Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IT Technology

Want a Security Pro? Get Politically Incorrect and Learn Geek Culture 314

coondoggie writes "While complaints can be heard far and wide that it's hard to find the right IT security experts to defend the nation's cyberspace, the real problem in hiring security professionals is the roadblocks put up by lawyers and human resources personnel and a complete lack of understanding of geek culture, says security consultant Winn Schwartau. Take Janet Napolitano, U.S. secretary of the Department of Homeland Security, who has said the country can't find the right people for network defense. The real problem is a misunderstanding of computer geeks, their personalities, habits and their backgrounds, said Schwartau today during his talk at the Hacker Halted information security conference."
This discussion has been archived. No new comments can be posted.

Want a Security Pro? Get Politically Incorrect and Learn Geek Culture

Comments Filter:
  • by Anonymous Coward on Monday October 29, 2012 @05:22PM (#41811383)

    My mother's basement is well defended !!!!!!!

  • Right (Score:5, Insightful)

    by Antipater ( 2053064 ) on Monday October 29, 2012 @05:34PM (#41811491)

    And the Catholic Church could prop up its declining clergy membership by recruiting straight from the local sex offender registry.

    Seriously, what the fuck? "Legal niceties" is another term for these rules are in place because we don't want to get fucked over again by someone we trusted. They're there for a reason, and actively circumventing them to search for applicants is inviting yourself to get burned. Maybe some of them could be relaxed, sure, like the one-time drug offense bit for security clearances. But just saying "they're narrowing our pool of applicants!"...Shit, Sherlock, that's why they exist!

    • by ehiris ( 214677 )

      With a few exceptions, the reason most exist is because of a lot of greedy lawyers.

    • Re:Right (Score:5, Informative)

      by jlechem ( 613317 ) on Monday October 29, 2012 @06:53PM (#41812191) Homepage Journal
      I agree 100%, I used to work for a DoD contractor that required secret security clearance. Somehow I managed to pass but I referred several people who didn't make it past the preliminary background check. All of them were extremely competent and excellent programmers. However I found some were because of bankruptcy and others had actual criminal backgrounds. I agree loosening the rules would increase the pool of applicants but in the eyes of the US government who are you trusting with what can be very sensitive information. They only want squeaky clean individuals to keep their risk down. But then they get guys like Bradley Manning who decide to steal info pretty much from right under his bosses noses so I don't know. It's double sided but I see why they do it.
      • Re:Right (Score:5, Insightful)

        by bfandreas ( 603438 ) on Monday October 29, 2012 @07:27PM (#41812511)
        Well, they look for somebody who follows blindly and yet is bright enough to deduce things based on his own observations.

        They are forever condemned to hammer square blocks into round holes unless they find somebody who thinks the Nuremberg defense is absolutely absolving you.

        In my whole professional career(some of it actually required NATO clearance...for blueprints that propably had already been known been known to Teh Enemi for 30 years) I was more than once severely tempted to leak stuff to the national press. Never did, tho. I fully understand what thought process Manning followed when he leaked stuff. We let the fools run stuff and let them cover up their shortcomings with secrecy.
    • Re:Right (Score:4, Interesting)

      by TapeCutter ( 624760 ) on Monday October 29, 2012 @06:53PM (#41812203) Journal
      Yep, if I wanted to be a spy (or a manager) I would WANT to drink cocktails and look like James Bond, rather than smoke spliffs and look like Willy Nelson, in fact when I was a manager in the past I did at least wear the uniform, but spliffs have always been better than cocktails. I figure if people are happy to hire me at face value then it follows I am more likely to fit in and enjoy the people around me.

      I've had an unusual working life, 15yrs of blue collar, and 20+yrs of white collar, I get along with most people and can hold my own in a conversation with the janitor or the CEO, but I have no respect for superficial judgement. As soon as some cockhead like the guy in TFA tries to pigeon hole me, I will refuse to cooperate. That one rebellious trait makes me unsuitable for security work, I get that. I'm an honest, trustworthy person with a strong loyalty ethic, and with some oil to those rusty neurons could probably get past the technical interview, but I wouldn't hire me for the job so why would they?
      • I've got nil years of bue collar and 15 years of greyish-collar(I need more shirts or a more efficient laundry schedule) job experience and currently hold down an executive position in a 50 person company. And I also will call a spade a spade and not participate in bs. If somebody asked me to harden a system to absolute security, I'd remove direct access by encasing it in concrete, unplug it from the mains and nuke it from orbit. It's the only way to be sure. Not in that order.

