Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
The Military Security The Internet United States

Defense Expert: Hire Hackers and Wage War 157

Posted by Soulskill
from the institutionalized-anonymous dept.
Phoghat writes "A top defense and cybersecurity expert says the U.S. should stop trying to take aim at expert hackers and start doing a better job of recruiting them. 'Let's just say that in some places you find guys with body piercings and nonregulation haircuts,' says U.S. Naval Postgraduate School professor John Arquilla . 'But most of these sorts of guys can't be vetted in the traditional way. We need a new institutional culture that allows us to reach out to them.'"
This discussion has been archived. No new comments can be posted.

Defense Expert: Hire Hackers and Wage War

Comments Filter:
  • by Anonymous Coward on Sunday July 15, 2012 @07:27AM (#40654871)

    I am guessing that culture doesn't want to be vetted, by any means, traditional or non-traditional.

    • by oztiks (921504) on Sunday July 15, 2012 @08:02AM (#40655037)

      Want to reach the hacking culture? It's like hiring tribes people to help log the Amazon rainforest. Corporations should learn from the mistakes made in those senarios before even thinking of strategies such as this.

      The irony here is although the Govt started the Internet as an official project, it has always rested on the shoulders of academics and the talent of the hacking community, corporations come further down the list.

      • by AliasMarlowe (1042386) on Sunday July 15, 2012 @09:16AM (#40655463) Journal

        Want to reach the hacking culture? It's like hiring tribes people to help log the Amazon rainforest. Corporations should learn from the mistakes made in those senarios before even thinking of strategies such as this.

        What the corporate MBAs would immediately deduce is that the tribespeople had been improperly incentivized, and should have been offered different shiny stuff. Numerous case studies would then be performed to find the optimum lowest-cost shiny stuff to offer to induce tribespeople to wreck their environment. Devastation of the rainforest would not be abated, while corporate profits and MBA bonuses would increase grotesquely for a few quarters.

        Similar dysfunctional thinking would be applied to recruiting hackers.

      • by Anonymous Coward

        From what I see, if the US government has to reach to the hacking culture, they need to "atone" for Operation Sun Devil. Right now, at best, they can get contractors because of this. Unlike China where their citizens will happily go to a computer room and start doing their work.

        The pogrom against Steve Jackson Games and other sites forever made any person with non-tivial skillz not interested in any way to work for the US, just for fear that they will be labeled a "terrorist" should something happened, an

    • Indeed. Any "hacker" worth his / her salt is already being actively scouted by various interested parties offering may more money and morally-casual environments than the Defense industry.

  • by Anonymous Coward on Sunday July 15, 2012 @07:28AM (#40654873)

    Most of these hackers inherently distrust the government, that's why they are hacking them. So what is the benefit in hiring them?

    • by SuricouRaven (1897204) on Sunday July 15, 2012 @08:58AM (#40655351)
      Principles can be overridden with money. Doesn't even need much. The benefit is that some of those hackers are very highly skilled, and they are used to not playing by the rules - which is good, because the enemies of the US won't be playing by the rules either.

      That's the idea, anyway. I think in practice any good hacker (As opposed to a conventionally, formally trained engineer) is going to be driven half-crazy by the highly conformist military culture, and those that can stick with it are going to need constant micromanaging to keep them on their assigned mission ('You want me to disassemble yet another possible Chinese worm? BORING!') rather than using the available resources to do what they think is best ('Ohh, I'll write a virus that installs HTTPSeverywhere and blocks RST packets! That'll totally screw with China's filtering!').
      • by axlr8or (889713) on Sunday July 15, 2012 @10:12AM (#40655805)
        No, principles can be overridden with ego. Real hackers are about the science. Hackers that are out to damaage things are about their egos. That's actually what mades hiring them fruitless. Once they get bored with the 'I work ops for the FBI' or whatever, they'll move on to, 'I'm a double agent' so and so forth etc...That's why instead of building things they find it much easier and gets them more attention to break things. No, they aren't good bets.
      • That's the idea, anyway. I think in practice any good hacker (As opposed to a conventionally, formally trained engineer) is going to be driven half-crazy by the highly conformist military culture, and those that can stick with it are going to need constant micromanaging to keep them on their assigned mission ('You want me to disassemble yet another possible Chinese worm? BORING!') rather than using the available resources to do what they think is best ('Ohh, I'll write a virus that installs HTTPSeverywhere and blocks RST packets! That'll totally screw with China's filtering!').

