We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Packet Hacking Village - Hacking Corporate Org Socialization

00:00

Formale Metadaten

Titel
Packet Hacking Village - Hacking Corporate Org Socialization
Serientitel
Anzahl der Teile
335
Autor
Lizenz
CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
There is growing community of hackers who refer to themselves as "Chameleon Hackers" and practice an organizational socialization technique they call "code switching." Code switching is a "tradecraft" practice used by chameleon hackers to consciously change their mannerisms, outward appearance, dress, thinking, physical characteristics, and their language in order to achieve socialization in either a virtual or live setting. The briefer will draw on his December 2018 doctoral dissertation to describe a framework for how these chameleons hackers go about their code switching tradecraft and then discuss examples of how they "hacked" the hacker community and the Corporate C-suite D9 is a member of the Senior Executive Service and currently serving as the Deputy Director for Expeditionary Warfare for the U.S. Navy. Twenty-six years as an U.S. Air Force officer serving as a B-52H navigator and then F-15A and A-37B pilot. Held Command, Director, and staff positions across the Air Force in training operations, policy, and advanced training technologies. Three operational deployments with the last in Pakistan in support of Operation Enduring Freedom (Afghanistan). Served in the Office of the Secretary of Defense for eleven years as the DoD Senior Executive responsible for the programming and execution of the nearly $900M/year the Department of Defense invests in worldwide joint training and training technologies. Cyber experience includes: Co-Lead with the DoD CIO to develop the strategy and implement the Secretary of Defense's DoD Cyber Strategy to "Build and Maintain Ready Forces to Conduct Cyberspace Operations." Built from scratch a six-month Cyber Operations training course that yielded a 78% cohort pass rate (average is 16%) on the Offensive Security Certified Professional certification. Worked with DEF CON officials to repurpose DEF CON's CTF and CTP technical architecture to support DoD's cyber operations training. 2018 Doctorates in Education from The University of Pennsylvania's Graduate School of Education. Dissertation advanced organizational socialization theory by improving our understanding of the plasticity of human socialization. Study population consisted of "chameleon" hackers who practiced a socialization tradecraft technique they called "Code Switching."
HMS <Fertigung>KraftNavigierenProzess <Informatik>Office-PaketWellenpaketMultiplikationsoperatorBitComputeranimation
HackerInformationTransaktionProzess <Informatik>MaschinencodeMailing-ListeGefangenendilemmaMultiplikationsoperatorTermGruppenoperationComputersicherheitEDV-BeratungCybersexMaschinenspracheExogene VariableHackerE-MailProjektive EbeneSchlüsselverwaltungUmsetzung <Informatik>Wort <Informatik>Güte der AnpassungSchreib-Lese-KopfBitReflexiver RaumMathematikShape <Informatik>Überlagerung <Mathematik>PunktMetropolitan area networkRechenwerkAggregatzustandComputeranimation
BeobachtungsstudieQuellcodeComputerHackerVollständigkeitTaskAttributierte GrammatikSpeicherabzugMAPBenutzerbeteiligungSchlussregelProzess <Informatik>Attributierte GrammatikSpeicherabzugNeuroinformatikExtreme programmingValiditätPhysikalischer EffektLeistung <Physik>BitVererbungshierarchieVollständigkeitDatensatzPunktspektrumTaskKategorie <Mathematik>MustererkennungHardwareMinimalgradMereologieMetropolitan area networkMultiplikationsoperatorOrdnung <Mathematik>Projektive EbeneWort <Informatik>Weg <Topologie>EinsExogene VariableOrientierung <Mathematik>ExpertensystemRechter WinkelSymboltabelleBeobachtungsstudieGüte der AnpassungHackerSoftwareFrequenzStatistikGebäude <Mathematik>Computeranimation