        People forgot how to deal wi
    • Re: (Score:3, Insightful)

      by SerpentMage ( 13390 )

      The problem he is alluding to is quite interesting. We accept double agents. We accept terrorists who are "converted". We accept criminals who have "seen the light of day." But heaven forbid you smoke a doubie! No, that can't be right, that person is distrustful. WTF?

      Remember this America went to war against Iraq based on a single opinion! An opinion of an "insider". RIGHT... This is good business because the doubie smoker, well he is a real problem for society and the IT infrastructure.

    • Re: (Score:2, Informative)

      by Anonymous Coward

      Let e get this straight, you want someone who obeys the rules and is moral to fight against someone who doesn't have any rules and is immoral? That is like saying we can eliminate the threat of nebular war by disarming all of our nukes, and hope our enemies see things the same way.

      The fact is that you have little understanding of the hacker culture. They are able to do their hacking because they have experience getting around the restrictions placed there by others. This creates the mistrust and sometimes b

    • Re:Right (Score:5, Insightful)

      by firewrought ( 36952 ) on Monday October 29, 2012 @11:46PM (#41814279)

      Seriously, what the fuck? "Legal niceties" is another term for these rules are in place because we don't want to get fucked over again by someone we trusted. They're there for a reason.

      I hate this mindset. Rules are there for a reason, yes, but what is that reason? Maybe it's an ironclad principal of human nature ("people with credit problems are easily bribed"); maybe it originates from a once-applicable idea that is now obsolete ("homosexuals are easily blackmailed"); maybe it originated from prudish mindsets or political agendas that never had any validity to begin with ("marijuana smokers are less trustworthy"); maybe it was meant to appease stakeholders whose concerns or opinions no longer hold sway ("art students are more likely to be communist sympathizers"); maybe you're more desperate than before ("sh*t we need a lot of custom code... isn't there some non-critical stuff that we can let non-cleared programmers work on?").

      Rules are not so eternal as you seem to think... they are but one of many structural elements in complex human systems, and an organization that is poor at reevaluating and changing rules is doomed to ossification.

      BTW, if you RTFA, you'd see that's he's specifically talking about people with AD(H)D, autism, OCD, and perhaps soft drug use. He's also talking about redesigning clearances and pushing back on overweighted HR/legal interests, not outright circumvention of existing rules. (And if he's seen the HR departments that I've seen, he knows they frequently block any meaningful evaluation of a candidate's technical proficiencies and prefer to judge people on their ability to smile, deliver a firm handshake, and make smalltalk with a stranger. Part of it is legal... can't ask that candidate to write a SQL statement like he or she will have to do every damn day on the job because we don't know for sure that it isn't some subtle proxy test to discriminate on race.)

  • I'm sure geeks (Score:4, Insightful)

    by obarthelemy ( 160321 ) on Monday October 29, 2012 @05:38PM (#41811533)

    think they deserve special treatment and don't have to be clean, social, pleasant, accountable workers.

    newsflash: they do.

    Corps and Gov are right to want to make more geeks, so they don't have to make do with the half-defective ones.

    • "newsflash: they do."

      newsflash to your newsflash: then you won't get the best of the pool.

      If that's good enough for you, it's good enough for me: I'm not even American, so it's better than enough for me that you don't get the best of the pool.

      • "newsflash: they do."

        newsflash to your newsflash: then you won't get the best of the pool.

        Gee... Having been part of the pool... I'm offended, either by the implication that I lack even the basic social graces, or by the implication that I'm not the best at what I did....

        Congrats, you offended a lot of folks in one post.

    • Re:I'm sure geeks (Score:4, Insightful)

      by citizenr ( 871508 ) on Monday October 29, 2012 @06:03PM (#41811749) Homepage

      think they deserve special treatment and don't have to be clean, social, pleasant, accountable workers.

      newsflash: they do.

      And this is why you get clueless people. Because you hire based on personality and clothes.

      • think they deserve special treatment and don't have to be clean, social, pleasant, accountable workers.

        newsflash: they do.

        And this is why you get clueless people. Because you hire based on personality and clothes.

