The CIA and NSA recruit and redeem Black Hat Hackers |
Black Hat hackers are the underworld’s digital
burglars, breaking into computer networks with a sinister grin. They're the
ones who unleash destructive malware, holding your computer hostage or swiping
your passwords, credit card numbers, and other personal treasures.
These cyber villains are a notorious
bunch, leaving their mark in the annals of infamy. Take Julian Assange, for
example. He's the infamous mastermind behind WikiLeaks, but long before that,
he was a teenage hacker known as 'Mendax'. He started cracking codes at 16,
diving headfirst into a life of digital crime. And why not? It’s a lucrative
gig for those without a conscience. One study shows that even your average
mid-tier hacker can rake in a cool $900,000 a year—twice what the President of
the United States makes.
A
few years back, a study revealed that over 300 Internet crimes were happening
every hour—victims getting hit every ten seconds like clockwork. We're talking
three million online crimes reported, and that's just the tip of the iceberg.
Black Hat hackers are relentless, striking every 39 seconds. The University of
Maryland crunched the numbers and found that these digital predators attack
computers 2,244 times a day, all because of weak usernames and passwords. The
FBI’s report on Internet crime complaints hit 300,000 in 2010, and the numbers
have been climbing ever since.
Even with one of their top dogs behind
bars, the hacker group known as ANONYMOUS has law enforcement on edge. They've
vowed to ramp up their hacking activities. This group is something else, and
not in a good way. They're a loose collection of hackers scattered around the
globe, waging a new kind of guerrilla warfare. They grab headlines and breach
the most secretive government operations. It's this audacity that eventually
led to many of their arrests, but they’re far from done.
Interestingly,
Hollywood has made movies surrounding the lives and actions of Black Hat
hackers like those in ANONYMOUS. Here’s 10 of the best:
- 1. The Matrix (1999)
- 2. Hackers (1995)
- 3. War Games (1983)
- 4.TRON (1982)
- 5. Sneakers (1992)
- 6. 23 (1998)
- 7. Ghost in the Shell (1995)
- 8. Mr. Robot (2015–)
- 9. Mission: Impossible — Ghost Protocol (2011)
- 10. The Net (1995)
In my spy thriller novel, "Mission
of Vengeance," there's a mole the CIA planted deep within the NSA,
codenamed 'Stacie.' She's got access to the NSA's supercomputer and uses her
Black Hat skills to target America's enemies. One of her biggest coups was
hacking into the personal computer of the American Ambassador to the Dominican
Republic. What she found was explosive—the Ambassador was compromised by a
sinister alliance of former Russian KGB agents and a ruthless Colombian drug
cartel. Stacie's discovery sent shockwaves through the intelligence community,
proving that sometimes, the most dangerous threats come from within.
Not surprising, the NSA recruits Black Hat
hackers by identifying individuals with exceptional skills in breaching
computer systems. They often find these hackers through surveillance,
cybersecurity conferences, and online forums where hackers showcase their
talents.
Once identified, the NSA approaches them
with a proposition: instead of facing legal consequences, they can use their
skills for good as White Hat hackers. The NSA offers them training, resources,
and a chance to work on high-stakes cybersecurity projects to protect national
security. This transformation from Black Hat to White Hat is incentivized by
the opportunity to work on cutting-edge technology, substantial salaries, and
the chance to contribute positively to national defense.
And the CIA does the same! Here's a scene
from one of my ‘Corey Pearson-
CIA Spymaster’ series, where the CIA finds Black Hat hackers to work
for them:
CIA spymaster Corey Pearson thought about
how they recruited Black Hat hackers like 'Stacie' and turned them into White
Hat hackers working for America. He remembered a Las Vegas hacker convention
where he approached one standout hacker after a game called 'Flag Village.'
At the convention, Corey witnessed dozens
of hackers emerging from a make-believe village to attack and defend each
other's computers by solving complex codes. Success added a flag, while failure
took one away. By the end, the hacker Corey approached had amassed a forest of
flags, while most of the others retreated back into 'Flag Village,' unwilling
to continue the fight.
What really blew Corey away was when this same hacker won a second contest by figuring out how to break into an airplane’s navigational system using its own Wi-Fi signal and entertainment system. Corey knew he had found someone with exceptional talent, perfect for turning from a Black Hat to a White Hat.
Robert Morton is a member of the Association of Former Intelligence Officers (AFIO) and authors the ‘Corey Pearson- CIA Spymaster’ series. Check out his latest spy thriller, ‘Mission of Vengeance’.
No comments:
Post a Comment