{"id":22730,"date":"2013-10-29T09:13:06","date_gmt":"2013-10-29T14:13:06","guid":{"rendered":"http:\/\/quotulatiousness.ca\/blog\/?p=22730"},"modified":"2013-10-29T09:14:09","modified_gmt":"2013-10-29T14:14:09","slug":"what-happens-when-you-challenge-hackers-to-investigate-you","status":"publish","type":"post","link":"https:\/\/quotulatiousness.ca\/blog\/2013\/10\/29\/what-happens-when-you-challenge-hackers-to-investigate-you\/","title":{"rendered":"What happens when you challenge hackers to investigate you?"},"content":{"rendered":"<p><a href=\"http:\/\/pandodaily.com\/2013\/10\/26\/i-challenged-hackers-to-investigate-me-and-what-they-found-out-is-chilling\/\" target=\"_blank\">Adam Penenberg<\/a> had himself investigated in the late 1990s and wrote that up for <em>Forbes<\/em>. This time around, he asked Nick Percoco to do the same thing, and was quite weirded out by the experience:<\/p>\n<blockquote><p>It\u2019s my first class of the semester at New York University. I\u2019m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message. To receive the four-digit code I need to unlock it I\u2019ll have to dial a number with a 312 area code. Then my iPhone, set on vibrate and sitting idly on the table, beeps madly.<\/p>\n<p>I\u2019m being hacked \u2014 and only have myself to blame.<\/p>\n<p>Two months earlier I challenged Nicholas Percoco, senior vice president of SpiderLabs, the advanced research and ethical hacking team at Trustwave, to perform a personal \u201cpen-test,\u201d industry-speak for \u201cpenetration test.\u201d The idea grew out of a cover story I wrote for <em>Forbes<\/em> some 14 years earlier, when I retained a private detective to investigate me, starting with just my byline. In a week he pulled up an astonishing amount of information, everything from my social security number and mother\u2019s maiden name to long distance phone records, including who I called and for how long, my rent, bank accounts, stock holdings, and utility bills.<\/p>\n<p>[&#8230;]<\/p>\n<p>A decade and a half later, and given the recent Edward Snowden-fueled brouhaha over the National Security Agency\u2019s snooping on Americans, I wondered how much had changed. Today, about 250 million Americans are on the Internet, and spend an average of 23 hours a week online and texting, with 27 percent of that engaged in social media. Like most people, I\u2019m on the Internet, in some fashion, most of my waking hours, if not through a computer then via a tablet or smart phone.<\/p>\n<p>With so much of my life reduced to microscopic bits and bytes bouncing around in a netherworld of digital data, how much could Nick Percoco and a determined team of hackers find out about me? Worse, how much damage could they potentially cause?<\/p>\n<p>What I learned is that virtually all of us are vulnerable to electronic eavesdropping and are easy hack targets. Most of us have adopted the credo \u201csecurity by obscurity,\u201d but all it takes is a person or persons with enough patience and know-how to pierce anyone\u2019s privacy \u2014 and, if they choose, to wreak havoc on your finances and destroy your reputation.<\/p><\/blockquote>\n<p>H\/T to <a href=\"https:\/\/twitter.com\/terryteachout\/status\/395187483094179840\" target=\"_blank\">Terry Teachout<\/a> for the link.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Adam Penenberg had himself investigated in the late 1990s and wrote that up for Forbes. This time around, he asked Nick Percoco to do the same thing, and was quite weirded out by the experience: It\u2019s my first class of the semester at New York University. I\u2019m discussing the evils of plagiarism and falsifying sources [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[9,15],"tags":[109,129,154,334,911],"class_list":["post-22730","post","type-post","status-publish","format-standard","hentry","category-law","category-technology","tag-computers","tag-hack","tag-privacy","tag-security","tag-surveillance"],"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2hpV6-5UC","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/22730","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/comments?post=22730"}],"version-history":[{"count":2,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/22730\/revisions"}],"predecessor-version":[{"id":22732,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/posts\/22730\/revisions\/22732"}],"wp:attachment":[{"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/media?parent=22730"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/categories?post=22730"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/quotulatiousness.ca\/blog\/wp-json\/wp\/v2\/tags?post=22730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}