        So show up with your knowledge, reasonably dressed and be pleasant with the people interviewing you and I'll bet they will jump at the chance to hire you. Be a team player, willing to work and eager to help them with their problems and they will be more than willing to keep paying you.

        • by Exitar ( 809068 )

          Isn't the article exactly about how the US government doesn't find competent IT personnel because they think mostly like you?

    • newsflash: Good people get away with it not because they think they can but because they're good people.

      Half of my department has social skills that make Al Gore look charismatic in comparison, but they deal with computers and not humans so it is not a qualification requirement and I don't give a shit about it either. There's that one guy that looks anywhere but you when he's talking to you, to the point of making you think he's deliberately ignoring you because he keeps working while discussing things with

      • There's that one guy that looks anywhere but you when he's talking to you, to the point of making you think he's deliberately ignoring you because he keeps working while discussing things with you. And when mentioned he will simply and bluntly inform you that "merely" telling you something bores him to death, so he has to keep busy with something meaningful while doing it. And behold, he's actually honest, he IS that good that he can flawlessly continue to do whatever task he has at hand while explaining something completely unrelated to you, and that's what I care about

        You know, just to put this out there, your coworker may have Asperger Syndrome. http://en.wikipedia.org/wiki/Aspergers [wikipedia.org]

        • Possible, likely actually, but for all I care he could have Tourette's, it's none of my business. He doesn't have to interface with a lot of people (and he's actually very, very happy about it) and he's great at his job, so why should I complain?

    • Are we talking about the same corps and government that are typically bent on screwing over as many people as possible in order to make a buck? Geeks are the only sane ones.

  • by Seeteufel ( 1736784 ) on Monday October 29, 2012 @05:42PM (#41811551) Homepage
    Your assumption is that the government hires people capable to actually solve the problem. It does, but only in war times. In war times you lose ground when you follow the wrong path. When yo sent the horses against the machine guns. Governments are not interested to actually solve the problem but rather to be in charge of the problem. We know that many security issues could be solved. Simply spent a few millions on security reviews of commonly executed code. and order the companies to provide bug fixes or apply punitive damages, make them partly liable for not fixing security issues.
    • by danlip ( 737336 )

      The US has been at war for the last 10 years.

      • Yeah, but in a war they can't lose. That's like calling a boxing match between the heavyweight champion and a 3 year old a fight. You needn't give up control because there's simply nothing at stake.

        WW2 was, as far as I'm concerned, the last time where the US actually could get into some serious trouble if they didn't muster any and all effort to fight, and where winning was neither certain nor meaningless.

        • The cold war was a very very serious affair. The US military combined with all the armies of Western Europe would not have beat the Soviet forces in a conventional fight.

          The entire NATO battle plan for defending western Europe basically involved the plan to nuke the soviet front-line while it was still in eastern Europe before it could move into the allied western countries. Because the US KNEW it couldn't win in a conventional fight it basically made it well known that were the Soviets to move to invade We

      • by Cwix ( 1671282 )

        Wars involve sacrifice, from both military and citizens. The citizens didn't even notice there was a war. American Idol and Survivor distracted them successfully. Ohh a squirrel.....

      • We haven't declared war in a long time. Sure been a lot of illegal military actions since then though.

  • by M. Baranczak ( 726671 ) on Monday October 29, 2012 @05:42PM (#41811555)

    This isn't even specific to the IT field. This is a problem with every organization that hires people. Unless the organization is too small to have lawyers or human resources.

    • Unless the organization is too small to have lawyers or human resources.

      And this is why I gave up working for big organisations - I want to spend my time doing a useful job rather than constantly battling against other departments (such as HR) who seem intent on making sure there's as little productivity as possible.

  • Marijuana/Drug Laws (Score:5, Informative)

    by Midnight_Falcon ( 2432802 ) on Monday October 29, 2012 @05:49PM (#41811611)

    I haven't met a too many good hackers who haven't, at least at one time, engaged in some drug use -- whether it be smoking weed (usually), tripping on mushrooms/acid, or cocaine etc..it seems to permeate the culture quite a bit.

    A couple three-letter agencies once tried to recruit me, but I didn't want to stop going to festivals/parties, smoking pot, etc. It felt like I would have to become a square and this job would be my life, and I'd have to disown much of the culture I was associated with previously. Plus, I thought if I went forward, I'd never get past the polygraph where they ask you tons of questions about drug use, and it would just be a waste of time.

