Rise of the Cybergens

Rise of the Cybergens

von: Dr. Lansing Gordon

BookBaby, 2015

ISBN: 9781682228340 , 200 Seiten

Format: ePUB

Kopierschutz: DRM

Windows PC,Mac OSX geeignet für alle DRM-fähigen eReader Apple iPad, Android Tablet PC's Apple iPod touch, iPhone und Android Smartphones

Preis: 11,29 EUR

Mehr zum Inhalt

Rise of the Cybergens


 

CHAPTER ONE
CYBERGENS:
THE SEEDS OF ANARCHY
How the Government Is Losing the Trust of an Entire Generation of Young Cybergens.
~
On November 4th, 2005 a twenty-year-old man from Downey, California hacked the Department of Defense (DoD). ‘It was the first of its kind and a stark reminder that even the most secure computer system is vulnerable’, noted the US Attorney’s Office spokesperson in the Central District of California. According to the seventeen-count indictment, Jeanson Ancheta wrote malicious computer code that was spread to a chain of infected computers. This 'botnet' was then sold to others, distributing denial-of-service attacks and sending junk e-mails. The computers hacked were at the Weapons Division of the U.S. Naval Warfare Center, in China Lake, CA, and computers owned by the Defense Information Systems Agency.
(Source: http://gcn.com/articles/2005/11/04/hacker-arrested-for-breaching-dod-systems-with-botnets.aspx).
Ancheta’s profile is one of a young, home-grown terrorist attacking a military installation with motivations of financial gain and anti-government intent. Could this be the first Cybergen persona of his kind? The psychographic profile of a Cybergen begins at birth, where he or she enters a world that is 100% digital. This is significant. 100% digital literacy at birth means this generation is a digital step ahead of anyone else out there. It also means a 100% realtime dependency on a virtual world that is increasingly in chaos. There is no memory of wires leading to anything important.
Cybergens have the ability to live and multitask in realtime, with instant access to all things virtual. Fully Literate Internet Tribes or FLITs are the live-in occupiers of the Internet. They are students, political groups, company knowledge workers, front office salespersons, factory fulfillment operators, gamers and game builders; all are youthful, digital players who are both an impure mix of younger Millennials, and pure Cybergens. They are valuable because of their super ability to meld instantly with the network, and dangerous because they can hack it. Their lives are filled with the dynamics of hacking activity.
The Snowden revelations of NSA theft of their identities via data dumps by phone companies, plus Silicon Valley brand name company compliance in this clandestine treachery, has demolished the protective walls of their passage toward adulthood. It was understood. Dishonesty was everywhere.
Hacking is the ‘new normal’. The Internet had passed its era of enlightenment, and was headed for the abyss. Cybergens were born to the cusp of the Internet Dark Ages, signaled by the takeover of the Internet by the FCC. Discoveries that every commercial firewall was hackable, because of backdoor flaws designed by encryptoligists themselves, were unsettling. Everyone’s personal identity was already stolen…these were givens. No doubting that. It was just the way online life was like, in the digital wilderness.
~
~
November 24th, 2014, Sony Pictures Entertainment was hacked. It was attacked, allegedly, because of a soon-to-be-released movie, ‘The Interview’, a comedy that insulted the North Korea leader Kim Jong-un. Korea denied responsibility and it has been suggested that Sony Pictures employees, or others, were responsible for the hacking of the Company. Cybersecurity firms and others suggest that the attack was outsourced to homegrown hacker mercenaries by North Korea. The attackers claimed to have taken over 100 terabytes of data, making it a devastating loss. Sony Pictures dealt with the infrastructure damages to the tune of $15 million in just the first quarter of 2015.
Target’s security and payments system was attacked by domestic and/or foreign terrorists. Hackers installed malware that, in the later months of 2013, stole 40 million credit card numbers along with 70 million addresses, phone numbers, and other pieces of personal information from 1,797 U.S. stores, even after the Company had installed a $1.6 million malware detection tool. The responsible anti-cyberattack vendor, whose customers also included military entities such as the CIA and the Pentagon, installed the detection tool. Target’s was, at that time, the biggest retail hack in U.S. history.