        I know they, the military, didn't drive me crazy as I was already there! On the other hand, I do know I drove my command structures more than a little crazy; military behavior was the only down item on my evaluations which were characterized with 4.0's (2.0 in Military Behavior). What I did have was very, very high-level protection. That was the result of turning an (potentially multi-million dollar) IT disaster-in-the-making into a success. After that, if you needed weird, well for the time, from the s

      • by c0lo (1497653)

        Principles can be overridden with money. Doesn't even need much.

        Hmmm... are you thinking about US hiring Russian hackers?

    • This article is really bad.. The gov is not going to just come out and ask to begin with, and it is a known fact they quietly have hackers working for them, or they set something up intentionally to get hacked, of course it is a test to see how it was hacked, and what they could do going forward. Not something they do all the time, but it is done..
  • I say it's awfully childish. Do we really want the Internet to be an unstable place? Because it's going to be so easy for others to retaliate, and the losers will be those who lose their rights.

    • Isn't that what the man wants?
      • To have the Defense industry bankroll a witch-hunt to find these individuals, so they can be forced to sign up for a cyber-tour of duty and bureaucratic nonsense which burns their skins, so various corporations / interested parties can hire them away with better offers to engage in industrial espionage? In the name of patriotism and the American way, I'm sure GM / GE is willing to crack into foreign firms and lift their intellectual property.

        The bigger problem here, of course, is that these people are not g

    • by ranton (36917) on Sunday July 15, 2012 @08:14AM (#40655095)

      I say it's awfully childish. Do we really want the Internet to be an unstable place?

      It is far more childish to think that if we just play nice, everyone else will follow suit. The Internet will not be made secure by covering our eyes, crossing our fingers, and praying. It will only be more secure by making sure that those interested in its security have bigger "guns" than those interested in its instability.

      • Re: (Score:2, Insightful)

        by Anonymous Coward
        Or by actually investing in secure technologies and practices. In real life, it's better to make sure those interested in security are well-armed because there's not much that can withstand a bazooka, but, online, it's very difficult to compromise communications encrypted with 4096-bt RSA.

        tl;dr offense is easier in the real world than it is online.
      • by amiga3D (567632) on Sunday July 15, 2012 @08:28AM (#40655175)

        Internet Security is a fantasy. Allowing anyone and everyone access to the network makes it almost impossible. I can't believe that servers with secure information would ever, under any circumstances be connected to something so untamed. For starters all my secure computers would never run a disk based operating system. The entire OS would reside in ROM and when it was time for an upgrade I'd burn a new chip. Expensive? Not as expensive as having 1.5 billion dollars worth of research hacked. I don't think network security is nearly paranoid enough.

        • by TubeSteak (669689)

          The entire OS would reside in ROM and when it was time for an upgrade I'd burn a new chip. Expensive? Not as expensive as having 1.5 billion dollars worth of research hacked. I don't think network security is nearly paranoid enough.

          What makes you think you're going to write an OS without a single security flaw that could be exploited?
          Burning it to ROM is just ensuring the exploit lingers in the wild longer than it should.

          • by amiga3D (567632)

            It makes it impossible to rewrite the software. No worries that your files are infected. Flawed software can be rewritten and another ROM burned. But at least you know that any malware on the chip is your own.

            • This is why we have file permissions, read/append/no-exec only filesystems, and file integrity checking. If there is a 0day vulnerability it's as though your systems are already compromised. Also where are users going to store their documents, emails, databases? What about software that makes changes? Do you really want to rewrite a rom for each system in your enterprise and have some dude walking around swapping it out?

              • by amiga3D (567632)

                This is a system for extreme security. For average stuff I'd say no. If I have a billion dollars in research on file I can't think of any reason not to spend huge amounts of money to keep it safe. Think about it, for 100 grand the local bank is sufficient, how about 1 billion dollars? You want it there or somewhere with loads of guards and high fences.

        • I don't think writing an OS to rom has a good cost/benefit ratio when it comes to computer security, not anymore anyhow. There are 100 other things that you could be doing first that are going to go further giving you bang for your security buck. Also I want you to consider the logistics of replacing all these chips, having a tech walk around and upgrade these machines is going to expensive and time consuming. Also you're going to have to account for human error in this process unless you have each one

      • by tenco (773732) on Sunday July 15, 2012 @08:37AM (#40655243)

        If you hand out bigger "guns" and the internet becomes a warzone, everyone loses. The only way to keep it civilized is by handing out better "armor", making "guns" as ineffectual as possible. Since the military isn't interested in armor only and i don't trust them to use "guns" in a reasonable way (if there actually is one) i don't know why i should put me under their command.