    For context, I am an IT professional with a specialization in security and about 20-40% of my workload is security related.

    Maybe if drug testing wasn't required, these agencies would get more applicants. But no one wants to piss in a cup on a monthly basis to work at a rate of pay less than they could get at companies that don't drug test.

    • by Chris Mattern ( 191822 ) on Monday October 29, 2012 @05:55PM (#41811671)

      I haven't met a too many good hackers who haven't, at least at one time, engaged in some drug use -- whether it be smoking weed (usually), tripping on mushrooms/acid, or cocaine etc..it seems to permeate the culture quite a bit.

      Now, is that because good hackers tend to be drug users--or is it because *you* are a drug user and thus a larger percentage of the people you meet are drug users?

      • I'm a pot smoker but not a hardcore drug user.

        That said, I've spent a lot of time on IRC (this was my hacker training 1996-2002), etc and found there is a significant overlap between 'hacker' and 'stoner' circles, and later on, between 'hackers' and people into psychedelic music or rave scenes..hell, there's a whole genre of the rave scene called "cyber."

        of course there's some selection bias because I'm a stoner, but I find the overlap to be too significant to explain away by that fact alone. What's

        • oh yeah, and I should definitely add that when I started hacking/etc, I wasn't yet a pot smoker. That came years later. But my hacker mentor, someone I knew only on IRC, was a major pothead, and I was very against it at first. Later experiences changed my mind on its harmfulness.
        • by Hatta ( 162192 )

          of course there's some selection bias because I'm a stoner, but I find the overlap to be too significant to explain away by that fact alone. What's your take on this?

          A non-drug user will see the opposite pattern because the best people who use drugs are also the most discreet.

      • by borcharc ( 56372 ) *

        Have you ever been to defcon?

    • by hondo77 ( 324058 )

      It felt like I would have to become a square...

      You realize this is Slashdot, right?

    • The major reason for drug testing is to prevent blackmail, as was the old ban on homosexuality.

      If you don't give a fuck what someone does off-duty, they can't be blackmailed for it.

      • If you don't give a fuck what someone does off-duty, they can't be blackmailed for it.

        They can be blackmailed as long as someone they care about cares what they do off duty. "Get us the secret plans or your WoW girlfriend will find out you still live in your Mom's basement."

  • by ackthpt ( 218170 ) on Monday October 29, 2012 @05:51PM (#41811631) Homepage Journal
    • Doesn't have time for Firefly or Star Trek.
    • Doesn't even watch TV
    • Doesn't hang around on news websites.
    • Doesn't get out much, if at all
    • Is relentlessly picking apart code, oprating systems, APIs looking for a small clue of some exception not being handled
    • Probably eats poorly, has no fashion sense and has the social skills of a slug
    • Will eventually find a way through whatever the problem is through persistence.
    • Will celebrate his/her find with a pumped fist (the most exercise in a week) and the utterance, "cool."

    While not terribly talented and hardly the sort of person likely to hold down a decent paying job (let alone know how to write out a resume or pass an interview) these are the sort of people who find the gaps. Recruiting them to work for you may be iffy. Once they have a paycheck, can afford a sports car, some decent clothes and can afford to go out they slowly cease to be the people you wanted.

    Best to just hire them on a per item contract and toss them a burrito now and then.

    • Doesn't have time for Firefly or Star Trek.

      False. That's what multitasking while compiling or testing is for.

    • Doesn't have time for Firefly or Star Trek.
      Doesn't even watch TV
      Doesn't hang around on news websites.

      What do those true hackers do while they think?

  • This is normal... (Score:4, Informative)

    by magamiako1 ( 1026318 ) on Monday October 29, 2012 @05:51PM (#41811633)
    This is nothing new to the IT industry in general and has been going on for years. It's only moved to "Security" now because the wave of nerds that 10 years ago were hired for "basic IT" are now sufficiently advanced where connecting a network together is trivial and their knowledge has moved on.
  • I think there is a wide skill range when it comes to hiring someone with security expertise than just programming alone. And everyone knows HR can't figure out how to hire a skillful programmer over a random Joe who talks himself up. So what hope does HR in finding a security expert, when there's a lot of bullshitters who claim to be good at security but don't know anything?

