kestrell: (Default)
Kes: As someone who is interested in
infiltration techniques
https://kestrell.dreamwidth.org/418473.html
I posted when Deviant Ollam first taught a blind person to pick locks
https://kestrell.dreamwidth.org/420756.html
so I was excited when I read the following post in the Forbes Wiretap newsletter:

Winner Of The Week
Anyone who's been around the hacking world knows that lock-picking is very much part of the scene. Not long ago, white hat hacker Deviant Ollam taught the art to a class of blind students. A film crew caught it and it's a
remarkable watch,
https://www.youtube.com/watch?v=QJVrL8QjG5s&ab_channel=TheModernRogue
especially if you've ever tried picking a lock yourself and know how tricky it is. Hat-tip to Zack Whittaker and
his information security newsletter
https://this.weekinsecurity.com/?
for this one.

Kes: Note that some of Deviant Ollam's lockpicking books are available as Kindle ebooks on Amazon. While the following book does not contain any how tos, it is a fascinating history of similar methods for getting into places where your presence is neither expected nor officially sanctioned
A Burglar's Guide to the City by Geoff Manaugh (2016) (available on NLS BARD)
and here is a nifty talk with the author
https://www.youtube.com/watch?v=iSlgtqxfWkk&ab_channel=TheBerkmanKleinCenterforInternet%26Society
kestrell: (Default)
I'm currently taking a number of Udemy beginner courses on hacking and cybersecurity, so I only understand some of the technical details in this article, but I do understand the core concept: Amazon Sidewalk, and similar technologies leave your wi-fi network wide open to neighbors but also potential hackers, which not only makes *your* network and your personal information vulnerable to attack, but all the *other* networks you are connected to, such as your work network, health network, and your kids's school network.
The Covid-19 has had a parallel affect on the world's cyberhealth as it has on our physical health: one individua becoming infected can easily spread to many becoming infected, and we need to become more conscious of how connected we all are now.

Also: I'm very sad to hear about the denial of service attack on the Boston Public Library. I realize that nothing is sacred in this world, but somehow, I do still think of libraries as sacred, because they always were a refuge to me when I was a child, and desperately needed a refuge, and for this to occur during a pandemic, when so many people desperately need the services and joys that libraries can offer...I won't even dignify that kind of destruction by calling those people hackers. I just want to send out a thank you to all the people who worked so hard to get the BPL up and running again.

https://www.ehackingnews.com/2021/08/houdini-malware-is-back-and-amazon.html
kestrell: (Default)
You may remember I mentioned this person as *the* resource for videos and tutorials on lockingpicking and physical penetration, but he just posted a video about the challenge of teaching a blind man to lock pick.

What I, as a blind person with two degrees, including one from MIT, want to point out, is: Deviant Ollam concludes immediately that the challenge isn't Jeremiah being blind, because lockpicking is all about being tactile; the challenge is that the *teaching methods* have become almost completely visual even though, as he goes on to point out, they don't need to be.
And this is the thing I keep hearing from teachers who talk about getting their first student with a disability in their class: their realization that they have been relying on this *one way* of teaching, and questioning if that is the *only way* and the *best way* to be teaching their subject.
https://www.youtube.com/watch?v=s7PJ1qEd9Uo
kestrell: (Default)
Kes: Apologies for these notes being kind of a formatting mess--I'll be neatening them up and adding to them soon, but wanted to post them before the panel.

"I'm In": Infiltration Techniques for Writers
Panel description: How can characters get into spaces they aren't supposed to be, whether physical or virtual? What makes these scenes feel plausible? Panelists will analyze the literary possibilities in various infiltration techniques--including those that rely on technical skills (such as lockpicking or hacking) and those that rely on social engineering--and suggest useful reference works and successful fictional depictions.

After spending the past two months reading books and watching movies about hackers, thieves, con artists, etc., I've come to the conclusion that there are very few books or movies which will provide any useful information regarding how to pick a lock, hack a computer system, or pull off the perfect con. The reason for this is that, like any art, you are required to put in hours and hours of research and repetitive practice, which is mind-numbingly boring to anyone viewing it from the outside, and when you actually do something really impressive, it is usually indetectable to anyone other than another expert. In addition, most people find the highly technical details of hacking, lockpicking, and the logistics of planning a heist become boring after the first five minutes, even after you have translated the specialized language, be it slang, cant, or technical jargon, into plain language.

If you want to test this statement, go and try reading Neal Stephenson's novel
_Cryptonomicon_, in which the author includes a lot of information and history about cryptography. I can't tell you much about it myself because the novel is over eleven hundred pages long, and I kept falling asleep, so I can't speak as to whether the novel works on a narrative level, though many of my programmer friends have praised it highly for its technical content.

However, there are many hackers, thieves, social engineers, and former covert ops people who offer advice on how to commit crimes, or how to defend yourself against having these crimes committed against you, and many of these people have posted articles and videoes on the Internet. So after discussing my few fictional recommendations, this article will mostly be dedicated to discussing nonfictional resources for learning how to be good at, as Squirrel Girl would say, criming.

This is the part where I insert a statement declaring that I neither condone nor encourage the committing of any of the illegal acts described in this document, and that this article is provided strictly as an infomational resource for writers and for the purposes of entertainment.

If you're only going to watch one TV show, I recommend Leverage (2008-2012) and the sequel Leverage: Redemption (2021). It's witty, upbeat, and has strong female and black characters.

It's also reminiscent of the much earlier movie Sneakers (Dir. Phil Alden Robinson, 1992), which featured a similar team of hackers, criminals, and outcasts, and which was recently rereleased on Blue Ray with new commentary tracks https://www.youtube.com/watch?v=DXWdj5-CTjI , a personal favorite of mine because it includes a blind hacker character based on a real-life blind hacker named Whistler. Sneakers introduced the idea of the "red team," a group of hacers who are hired to penetrate a company or agency's security in order to expose vulnerabilities.
continued below cut )
kestrell: (Default)
Kes: I do feel a weird sort of pride that it's a bouncer from Boston who has raised the stakes a little bit higher, but every time the writer states that students don't have access to some particular tech or material, I just chortle.

How to spot a good fake ID
https://trevorklee.com/how-to-spot-a-good-fake-id/

February 2024

S M T W T F S
    123
456789 10
11121314151617
18192021222324
2526272829  

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 5th, 2025 09:27 am
Powered by Dreamwidth Studios