March 28, 2024

Reporter’s Notebook: U.S. Agents, an Aerial Snoop and Teams of Hackers

WHY are federal agents hobnobbing with hackers?

Defcon, a convention of computer hackers here, was crawling with them on Friday. They smiled, shook hands, handed out business cards, spoke on a panel called “Meet the Federal Agent 2.0” and were really, really nice.

Naturally, federal agents have been hanging out at hacker gatherings for years to snoop. “Cloak and dagger,” as one put it.

This time they came with another purpose: to schmooze, impress and, perhaps ultimately, lure. The United States Cyber Command, the Pentagon’s Internet defense arm, “has a work force issue,” said Daron Hartvigsen, special agent with the Air Force Office of Special Investigations. “We have needs that some in this community can solve. We need folks with skills.”

Government agencies especially need computer professionals with cybersecurity skills. At Defcon, these skills were in ample supply — and they can alternately thrill and scare. There were hackers and lockpickers here, problem solvers and troublemakers. There were attendees with mohawks and blue hair, and some with blue mohawks. One wore a cape. A few wore kilts. Most, whether out of fear or conceit, insisted on using their digital names rather than their real ones: LosT, alien, Abstract.

In their midst were Internet crime investigators representing the Army, Navy, Air Force and NASA. The F.B.I. set up a recruiting table at Black Hat, a related conference of security professionals earlier in the week. A National Security Agency official was to speak to next-generation hackers at a two-day event called Defcon Kids on Saturday.

For the federal agents, it seemed less an aggressive recruiting drive than a public diplomacy mission. They took pains to describe themselves as lovable hackers under their crew cuts.

Ryan Pittman, an ex-cop who now works computer crime cases in the Army’s criminal investigations division, said the convention was an opportunity to whittle away the federal agents’ image as “jackbooted thugs.” Ahmed Saleh, a computer crime investigator with NASA, described a job that might be appealing “if you’re a geek and you want to catch the bad guys.”

There seemed to be plenty of receptive hackers. Christine Banek, 29, a software programmer with plum-colored hair, sidled up to Mr. Saleh after the panel and asked if his agency was still hiring. She said she had applied online and had not heard back. “If they were offering, I would totally take it,” she said. Later, she suggested aloud that the government legalize marijuana. Positive drug tests generally disqualify a candidate from a law enforcement position.

•

It flies. It spies. It is the color of sunshine, and it has googly eyes.

Meet WASP, the Wireless Aerial Surveillance Platform, one of the star attractions of this year’s Black Hat conference.

It’s a remote-controlled plane with a computer in its belly that can fly up to 400 feet above the ground, snoop quietly on wireless networks below and attack one if it wants to. It can also pretend to be a GSM cellphone tower, eavesdropping on calls and text messages that pass through.

The WASP was built by Richard Perkins and Mike Tassey using hobby materials, including a Styrofoam plane body, a plastic propeller and foam tires, along with circuit boards and wires. The materials are all off the shelf, costing $6,190 — a fraction of the cost of a spy plane, with cyberweapons included.

Its creators eschew the term “spy plane.” “There’s a negative connotation to a spy plane,” Mr. Tassey said. “This was done in an attempt to prove a concept.”

What concept?

“That it can be done,” he said.

His sentiment perfectly embodied the ethos of Black Hat, a spirited gathering of technologists who sometimes make scary things to show that they can be made, and at other times break things to show how badly they need to be fixed.

The bird conjured by Mr. Perkins and Mr. Tassey is barely four feet long and becomes an imperceptible, quietly humming little creature when it hovers overhead. It could be deployed over, say, an office building to sniff out information going across its wireless network. Or if the office network is well secured, the plane could follow an employee on a trip to a neighborhood Starbucks.

Article source: http://feeds.nytimes.com/click.phdo?i=0544d08b03ca8eb2da7ef17f40a8bcb7

Speak Your Mind