      • What do you mean "We", white man?

      • by axlr8or (889713)
        I can see it now, the war finally winde up in the basement of a 'nuked' building and two groupls of stinky dirty people wark away frantically trying to hack the opponents computer connected by a single ethernet cable. They hurl insults at one another and chide and talk sepremecy of morals and ethics until all the sudden one of them trips on the cable and pulls it from the jack on the back of the computer. It's there they all freeze. Completely confused and not knowing what to do. And they stay there ina
    • An organic system is inherently unstable - this is why the global network is so resilient against targetted attacks (such as wide-scale DNS poisoning [xelerance.com], root name server outage [codeseekah.com]...). The system will route around the dark spot. Whether or not it's "what the man wants" is irrelevant. If "The Man" wants the Internet to go dark permanently, all "The Man" has to do is cause a global, total and simultaneous blackout of every node, domain and name server, webserver - anything with a CPU and internet connection.

      No big

    • by sl4shd0rk (755837) on Sunday July 15, 2012 @08:42AM (#40655271)

      Do we really want the Internet to be an unstable place?

      What makes you think it's stable now? Although I think "Cyberwarfare" is more media drama than actual warfare, networks could be doing a lot more to make them more secure. We don't becuase, users. Users don't want inconvenience. Users don't want two passwords (one email, one login). Users want their desktop on their mobile device. Users want access to confidential data on the same PC their kids play on. Don't get me wrong, without users there's no need for a network but things have gotten way out of hand with security.

      I think it's a good sign that some places in the tech industry are starting to realize they could be doing better. Maybe they will finally get around to listening to real experts instead of paid-for marketing shills.

      • Problem with backdoors is, the insecurity points both ways - you can't have it secure just for you and insecure for others. Once you put the backdoors into everything, they are there, ready to be misused against everyone, including you, whatever noble puropse you thought they were to initially serve. Thinking nobody will find out is delusional. This will not end well :(
  • by rmdingler (1955220) on Sunday July 15, 2012 @07:37AM (#40654913)
    Government sanctioned hacking will lead to enemy government retaliation, and then they'll take the internet as we know it to save us from those damn terrorists.
    • by jafiwam (310805) on Sunday July 15, 2012 @08:02AM (#40655041) Homepage Journal

      It's sorta funny to read this type of bleating in a Slashdot article that appears on the same day as one that says the Chinese government has backdoors in 80% of Telecoms to sniff information.

      Look, ya dumb sheep.

      They are already waging war against us, enemy and "friendly" states already use their government resources to steal intellectual property and wage industrial espionage against the United States. You obviously don't actually run any internet-facing services or you would see this shit in your logs.

      The fact that our government doesn't do it aggressively too is the odd part. It's time to man up and fight back or your children (assuming you manage to breed) will be speaking Chinese and working for Russian mobsters for a daily loaf of bread.

  • Easy (Score:5, Funny)

    by santax (1541065) on Sunday July 15, 2012 @07:39AM (#40654921)
    Buy Blizzard. Threaten to close WoW account of said hacker. Et voila, you've got yourself a hacker that you can count upon! (Give them a free flying mount once in a while and you keep them happy too!)
  • This is nonsense. (Score:4, Interesting)

    by Anonymous Coward on Sunday July 15, 2012 @07:43AM (#40654931)

    Some of the most talented technical people I know are also the most clean-cut and athletic. Some of the worst, show-offs who know the talk but little else, fall into your usual hacker stereotype with their appearance. I think the former is more realistic, and the latter is more romantic fantasy— brought on by people who idealize Gibson. In other words, why bother? The first group is more likely to give you a well-rounded individual who actually knows her material. The second group is a total crapshoot.

    • Re: (Score:2, Insightful)

      by Anonymous Coward

      I know a few nerds who are also fitness geeks but you're highly delusional if you think that most hackers fall into that category. Most of us are not fit, unhealthy, and are weird looking.

      • Re: (Score:1, Insightful)

        by Anonymous Coward

        The clean cut guy is clearly more of a conformist, likely less hostile towards authority, and because of that potentially less likely to be a whistleblower.

