A strong homeland defense requires secure computer networks, and hackers can strengthen them.
In the War on Terrorism, the U.S. desperately needs cyber-whizzes to protect its critical computer infrastructure. The threat is real: imagine terrorists disrupting the EasternU.S. power grid during an August heat wave, while simultaneously shutting down the 911 emergency-response system. The CIA reports that 20 countries, some of which may sponsor terrorism, are preparing cyber-war capabilities for use against the U.S. And were not prepared: Congress gave the feds an F in cyber-security this past November.
Hackers, who readily spot network weaknesses, can help. Not all hackers are destructive, if clever, anarchists: most go about their illegal activities as a kind of ego-boosting gotcha, breaking into protected computer systems without doing harm, but only exposing how the systems are vulnerable to attack. System administrators can then patch the hole before someone else does real damage. Why not put some of these bright people to work fighting terror?
The private sector is already hiring hackers. The network security firm @stake is built around a clique of Cambridge, Massachusettsbased hackers who scripted some of the system-breaching tools that the real cyberbad guys use to this day. Companies now pay these erstwhile mischief makers to perform attack simulations on their computer networks.
Foreign governments use hackers, toobut Washington isnt interested, at least not publicly. Richard Clarke, head of the new federal Office of Cyber Security, likes to tell the story of three teenagerstwo Californians and one Israeliwho broke into Pentagon logistics and transportation systems in the midst of a brewing crisis in Iraq in early 1998. Pentagon chiefs feared that the Iraqis had done it but eventually found the teen culprits. The two Americans were prosecuted, sentenced to three years probation, and forbidden unsupervised use of the Internet; the Israeli, acclaimed as damn good by thenprime minister Benjamin Netanyahu, wound up working for the Israeli military.
A spokeswoman for Congressman Stephen Horn, chairman of the House subcommittee that flunked the feds in computer security, explains that federal cyber-warriors must pass background checks and security clearances. Its a reasonable precaution. Nonetheless, the feds might still use hackers with less than sainted pasts to help secure non-classified networks and to train law-enforcement officials in the techniques of cyber-crimejust as the CIA will be recruiting unsavory characters who can help us fight terror. Even those hackers caught breaking cyber-crime lawsthe United States Security Act of 2001 makes hacking a crime punishable by up to 20 years in prisoncould be flipped to serve our national interests, with software that logs a computers every keystroke used to keep an electronic eye on their computer activities.
When the digital war begins in earnestthats when, not ifwell need an expanded, experienced cyber-militia to help us win it.