ExistenzsatzGrundraumBeweistheorieHackerGebäude <Mathematik>MaschinenspracheFrequenzMagnettrommelspeicherBitComputerspielResultanteWhiteboardDatenfeldMereologieEreignishorizontFrequenzTuring-TestExogene VariableGebäude <Mathematik>MaschinencodeProzess <Informatik>Physikalische TheorieTransformation <Mathematik>HackerPhasenumwandlungZweiMetropolitan area networkMultiplikationsoperatorFormation <Mathematik>GradientenverfahrenZeitzoneComputeranimation
MaschinenspracheHackerPhasenumwandlungTermMusterspracheFokalpunktVollständiger VerbandE-MailHinterlegungsverfahren <Kryptologie>FlächeninhaltRechnernetzKomplexitätstheorieRückkopplungOrtsoperatorKontextbezogenes SystemPunktSelbst organisierendes SystemMinkowski-MetrikSchlüsselverwaltungForcingPhasenumwandlungOffice-PaketHackerSystemaufrufHypermediaMaschinencodeSocial Engineering <Sicherheit>InzidenzalgebraAusnahmebehandlungGruppenoperationNeuroinformatikMailing-ListeFamilie <Mathematik>ZustandsmaschineBeweistheorieProzess <Informatik>Computeranimation
RechnernetzOrganic ComputingPhasenumwandlungÜberlagerung <Mathematik>Laufwerk <Datentechnik>Explosion <Stochastik>DiagrammROM <Informatik>Strategisches SpielPhysikalische TheorieProzess <Informatik>StandardabweichungSpeicherabzugFrequenzDifferenteBridge <Kommunikationstechnik>MereologieMultiplikationsoperatorInformationRechter WinkelProgrammierumgebungHackerUmsetzung <Informatik>Formale SprachePunktMaschinencodeTermStrategisches SpielPhasenumwandlungFrequenzWort <Informatik>EnergiedichteMAPDiagrammMinimalgradRückkopplungBitSoftwaretestZahlenbereichWeg <Topologie>ZweiÜberlagerung <Mathematik>Quick-SortReelle ZahlComputeranimation
SchlüsselverwaltungMessage-PassingWellenpaketWort <Informatik>Kontextbezogenes SystemRechter WinkelFormation <Mathematik>ZustandsmaschineComputeranimation
MaschinencodeHackerKontrollstrukturPERM <Computer>RechenwerkWürfelMinkowski-MetrikNatürliche ZahlMereologieNormalvektorStatistikMathematikFrequenzSpeicherabzugBitMultiplikationsoperatorGüte der AnpassungMaschinencodeRechenschieberSummierbarkeitPersönliche IdentifikationsnummerKernel <Informatik>DiagrammDreiComputerspielHackerKontextbezogenes SystemInteraktives FernsehenFormation <Mathematik>Selbst organisierendes SystemComputeranimation
ATMKette <Mathematik>Physikalische TheorieEndliche ModelltheorieQuaderProzess <Informatik>DiagrammKette <Mathematik>System FSchlüsselverwaltungRechter WinkelMultiplikationsoperatorEinfache GenauigkeitComputerspielSelbst organisierendes SystemComputeranimation
MaschinencodeKontrollstrukturHackerInformationEingebettetes SystemEinsFormation <Mathematik>Extreme programmingHypermediaNeuroinformatikPhasenumwandlungRechter WinkelUmsetzung <Informatik>MereologieSocial Engineering <Sicherheit>BildschirmmaskeProzess <Informatik>IdentitätsverwaltungMetropolitan area networkTermGamecontrollerNatürliche ZahlKontextbezogenes SystemHackerDifferenteComputeranimation
ProgrammierumgebungRechter WinkelMultiplikationsoperatorNeuroinformatikMustererkennungBenutzerfreundlichkeitSymboltabelleBitEnergiedichtePhysikalische TheorieMAPTransaktionTransformation <Mathematik>Interaktives FernsehenUmsetzung <Informatik>Peer-to-Peer-NetzNatürliche ZahlComputeranimation
Transkript: Englisch(automatisch erzeugt)
All right, you're going to make me talk on this thing, huh? So who am I? 26 years in the Air Force, navigator, pilot. Got out, became a bureaucrat. That's what I am now, a government bureaucrat. I'm a Fed. Been doing that about 13, almost 14 years.