  • hackers (Score:3, Funny)

    by clarkkent09 (1104833) on Sunday July 15, 2012 @07:45AM (#40654945)

    Most of those guys are clueless about the outside world so they may be hard to motivate. Maybe sex will work. Hire some hookers.

    • by Anonymous Coward

      I am only interested in the "interview" involve in cracking an encryption while getting a blow job at the same time.

    • by amiga3D (567632)

      Offer them free Mountain Dew and Skittles.

  • by cheros (223479) on Sunday July 15, 2012 @07:49AM (#40654965)

    The problem is that vetting the ethics of a hacker needs someone who has insight in the cultural framework as much as the technical capabilities of the person under review, and that is MILES beyond your average HR setup.

    I know from my own experience that the best reviewer for tech is someone who is either a former hacker him/herself, or has a personality that borders on Aspergers. You cannot understand technical people if you do not have the required mental tools, and especially the brighter hackers do not exactly conform to the standard employee model.

    So, use one to know one, and forget about your average corporate HR droid doing anywhere near a sensible assessment. Oh, and forget about standard management techniques either - not only does it take one to know one, it certainly takes one to manage them.

    • by Anonymous Coward

      Solution: Use the usual HR droids that tech companies use, but go through the discard pile of applicants instead.

      • by cheros (223479)

        Actually, that's how I got hold of the first security admin for a company I had just helped setting up. After an internal move (prior to official launch) I inherited a desk that was obviously HR. It had a stack of CVs in, all with "no" across the top. 4 CVs in I see the perfect candidate, so I got him in. He stayed there for 3 years or so..

    • by hoggoth (414195)

      > forget about your average corporate HR droid
      So what you are saying is these aren't the droids we're looking for?

  • stereotypes (Score:3, Insightful)

    by Anonymous Coward on Sunday July 15, 2012 @07:54AM (#40654979)

    While we're at it, could we please also *not* assume that l33t hackers come only in one visual package (piercings, ink, etc.)?

  • Or, instead of spending all that money on institutional reach out plans, why not kidnap their wife/son/grandma to entice them to work for you? You can lock them overnight in a room with no contact to the outside except for a 1994 style beeper and a blunt swiss pocket knife. Oh, and some chewing gum, an out of work WWE wrestler guarding the door, and a red Ferrari parked in the back parking lot. Trust me, details matter.
  • by Anonymous Coward

    FUCK YOU

  • Lets See... (Score:4, Insightful)

    by Phrogman (80473) on Sunday July 15, 2012 @07:59AM (#40655019) Homepage

    Take highly competent tech people who are generally speaking somewhat anti-authoritarian, give them the tools to do nasty things to the nations enemies via hacking, malware programming etc, and expect them to keep their mouths shut about it.
    A lot of people don't trust the government - and often with very good reason - why would they want to hack for it?
    How long until the complete log files of everything they and everyone they associate with are sent to Wikileaks?
    Find technical people who are not anti-authoritarian and get them to do your hacking - just hire them for ability and knowledge rather than the traditional military virtues that most military organizations look for. In fact, hire them as civilian contractors and then keep them away from the rest of the military :P

    • by Deadstick (535032)

      How do these principles differ from the art of recruiting old-fashioned, y'know, spies?

    • by Inda (580031)
      I could be convinced to keep my mouth shut for large sums of cash. For an even larger amount, I'd wear pom-poms and chant the company mantra
  • The problem with the Government hiring those "shady" hacker types is they have a hard time trusting them.

    Ironically enough, hackers seem to have that exact same problem with "shady" Government types too.

    No surprise a story like this comes out this close to Black Hat/DEFCON...again, it's not a matter of finding hackers...

  • So they want to hire the people that are currently at war with them. A good idea, but not very realistic.

    Maybe they could try and pass some more laws like SOPA or dodge the democratic process with ACTA-like treaties and see if that drums up more recruits.

    The people they will get will be the "retired," mediocre to average hackers who are now married and have too much too lose and can be bought with cool toys.

