been a little bit of window spying," said Tristan Fisher, 18.
Perhaps some shifty scouting technique employing Microsoft Windows?
"We're on the first floor," Mr. Fisher said, pulling aside the blinds to
reveal the parking lot. "Every now and then we'll see someone walk over to
our window and peek in."
An unclosed lab door is also fair game. Mr. Robinson, who is careful to turn
all important paperwork on his desk face down before receiving visitors,
teaches students that not all hacking is done electronically.
Scott Anderson, 18, a high school senior, is giving serious thought to going
into the information security profession. "This is probably the only link I
have to getting a job when I graduate," he said, adding that he had barely
Good grades are not a requirement for the program. Mr. Robinson, who related
that he himself had excellent standardized test scores but poor grades, said
he empathized with students who say they are bored with school. It was not
until an uncle who taught computer science at the University of Maine got
him into some college-level classes, he said, that he saw his own future
Bill Seretta thought the program was just right for his son Will, a
10th-grader with computer inclinations and "grades all over the map."
"If he didn't have to go to school he wouldn't," Mr. Seretta said. "The
structure doesn't interest him."
Although all the participants count computing as a hobby, Mr. Seretta
considers the format - hands on, fast-paced - more important than the
subject. "This is about learning and not technology," he said.
The office space, the computers and the Internet connection have all been
donated, mostly by banks and other organizations that recognize the need for
information security. But Mr. Robinson met with some initial qualms.
"Some of them grilled us pretty heavily on the concept of, 'Well, aren't you
training hackers?' " he said. "I go, yeah. I have a black belt in martial
arts. If I wanted to be a bad guy, I could go and hurt people. But I don't
do it. That's not the emphasis of the program."
The students are getting a good dose of ethics along with some sobering
words about legal repercussions. Scheduled guest speakers include a lawyer
and a police officer, and Mr. Robinson is hoping to recruit a speaker from
the Federal Bureau of Investigation.
"Yes, we are teaching them to be hackers," he said, "but wouldn't you rather
have them on your side?"
This message contains confidential information and is intended only
for the individual or entity named. If you are not the named addressee
you should not disseminate, distribute or copy this e-mail.
Please notify the sender immediately by e-mail if you have received
this e-mail by mistake and delete this e-mail from your system.
E-mail transmission cannot be guaranteed to be secure or error-free
as information could be intercepted, corrupted, lost, destroyed, arrive
late or incomplete, or contain viruses. The sender therefore does not
accept liability for any errors or omissions in the contents of this
message which arise as a result of e-mail transmission.
If verification is required please request a hard-copy version.
This message is provided for informational purposes and should not
be construed as an invitation or offer to buy or sell any securities or
related financial instruments.
GAM operates in many jurisdictions and is
regulated or licensed in those jurisdictions as required.
NYLXS: New Yorker Free Software Users Scene
Fair Use -
because it's either fair use or useless....
NYLXS is a trademark of NYLXS, Inc