Two different jobs, one in the Secretary of Defense where I was the chief training officer, mostly ed training, but some education too. Now in the Navy as a deputy director for Expeditionary Warfare. So that's me. So I just got my doctorates in education
from the University of Pennsylvania. And the talk that you're going to hear is my dissertation, which I did. I spent about four years researching it. Came here four times, went to Shmookon twice, interviewed a lot of people. We'll talk a little bit about that.
And so my status here is not as a Fed but as an independent researcher. So what did I research? It's kind of a weird phenomenon. I looked at guys like Kevin Mitnick and Paulson and Zatko. Anybody know Peter Zatko much?
And Raymond, ESR, anybody know him? Yeah, interesting guy, man. The only one on that list that I've met is Peter Mudge. Interesting guy, he was the head of DARPA Cyber Projects. When I met him, he was on his way out and I asked him, dude, give me your feelings
about where the hell the United States of America is on cyber security. It wasn't a good story. And a lot of that conversation really motivated me to do this research. What these people have done is they've transitioned from a hacker community of practice
to an institutional or corporate or government side of the house. So Peter worked for DARPA. How many of you have seen the picture of Mudge sitting in front of Congress with his long hair? Yeah, look it up sometime. He also was a consultant to President Clinton
so that's how early it goes back. Midnick spent five years in prison for hacking. At one point, the world's most wanted hacker now owns a successful cyber security consulting company. Polson, same kind of deal except he didn't spend as much time in jail but now is a prize
award winning journalist for cyber security magazines. Zatko actually is working, doing basically the good housekeeping seal of approval for IoT now. That's what he's doing. And Raymond, he's somewhere in Pennsylvania.
But I was curious, it's like how do they do that? And why did they do it? And then what can we learn from that? So that's kind of what the talk's about. So I'm gonna throw out some definitions. I'm gonna geek out for you just a little bit on academic stuff so I'll try not to put you to sleep.
Let's see if I can do, see if, of course, I guess that'll work, yep. So what's a community hacker? That's someone that can change who they are and move back and forth between those two communities we talked about.
I did not come up with that word, they did. Habitus, that's a friggin' interesting word. Came up with by a guy named Pierre Pordu. He was the son of a peasant mail worker and rose to lead the most prestigious
education institution in France. Very interesting guy. In some ways, he's a chameleon too, except he got caught in the middle. Never could be accepted on either side. But Habitus is really about, so when I look around the room, it's how you dress, it's how you act,
it's how you walk, it's how you talk, it's your body shape, it's everything about you. And most of it is subconscious. You do it without thinking about it. The next time you go, when you go out and walk around out there, just take
a good quick look at how people are walking. Most people walk differently than others. I mean, it's just different. There's a unique way in which they walk. Why? That is a learned behavior and it comes from something that Pierre Pordu called Habitus.
Reflexive or reflexivity. That's the ability to access your subconscious and your conscious and change who you are. It's the key to being a chameleon. Code switching. I did not come up with that term. That is a term that my respondents came up with
that I interviewed. It's the skill I'm talking about. It's that ability to do that transition back and forth. And it's a trade craft. In fact, when I've talked to people, if you're an undercover cop, if you're in the CIA
and you're doing deep cover, some of the things I'm gonna talk about are exactly what code switching's all about. So who did I study? I started with one person, then I snowballed. And I ended up with about 37 people.
All of them had these things. How many of you did start, and were interested in computers at the age between four and 12? How many of you? Yeah, interesting. Interesting, right?
