Feeds

Join the Navy, hack the world

Meet the Fed...recruiter

  • alert
  • submit to reddit

Security for virtualized datacentres

Defcon 08: by wireless

This year's 'Meet the Fed' session at Defcon in Las Vegas became something of a government recruiting opportunity as US Assistant Defence Secretary for Command, Control, Communications and Intelligence Arthur Money appealed to an audience composed largely of ubergeeks, h4x0rz and wannabes to earn proper livings, get haircuts and dress like adults whilst contributing to Uncle Sam's never-ending struggle against the digital Forces of Darkness.

"If you are extremely talented, and you are wondering what you'd like to do for the rest of your life, join us, and help us educate our people," Money suggested.

"[Hacking] might be viewed as a challenge, it might be viewed as fun....but you might be [negatively] affecting the lives of people," he said. "I would rather have my attention focused on what rogue states are doing to us than being harassed seven times a day figuring out what the hell some guy is doing to us."

US Department of Defence (DoD) networks endured over twenty thousand attacks in 1999 at an average cost of almost $1.5 million a pop, leaving the Department with a whopping $25 billion in cyber defence expenses, Money noted.

He confessed that the chief reason for this is the piss-poor job DoD has done protecting its networks, for which he blamed the difficulty in recruiting qualified staff.

"[Until] two years ago, systems administrators in the DoD were very likely to have two or three other jobs," he said. "You could have been the mess officer or the motor pool officer and only then [become] the systems administrator."

Other panellists concurred, and occasionally in somewhat more colourful language than one would tend to associate with the official voice of Washington.

"There are those things that are fine for education or curiosity, and that's good. But those of you who do things for anarchy or for destroying data....there is no glory in being an asshole," Federal Computer Incident Response Centre (CIRC) Director David Jerrold said.

Enticing qualified technical staff to work for government salaries has always been a trial for Uncle Sam, one which accounts for a good deal of DoD network security lapses. Still, there are a few intangible rewards to be gained from signing up for a tour of duty, such as the personal satisfaction which comes from public service, the possibility of being licenced to kill, and the opportunity to play with some incredibly rad gizmos.

"We have got some of the most sophisticated toys in the world," DoD Director of Infrastructure and Information Assurance Dick Schaefer said. "If you would like to get access to those toys and become a part of a very elite team, we would like to talk to you."

But hackers with a shady history had better see the light, put their wicked ways behind them, and accept Jesus Christ as their Personal Saviour before applying. Confidence will have to be earned, US Air Force Special Assistant for Law Enforcement Jim Christy observed. "In God we trust, but all others we polygraph," he quipped. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Facebook pays INFINITELY MORE UK corp tax than in 2012
Thanks for the £3k, Zuck. Doh! you're IN CREDIT. Guess not
DOUBLE BONK: Testy fanbois catch Apple Pay picking pockets
Users wail as tapcash transactions are duplicated
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
YARR! Pirates walk the plank: DMCA magnets sink in Google results
Spaffing copyrighted stuff over the web? No search ranking for you
In the next four weeks, 100 people will decide the future of the web
While America tucks into Thanksgiving turkey, the world will be taking over the net
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.