    I know about encryption, and I've found security flaws in applications such as Adobe's P2P networking, but I wouldn't consider myse
  • They need to hire a Relationship Manager.

    "Ich bin ein nerd"

  • Sounds like a way to get some Black Hats working directly for the DOD and Homeland Security. Hiring Black Hats is good only when you know they are a Black Hat, and that usually requires they get arrested first. If they are a sketchy unscroupoulous looking person then stay away. They already have to be on the lookout for the Normal Looking Black Hat Anon that's slipped into the organization they shouldn't be putting people that are clearly a risk in.
    • Hiring a known Black Hat? Are you nuts?

      I know, there's that myth floating about that a police register is some sort of "letter of recommendation", but actually, it not only tells me that the person at the very least didn't mind playing on the "wrong" team, but he was also not good enough not to get caught. I do NOT want that person on my team!

      Actually, what you want to hire as government is that average-good hacker, not the top level one. Why, you may ask? Well, with the former you can be certain that he's

  • Two big barriers (Score:5, Interesting)

    by AarghVark ( 772183 ) on Monday October 29, 2012 @06:00PM (#41811725)
    There are two big barriers for government IT hiring:

    Pay scale
    The GS payscale doesn't map well to high-end IT skills. So often you end up with the marginally qualified, or those rare individuals who are not only not in it for the money, but somehow find a way to turn down offers every quarter from another round of head-hunters.

    Extra scrutiny
    The government security and screening process is a lot tougher than many commercial enterprises. It leads to ironic debtor-prison type situations where an otherwise qualified guy about to have his house foreclosed can't get the job because he is a security risk because he needs the money. The government just doesn't want to take the risk he will be try to pay off his bills by selling access to the highest bidder.
  • First of all, tfa misses it's point completely, but hits on a bigger one. How to tell a crap sec pro from a good one, and at least I believe the answer isn't on paper. HR does background checks on anybody in any dept. , so saying this is discriminant is to generalize the entire work force, same with drug testing. Culturally... well you gotta have somebody that fits in with the team, otherwise you got bigger problems than network security. Most hacker / security types I know of you can't really tell apar

    • Which is why the CISSP certification is in such high demand....

    • by cpghost ( 719344 )

      How to tell a crap sec pro from a good one, and at least I believe the answer isn't on paper.

      You can tell the difference by subjecting the applicants to creative tests [defcon.org]. If they manage to break in, they're more likely to be able to switch hats and guard the other side of the fence.

  • Private sector pays IT sec folks 6 figures+, last time I googled the salaries of the alphabet boys I wasn't very impressed.

    Example: http://www.glassdoor.com/Salary/FBI-Salaries-E24637.htm [glassdoor.com]

    Example: http://www.criminaljusticeschoolinfo.com/fbi-agent-salary.html [criminalju...olinfo.com]
  • So basically... (Score:4, Insightful)

    by Millennium ( 2451 ) on Monday October 29, 2012 @06:22PM (#41811923)

    Network security is a position of trust. There is basically no way around this: implicit in running a network is that you have the tools to see what's on it. Encryption only goes so far in such situations, particularly at agencies tasked, in part, with getting at encrypted data.

    This adds up to some employers requiring a greater degree of trust in their employees than is currently the norm. Some geeks, it seems, are unwilling to come to terms with the fact that their life choices may have made them poor security risks in that context. The cases where the risk isn't because of a life choice are sadder, but the risk is just as real, and to ask agencies with bona fide requirements for absolute trust to simply ignore those risks is insane.

    • Security operations on a production network is so different from, say, vulnerability research that it's wrong to use the same term to refer to both.

      Then you have to specify what kind of trust you're after. There's an sf story where a character muses about a thug "I would trust him with the crown jewels, but not with my daughter".

  • Defcon (Score:4, Interesting)

    by Anonymous Coward on Monday October 29, 2012 @06:25PM (#41811939)

    This year's Defcon had a HUGE push by Homeland security and the CIA attempting to recruit. It was funny going to watch Bruce Schneier talk and someone told him that and he bascially said "I hope you didn't believe anything they said". They guy from Homeland security seemed like a good guy and was tring to actually hire good people, but my only question to everything he said was "You do realize you work for Janet N.?"