And you were doing some pretty advanced stuff at that young age, too. Most of the ones I talked to were doing pretty advanced things. A lot of them, in fact most of them, have competed at the national or international level. So these are not slouches. And if I were to tell you the names of the people
that I interviewed, you would at least recognize over half of them. And they go from deep, deep involvement in the dark web to name companies that, I mean, they're like institutions as far as computers and technology are concerned,
software. And then the last one was kind of interesting, which is to start at some of the attributes I'll talk about, but really enjoyed taking puzzle parts when they were kids and doing puzzles. And they have something I call task completion resiliency,
but we'll talk a little bit about what that is. But that's, they will work at a job until it's complete. They won't eat, they won't sleep, they won't do anything until it's done. That, how many of you have experienced that? Yeah. So what I'm gonna talk about next is,
I had to first understand who they were and what their soft skills were before I could understand the other parts of it. So I'm gonna cover really quickly the seven core habits, hackers, attributes. And what these attributes are is, again, if you remember what habitus is, it's in you. Some of it's learned,
some of it you don't know how you learned it, but it's done over a long period of time. So the first one is, they're self-directed learners, extreme self-directed learners. So, and by the way, it's not just about computers. How many of you have other academic interests
other than computers? Yeah. Coffee? Beer? Cars? What else? Give me some more. Woodworking? Woodworking. Whiskey. Whiskey. Books. Sports account. Yeah.
And how many of you consider yourself an expert in that, in those things? Right? You'll go until you're done, man. So the next one is, passionate curiosity for how things work. So that goes back to that puzzle thing.
So how many of you take things apart to see how they work? Yeah. And that's hardware and software, right? How many did that when they were kids? How many did that and then put it back together?
How many of you had your parents yell at you for doing that? Tenacity to work forever. That's a quote from one of my respondents. The guy said, dude, I will work forever on a project until I complete it. That's, most human beings don't have
that kind of staying power. It's an interesting attribute, and relatively rare. Or I could talk, if you wanna talk afterwards, I could talk to you a little bit about some of the reasons for that. Breaking something to earn symbolic capital.
So that's fancy academic words for, I'm a breaker, slash hacker, but why do I do it? Is it about you? Well the people I interviewed said it was not about them. It was about proving to others.
It was about earning respect, prestige, recognition. It was not about them. And you can see some of the reasons they have up there. It's also a war. A lot of them talked about a war with the institution, proving to them that they were smarter
than the institution and better. That they found things that they didn't see. There is some validation of self worth, but that really, again, is not self awarded. It's awarded by others. And then breaking it because it's there.
There's at least one person at this conference. He's a pretty famous guy. You might know him, I won't say his name. But he's on the record saying, why are you a hacker? And he said, cause it's there. That's what his answer was.
And then there's builders. So not everyone's a breaker. There's a lot of builders out there. And you can see some of the reasons for that. Again, it's still to earn symbolic capital. But it's to build things. And I've got two examples that I'll talk about here in a second.
And so high degree of process orientation, right? So I asked you, how many of you were process oriented? What does that, did anybody know what that means? You're mostly an engineer. You do things pretty much by the book, in a certain order.
And you're good at keeping track of those processes. And the last one is, I've always questioned the status quo. So how many of you question the status? You know what I mean when I say that? Like, why the hell is it that way?
So that's high levels. Normally the person that does that has high levels of risk tolerance. But the interesting thing is, and this is what's very unique about the population in this room and the population I interviewed, is that you don't normally find someone who has a high tolerance for risk and question the status quo,
but also has an extreme sense of detail and process orientation. You know, someone who files a process is normally called a brown noser, and they follow the rules and they don't break them. So the cool thing about these soft skills is it's a very unique individual that has these things on both ends
of the personality spectrum. So, breaking it because it's there. I'm gonna talk just a little bit about the breaking part. We'll start with, who said that, right? Well, it's right up there on the board. Everybody know who he is?
So George Mallory, I'm gonna bring this up too. So that's the original 1923 New York Times article where he was quoted when he was asked, why are you climbing Mount Everest? And he said, because it's there.
George Mallory was a World War I veteran. He saw a lot of crap in the trenches in war. And he kinda lost his way. Most of the people that he knew were killed, and when he came back to England, he didn't know who he was.
