[iwar] [fc:Hackers.Being.Jobbed.Out.of.Work]

From: Fred Cohen (fc@all.net)
Date: 2002-08-30 15:57:54


Return-Path: <sentto-279987-5290-1030748229-fc=all.net@returns.groups.yahoo.com>
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Fri, 30 Aug 2002 16:00:08 -0700 (PDT)
Received: (qmail 15311 invoked by uid 510); 30 Aug 2002 22:55:15 -0000
Received: from n30.grp.scd.yahoo.com (66.218.66.87) by all.net with SMTP; 30 Aug 2002 22:55:15 -0000
X-eGroups-Return: sentto-279987-5290-1030748229-fc=all.net@returns.groups.yahoo.com
Received: from [66.218.67.192] by n30.grp.scd.yahoo.com with NNFMP; 30 Aug 2002 22:57:09 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_1_0_1); 30 Aug 2002 22:57:08 -0000
Received: (qmail 82252 invoked from network); 30 Aug 2002 22:57:08 -0000
Received: from unknown (66.218.66.216) by m10.grp.scd.yahoo.com with QMQP; 30 Aug 2002 22:57:08 -0000
Received: from unknown (HELO red.all.net) (12.232.72.152) by mta1.grp.scd.yahoo.com with SMTP; 30 Aug 2002 22:57:08 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id g7UMvtv31156 for iwar@onelist.com; Fri, 30 Aug 2002 15:57:55 -0700
Message-Id: <200208302257.g7UMvtv31156@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Fri, 30 Aug 2002 15:57:54 -0700 (PDT)
Subject: [iwar] [fc:Hackers.Being.Jobbed.Out.of.Work]
Reply-To: iwar@yahoogroups.com
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Hackers Being Jobbed Out of Work
By Noah Shachtman

2:00 a.m. Aug. 30, 2002 PDT

No too long ago, skilled hackers were rewarded with fat salaries and
fancy titles after being busted for their shenanigans. 

Now, Max Vision -- a world-famous incarcerated
hacker-turned-security-expert once making $250 an hour -- is happy to be
getting minimum wage. 

These are tough times for hackers.  Federal agencies now have broad new
powers to spy on them, thanks to provisions in the anti-terrorist USA
Patriot Act.  The House of Representatives has passed a new law that
will send convicted hackers to prison for life.  And, the information
technology job market is so soft, it's tough finding straight work. 

"We don't hire former hackers," said Jim Chapple, who leads security
teams at Computer Sciences Corporation.  "There are enough highly
skilled people out there that we don't need ones with checkered
backgrounds."

That certainly rules out Vision, aka Max Ray Butler, a 30-year-old Idaho
native.  He recently served a year in a federal prison for intruding
onto government and military computer networks in 1998. 

Life on the inside at Taft Correctional Institution, a low-security
facility in the California desert, was bearable.  The showers were
private.  His cellmate was harmless, a professor who had misspent
federal grant money. 

But events in the outside world were heartbreaking.  His wife, Kimi --
the only partner in his security consulting practice -- ran off with
someone else just two months after Butler went to prison. 

Sharing a room with five others in an Oakland halfway house, Butler's
still tortured by the loss. 

The pressure from the facility's managers hasn't made things any easier. 
The director recently threatened to send Butler back to jail if he
didn't find a job. 

But landing work has not been easy.  A recruiter for Robert Half
International -- where Butler had his first network-penetration testing
job, in 1997 -- was eager to bring him in.  But when Butler told a
supervisor about his felonious past, "his face just dropped," Butler
said.  "He ushered me out of his office, and that was it."

Many companies are reluctant to give jobs to hackers.  In a recent
survey, according to Lawrence Walsh, an editor at Information Security
magazine, only 14 percent of U.S.  companies said they'd be willing to
hire former hackers to help secure their networks. 

After months of hitting such roadblocks, Butler sent an e-mail to
security-oriented lists requesting any kind of work. 

"I have been showing up at places that farm out manual labor (at) 5:30
a.m., and still haven't found any work," Butler wrote in that message. 
"Surely there is some open position at a security company in the area --
hire me as a janitor, but give me a cubicle and I'll do vulnerability
research or help with security audits or have me sling HTML.  Who will
know?"

It's ironic that Butler -- almost universally considered one of
hacking's good guys -- would find himself in such a position. 

"He's done a lot of great things for the security community," said Eric
Smith, the former Air Force computer crimes investigator who helped bust
Butler. 

For years, Butler was an informant to the FBI, tipping agents off to
technical developments like an encrypted IRC chat program.  His website,
Whitehats.com, cataloged hacker attacks and provided ways to detect
them. 

He believed he was doing the right thing, too, when he launched an
Internet worm that fixed a critical hole in the BIND domain-name server
program, a then-ubiquitous program for matching IP addresses with
website names. 

The Air Force and the FBI didn't take such a benign view.  They raided
his home shortly thereafter.  Butler then confessed that his worm had
created a back door, allowing him access to the systems he had fixed. 

In exchange for his freedom, the FBI pressured Butler to snoop on other
hackers.  He went along, up to a point.  But he refused to wear a
wiretap to record conversations with his friend and fellow hacker
Matthew Harrigan, then the CTO of a San Francisco security firm.  Butler
was arrested shortly thereafter. 

Many in the security field said that hackers like Butler, the ones with
real talent, will always be able to find straight work, no matter what
they've done in the past. 

"Anyone who writes a good security application gets hammered with job
offers.  There are just not that many people skilled in computer
security, and the need is huge," said one hacker, "The Pull," who also
works in mainstream computer security. 

Others aren't so sure. 

"With so many corporations downsizing, there is a glut of talent
competing for a very limited number of job opportunities," said Marquis
Grove, who runs the SecurityNewsPortal.com website. 

One security professional who's been searching unsuccessfully for work
added in an e-mail, "Since the 9/11 incident, companies are looking at
any skills that a prospective employee has and thinking about what could
possibly go wrong if this employee turned rogue."

Fortunately for Butler, the response to his e-mail plea for work was
tidal.  He received several job offers right away. 

But he couldn't take the work -- the jobs were in other states, other
countries, even.  The halfway house's managers said Butler had to work
within an hour of the facility. 

Finally, a former colleague, Steve Kirschbaum, who runs a security
consultancy, Secure Information Systems, said Butler could work in his
home office in Fremont for the minimum wage.  If Butler lands any
outside clients while under Kirschbaum's roof, they would split the
profits. 

Though the halfway house takes a quarter of his meager salary, Butler
was happy to finally have a job.  But he can't start work yet.  Butler's
supervisors are currently checking with the Bureau of Prisons to see if
his job is OK.  Because, like many convicted hackers, Butler must get a
parole officer's consent before he can use the Internet. 

------------------------ Yahoo! Groups Sponsor ---------------------~-->
4 DVDs Free +s&p Join Now
http://us.click.yahoo.com/pt6YBB/NXiEAA/MVfIAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2002-10-01 06:44:32 PDT