    The Federal government has become a joke. If you go out on a limb for them and it becomes slightly inconvient for them they hang you out to dry. You find them doing something wrong and think about whistleblowing, you will be fired and probably sued (see ATF guy who told about Fast and Furious). You interrogate terrorits and you will be threatened with jail (See CIA agents at Gitmo). They have a history of stomping on people who might make them look bad.

    No thanks. The Federal government is corrupt beyond fixing. Anyone who goes in to do the right thing will end up being a casuality.

  • by VortexCortex ( 1117377 ) <VortexCortex@pro ... m ['jec' in gap]> on Monday October 29, 2012 @06:28PM (#41811967)

    An important point: Except in some relatively minor respects such as slang vocabulary, hackers don't get to be the way they are by imitating each other. Rather, it seems to be the case that the combination of personality traits that makes a hacker so conditions one's outlook on life that one tends to end up being like other hackers whether one wants to or not (much as bizarrely detailed similarities in behavior and preferences are found in genetic twins raised separately).

    General Appearance
    Intelligent. Scruffy. Intense. Abstracted. Surprisingly for a sedentary profession, more hackers run to skinny than fat; both extremes are more common than elsewhere. Tans are rare.

    Dress
    Hackers dress for comfort, function, and minimal maintenance hassles rather than for appearance (some, perhaps unfortunately, take this to extremes and neglect personal hygiene). They have a very low tolerance of suits and other ‘business’ attire; in fact, it is not uncommon for hackers to quit a job rather than conform to a dress code. When they are somehow backed into conforming to a dress code, they will find ways to subvert it, for example by wearing absurd novelty ties.

    Female hackers almost never wear visible makeup, and many use none at all.

    Physical Activity and Sports
    Many (perhaps even most) hackers don't follow or do sports at all and are determinedly anti-physical. Among those who do, interest in spectator sports is low to non-existent; sports are something one does, not something one watches on TV.

    Further, hackers avoid most team sports like the plague. Video games being a notable exception, both in terms of team play and consideration as a sport... Hacker sports are almost always primarily self-competitive ones involving concentration, stamina, and micromotor skills: martial arts, bicycling, auto racing, kite flying, hiking, rock climbing, aviation, target-shooting, sailing, caving, juggling, skiing, skating, skydiving, scuba diving. Hackers' delight in techno-toys also tends to draw them towards hobbies with nifty complicated equipment that they can tinker with.

    The popularity of martial arts in the hacker culture deserves special mention. Many observers have noted it, and the connection has grown noticeably stronger over time. In the 1970s, many hackers admired martial arts disciplines from a distance, sensing a compatible ideal in their exaltation of skill through rigorous self-discipline and concentration.

    Today, martial arts seems to have become firmly established as the hacker exercise form of choice, and the martial-arts culture combining skill-centered elitism with a willingness to let anybody join seems a stronger parallel to hacker behavior than ever. Common usages in hacker slang un-ironically analogize programming to kung fu (thus, one hears talk of “code-fu” or in reference to specific skills like “HTML-fu”).

    Education
    Nearly all hackers past their teens are either college-degreed or self-educated to an equivalent level. The self-taught hacker is often considered (at least by other hackers) to be better-motivated, and may be more respected, than his school-shaped counterpart. Academic areas from which people often gravitate into hackerdom include (besides the obvious computer science and electrical engineering) physics, mathematics, linguistics, and philosophy.

    Food
    Ethnic. Spicy. Oriental, esp. Chinese and most esp. Szechuan, Hunan, and Mandarin (hackers consider Cantonese vaguely déclassé). Hackers prefer the exotic; for example, the Japanese-food fans among them will eat with gusto such delicacies as fugu (poisonous pufferfish) and whale. Thai food has experienced flurries of popularity. Where available, high-quality Jewish delicatessen food is much esteemed. A visible minority of Southwestern and Pacific Coast hackers prefers Mexican.

    For those all-night hacks, pizza and microwaved burritos are big. Interestingly, though the mainst

  • by pnot ( 96038 ) on Monday October 29, 2012 @06:51PM (#41812177)

    was confirmation of my opinion that "political correctness" now means "any kind of attitude or phenomenon that I don't like, but I can't be bothered to articulate a proper argument against". A bit like "inappropriate", really.

  • Bradley Manning... (Score:5, Insightful)

    by IonOtter ( 629215 ) on Monday October 29, 2012 @07:12PM (#41812365) Homepage

    ...had a Top Secret / SCI (secure, compartmentalized information) clearance.