Home Depot announced a breach in its payments systems, putting as many as 56 million cards at risk. The home-improvement retailer hackers exposed shopper’s credit and debit card numbers and information hacked from 2,000 stores in US and Canada. The attack happened on September 2nd of 2014. There were suggestions that the Company did not heed repeated security warnings and had failed to install the intrusion prevention feature in its software suite.
JPMorgan Chase was attacked by hackers using malware that infected employee desktop computers, enabled by a phishing web attack. The August, 2014 attack seemed to be a series connected to recent hacks of European banks that exposed a ‘zero-day’ flaw in the Bank’s web server software to gain access to the corporate network. Some suspect foreign government (Russian) involvement. A zero-hour or zero-day attack, on the commercial level, is a cyber-threat that exploits an unknown flaw in the operating system. Developers have no time to address and patch the flaw, and programmers had zero time to fix it.
In all of the above institutions, the security breaches were massive. Graphic 1.1, shows an over-simplification of the standard corporate site being hacked. A communication tool is used to attain access through a specific vulnerability in the Application Server, and establishes an intrusion route. Graphic 1.1 shows a relief of how hackers exploited one or more security holes, hacking into an Application Server behind two Web Servers and two Firewalls, into the albeit secure company infrastructure, and stealing account information.
~
~
Cybergens, with their 100% digital literacy from birth, can walk into a programmer or data entry job, and in a few hours have the Company data center mapped out in their minds. That, along with all its weaknesses. It’s who they are. It’s how they think. US Director of National Intelligence declared ‘cyberthreats as the greatest danger facing the Nation, with Terrorism now in second place’ (James Clapper, 7/2013). Since then, there has been a fuzzy line of distinction between the two, as foreign and domestic terrorists now engage in cyberattacks against both military and domestic targets.
The Cybergen mind holds a 100% digital view of reality, seeing the cyber world exponentially different from any previous generation. They utilize encrypted technologies, where most of us still remain clueless. This is true domestically and for terrorists abroad. Cybergens are wary of all things networked. So, when they were aware that representatives from the Department of Homeland Security were visiting their high schools, college campuses, and university graduations, looking for the best hackers in the class, they were suspicious. US government agencies, including DHS and the Pentagon, were intent on identifying young Cybergens with the highest hacking skills, not for arrest, but for recruitment. The illegal hacking skills, it seems, were also the desired skill-set for ‘cyber warriors’.
Mar 27, 2013: The US Department of Homeland Security hired hundreds of young, college-age hackers to help counter an alarming number of daily incursions into the nation's electrical grid and financial networks. According to DHS head at the time, Janet Napolitano, these enrolees will be ‘hackers for good,’ and the Department currently had a need for about 600 of them. The need to develop a skilled cyber work force has been a common, and formidable challenge for a number of US government agencies, including DHS and the Pentagon. That is because most skilled ‘cyber-warriors,’ as the US military calls them, often get recruited by private industry. According to the DHS, young hackers, who have not yet entered the job market, potentially ‘have a bunch of different skill sets’ to offer the country. DHS launched a number of internships and fellowships for young people. The Department recently had over 3,000 youths compete for 60 jobs in one such program. The department also conducted a workforce analysis to look at what cyber skills were needed in the Department. (Source: https://in.news.yahoo.com/us-homeland-security-seeks-young-college-age-hackers-071544553.html)
~
The Department of Homeland Security was desperate to find and secure into their ranks the super, cyber-skilled Cybergen demographic whose 100% digital alacrity made X/Y-Gen and Millennial conscripts look slow and clueless in comparison. The DHS calls these recruits "cyber-warriors" and for good reason. A Cyber Cold War, forerunner to a Full Spectrum Cyber World War, called Spectrum World War (SWW) because of the technologies involved, is on the horizon. And the demographic or generation most skilled to fight this world war are the...