  • by nimbius (983462) on Sunday July 15, 2012 @08:10AM (#40655079) Homepage

    you have to realize that many of the "cyber hackers" the government is eyeballing are the very same people that love nothing more than to leak classified data and hack into defense secrets solely because they view your establishent as the problem.

    speaking as one of the the aformentioned non-regulation pierced guy, i can say that each time i hear a blowhard suit at the anything-department wax prophetic upon anything prefixed with "cyber," i roll my eyes, turn up the hardcore techno, and go back to writing that python interface for the communications receiver I bought on craigslist a few months back.

    no one cares about the next war you're trying to sell america except the mouthbreathing walmartians in the sticks. the people youre trying to "reach out to" explicitly do not respond because they arent stupid enough to nod when told "be all you can be." as knowledge is power they understand enough about your institution to avoid it at all costs. all its done in the past 40 years is act as an engine of misery, destruction and sorrow across the globe.

    • Re: (Score:2, Insightful)

      by roman_mir (125474)

      "be all you can be" is not just a powerful message, it is a threat. Realise that what government is really saying there is that all you can really be is only achievable at this point if you are part of that government institution, and people that this message is aimed at cannot get government jobs as press secretaries, congressional staff or even regulators in an executive office. This is a threat and the reason government can issue it is because it is the very institution that creates the conditions, und

    • "be all you can be."

      knowing is half the battle

      FTFY

      What I just heard you say is that they need to stop putting out commercials and need to start producing more military-themeed cartoons with public service announcements embedded in them [youtube.com], that way they can brainwash the next generation of kids to become adults who support the military.

    • "all its done in the past 40 years is act as an engine of misery, destruction and sorrow across the globe."

      Because it is ironic? http://www.pdfernhout.net/recognizing-irony-is-a-key-to-transcending-militarism.html [pdfernhout.net]
      "Likewise, even United States three-letter agencies like the NSA and the CIA, as well as their foreign counterparts, are becoming ironic institutions in many ways. Despite probably having more computing power per square foot than any other place in the world, they seem not to have thought much abou

    • by Hentes (2461350)

      Which is why they are fighting them instead of recruiting. After they get a hacker, they give him a choice between an unrealistically long prison service and a slap on the wrist provided they join them. Most hackers have chosen the latter.

  • Because they fight against everything the government stands for = Oppression.
  • No age rules, no boot camp, no / limited medical disqualifies.

    Why should some who say may be in a wheelchair not be able to do work like just because of having to go to boot camp or the same thing about age rules so you have long time pros come in that may be to old to pass boot camp.

    Also there are smart IT people who don't have the mental mindset to handle a boot camp as well.

    • You expect inclusiveness from the US military? Up until quite recently, their policy was to kick out anyone they determined to be gay. Their policy on women is still to confine them to desk jobs, far away from combat. Perhaps it would be better to strip the DoD from all responsibility for internet security and assign such tasks exclusively to a new agency, answerable directly to congress. They'd work with the military and intelligence services, but not be part of them. No boot camp, no ranks, and a staff of
    • by Skapare (16644)

      Just don't hire them as members of the military in the usual sense.

    • by Anonymous Coward

      IT / Software folks arent that special, offensive network operations aren't magic, get over yourselves. Everyone in the military learns to function as an infantry man at least at a rudimentary level for a reason.

      • so a IT / Software person in a wheelchair can't be part of this due to them not being able to be a infantry man???

        Look at the AMERICANS WITH DISABILITIES ACT.

    • You can sign up for SPAWAR as a civilian... many SPAWAR employees end up becoming navy reserve officers and show up in uniform once a month so they can get extra money.

      They're actively recruiting hacking events.

  • by Anonymous Coward

    I'm serious, because to-date I haven't seen much recruitment effort of 'seniors', you know, like, 40+ types. But I do see a lot, and I mean a lot of things to disqualify anyone that might apply, (for all the G-Jobs I see), even though folks might apply for all the right reasons. Even people older than 40, perhaps because of their inherit threat, but what do I know? They might even be so old as to be on medical marajuana in another state, and fear drug tests and a permanent stain on their future I.T./data ce

    • older pros are needed as just having JR's is missing out on people with experience know that the book says this but in the real IT systems doing it this way works better in the good IT classes aka ones at community colleges and tech schools teach like that as well as a lot of them are IT pros and know what it is right.

    • by axlr8or (889713)
      Actually, if you understand what makes hackers, hackers... Then the threat of 'senior' staff is as follows. Most hackers, narcissist or not, put all of their effort in to one facet. They may be at the top for a few years but as soon as technology moves on so does their interest. They are stuck in the field they started in. It's that kind of commitment that drives a hacker in the first place, it's the same commitment that keeps them from moving to different fields.
  • Wait (Score:5, Funny)

    by Provocateur (133110) on Sunday July 15, 2012 @08:31AM (#40655203) Homepage

    We need a new institutional culture that allows us to reach out to them.'