    They crawled up his ass with the Hubble telescope, looked for people he knows, then went and crawled up the ass of *those* people to find out who *they* know that might know Manning. They hooked him up to a polygraph. They checked, re-checked, cross-checked and followed every single link, social media page, every parking ticket, every word on his school records.

    It takes months to do a SSBI. [wikipedia.org]

    And yet, when Manning encountered something that he knew for a confirmed fact that what he was seeing/hearing/reading was against the law, he tried to do the right thing, but got shot down by his chain of command. Feeling as though he had no other choice, he allegedly turned the info over to Wikileaks.

    What the heck do you suppose a "geek", someone who by their very nature has issues with authority, probably has personal issues around justice, and has tendencies towards just about every "ism" that your average government puts people on watchlists for, is going to do when they see/hear/read something that they think is wrong????

    Nabbing geeks off the street to "hack the planet" is fine and dandy for movies about the end of the world, but it doesn't work so well in real life.

    • by cpghost ( 719344 )

      What the heck do you suppose a "geek", someone who by their very nature has issues with authority, probably has personal issues around justice, and has tendencies towards just about every "ism" that your average government puts people on watchlists for, is going to do when they see/hear/read something that they think is wrong????

      Speaking of geeks tending towards "isms"... even Robert Oppenheimer [wikipedia.org] was being closely watched for his "communist" tendencies, but the real spy Klaus Fuchs [wikipedia.org] went undetected for way

  • by mbstone ( 457308 ) on Monday October 29, 2012 @07:27PM (#41812513)

    ...of security clearances and credit checks and background checks and peeing in cups, although that's a big part of it (official DoD policy is that any marijuana use is a "serious mental disorder.")

    The other aspect is that they don't really want their security fixed. They don't want to be told that "TBD" on a security plan isn't acceptable.

  • The first Boy Scout who develops "elite hacker skills" and is willing to spell it that way gets the job.

  • This isn't just government. People who run businesses and make hiring decisions have all kinds of weird ideas and hangups about what makes a good employee. You are considered not good employee material if you've been out of work for more than 6 months, or your age, appearance, or dress doesn't conform to their startlingly narrow standards, or your attitude isn't just so, or your credit rating is too low or perhaps too high which means you might be able to walk out on them without losing your car and house

  • The paranoid nutcases that determine whether, or not, someone is a "security risk" have no clue how to determine that (how many spies have been publicly exposed within the CIA, etc. ?). They fall back on "I'm a good security risk, if I do say so myself, so people like me must also be potentially good security risks.", and, therefore, everyone "not like me" is a bad security risk.

    The primary "like me" criterion is the willingness to have your entire life exposed to your bosses and other, less visible, audit

  • Was using the government as a benchmark for anything. Government IT contracts are obscenely bloated with regulatory compliance requirements and perilously thin on security. There's difference between the two.

    Government contracts stress first and foremost adherence to standards like COBIT and NIST because....well just because. Then the regulatory monkeys fly in and tell you about the 40 different regs you have to be audited to. And all of a sudden you've torn out your whole storage farm and replaced it with

  • by Joe_Dragon ( 2206452 ) on Monday October 29, 2012 @11:38PM (#41814237)

    IT needs trades / tech schools like learning not college that come with big skills gaps.

  • by ExecutorElassus ( 1202245 ) on Tuesday October 30, 2012 @12:58AM (#41814693)
    ... is dog-whistle for "I really wish I could get away with being open about my racism/sexism/homophobia/whatever." You should really avoid hiring those people, if that's what you really mean. If you just mean "Yo, we shouldn't knock qualified applicants off the list for a pot bust ten years ago," then maybe you're on to something.
  • The infamous SF86 (Score:5, Informative)

    by LanMan04 ( 790429 ) on Tuesday October 30, 2012 @10:22AM (#41818371)

    If you're going to get a Fed security clearance of any kind, you're going to *start* the process by filling out this form (127 pages, although large parts are skipped for most people):

    http://www.opm.gov/forms/pdf_fill/sf86.pdf [opm.gov]

    Just so you know the kinds of questions they start with. It gets more invasive from there. They generally only care about the last 7 years of your life, however.

    Oh, and skip to page 96 if you want to get to the "what drugs have you done?" part.

After all is said and done, a hell of a lot more is said than done.

Working...