    Cue MONTAGE featuring Cameron Diaz as cute "brutal" platoon sargeant yelling orders at misfis!

  • by Anonymous Coward

    I wonder if Americans realize that in most of the world, there aren't people constantly trying to find a new military technology or advantage, and the press doesn't talk about these things every day.

    • Most of the world isn't English speaking, so what do you know about it? Just because you are European or some other nationality (economics considers EU a nation) doesn't really give you the right to speak for the world. Some of which (looking at you, China) are heavily invested in stealing corporate and gov't technology.

      Defense contractors and military sources get pounded with millions of probes from other states each month. And employees are regularly spied on. A couple years ago a company had a bunch of c
  • ... when they recommend the US government move desktops off Windows.

    Until they do that, they're not taking it seriously either. It's just a boondoggle to transfer money from the taxpayer to the military-industrial complex.

    • by Anonymous Coward

      Let me guess, you want them to use Linux because it was magically written to be impervious to attack. A dollar say s I can crack your Linux box faster than you can crack win95, assuming you even have the skills to do that? Get past your bias.

  • This presupposes that the cultural clash between the military and the hackers is about their fashion choices instead of being about devoting your life to the more efficient killing of other people in the pursuit of enriching the already rich and powerful.

    He might want to think beyond allowing non-regulation haircuts and piercings.

    • by mjwalshe (1680392)
      Quiet right you can vet hackers the same way you do any one else - OK not all would be cool with the job and what is involved in being vetted for DV / TS. But any one who works in high end tech jobs is probably going to face the decision do I work on defense work. But this guy seems to have zero idea, Gary McKinnon FFS he was caught hacking into NASA looking for info on UFOs - this is a short step from the sort of people who post on Usenet claiming that the BBC is sending them secret messages via the medi
  • Last I checked I'd have a hard time considering most of the people arrested by the FBI "world class" hackers. The majority of Black Hat hackers are generally scriptkiddies. Most of the best (the ones who do it to see if they can) are either Grey or White already work for a security firm which pays FAR better then the government would. If the gov wants to hire the best hackers then they need to start offering better pay then giving the excuse âoeyou get the warm fuzzy feeling that your protecting your c

  • Did anyone see "Catch Me If You Can"? True story. The FBI hired a master conterfeiter and con-man. Trust? Both the CIA and the FBI have vetted guys and moved them to high posts while they were working for the KGB. With a hacker you know what you're getting. They have to decide whether they want to protect their country from enemies, foreign and domestic. Don't expect them to jump on board with massive personal intrusion, expect them to go after bad guys. They have to accept that they are going to watched, t

  • People in the US government have clearly failed to realise it's futile to recruit hackers to fight the enemy because THEY, the US govt., are the enemy.

  • Oh wow, really dude? They're going to do like all the dozens of movies that have portrayed this kind of stuff already? Cool dude!!! What a joke the propaganda BS media has become. Very very insulting to our intelligence indeed.
  • So it's a heinous act of war if it's done to the US (which it has been countless times already unknowingly to the public), but it's business as usual if we do it to other countries? Gotcha.
  • Like that really worked for Brittain when they failed to properly vette a generation of intelligence officers in the 1930's and 1940's. And ended up having to do it all post-haste in the 1960's and 1970's. And when the United States cheerfully trained and armed a large number of irregular soldiers in Latin America and Asia in the 1980's. And are still fighting their remnants in the Wars on Drugs and Terror.
  • If your security depends on "vetting" you've already lost.

  • What happened in the 1980s may have been a culture, but hacking is a skill, like programming, or spying, or forensics.

    You can teach it, if you find the intelligent and dedicated people.

    The problem is that government alienates such people. First, it's heavy on rules and regulations (a/k/a "conservative"); second, it's designed to reward participation instead of excellence (egalitarianism, a liberal trait).

    If you want to know why hackers, artists and philosophers end up alone in vans down by the river, it's b

  • It was far more likely to be the pocket protector MIT/Caltech brigade than the idiotic stereotypical "hacker" with his tattoos and piercings.

    The anti-government "Anonymous" type hackers are little children compared to the people the government has access to, I doub't they're looking to slum and are too worried about being unable to hire the anti-establishment set.

Mr. Cole's Axiom: The sum of the intelligence on the planet is a constant; the population is growing.

Working...