So he became a mountaineer. That quote up there is what he said after, because it's there. Now I don't wanna read it to you, but just take a look at what he said.
Interesting thought. The quote below it is what's in front of my respondents. This guy's not a slouch. He won the Turing Award, if you know what that is. That's what he said. He says it's not about solving the problem.
It's about identifying yourself in the world. And if you think about George Mallory, that's what he was doing. He'd lost his way, and he was like, okay, man, I'm gonna find myself in the world.
The interesting thing is he supposedly got to the summit, died on the ascent, or actually on the descent, and it wasn't, I think it was, what was it, another 30 or 40 years before actually someone got to the top successfully.
So an interesting guy. They just found his body, I think it was in the mid-'90s. Okay, building. This is an interesting thought. So continuing with the Mount Everest theme, a lot of you build, right? This is one example of one of the people I interviewed,
why they said they build. So it is about being the first person ever to be there. You could also talk about breaking. You can be the first person ever to break something. No one else in the world has been able to do it. You were able to do it. The interesting thing is once you achieve it, you now have leveled the playing field for everyone else.
So when you look at Mallory climbing the Mount Everest, no one could get there. And now, you know, if you've practiced and trained enough, a lot of people can get to the top. So it's about social capital, and I talked a little bit about it.
So you can see what that's about. And social capital cannot be given to yourself. It can only be given by others. Okay, so now that we got the soft skill stuff done, I wanna talk a little bit about how these folks do code switching.
And it is a trade craft. One of the interesting things that the theory says is that you can't access your subconscious. You can't change the way you walk or talk. And if you do, it's over a long period of time,
and it's normally the result of some significant event in your life. But what I saw in the people that I interviewed was that they were able to do it pretty easily. We'll talk about how they did that. Most of them, in 10 to 12 hours,
can make that transformation. The thing that I just brought up is some of the reasons why. And it wasn't just about going to corporate or infosec. It was coming the other way, too. So reintegrating yourself into the hacker community practice was another reason.
So it wasn't just about moving from hacking to corporate. It was fitting in in the hacker community practice, too. And it was also used to get into what they called the zone, which was when they were gonna hack something or build something. Same processes.
If I don't talk about it, remind me, but you know, like, well, I will do it now. So some of the things that they talked about were martial arts. Mostly the mental part of martial arts that allowed you to control your mind. Using music, for example.
Getting into a quiet place where it's dark. Those are the kinds of things that they did. So the six phases of community hacking code switching. So I'm gonna, there's six phases. Those of you that do this are gonna see, are gonna recognize some of these phases. Or you should recognize all six of them.
So this is, what I'm gonna talk about is how they hacked the socialization incident. What they did to move back and forth. So does anybody recognize that first step? What is that?
Yeah. So they contextualized the way in which they hacked the social episode in the same way that they hacked a technical thing. Except if you read the list, look at what they're looking at. So who's in a position of influence or leadership?
Who's in their family, their children, their personal lives, everything. What's important to them? What have they said on social media about their opinions? Are they a member of a political group? What are those political positions?
Do they have, have they had any tragedies in their lives? So it's a complete reconnaissance of the people in the organization who you're trying to influence. You need to do passive recon.
So it says always watching, always listening, but also always imitating and don't be creepy. So that's phase one. Phase two. Does anyone recognize that phase?
Sir, want me to go back? Yeah, yeah. Who said that? You're absolutely right. Who said that's what sales people do?
Absolutely, that's what they do. They are mostly creepy. We'll talk about how to not be creepy. But the question is, the point is, if you're obvious about it, you suck, all right? So you don't want to suck. So scanning and establishing a foothold,
does that one sound familiar to you? That's step two in the five phase of a hack. But put in the context of a social hack. So here, maybe you asked for a one-on-one office call. Maybe you asked for a mentoring opportunity. Maybe you talked to people that know this person
and say, what do you know about them? Then the last one is really important. Remember, if they're talking to you about them, they'll certainly talk about you to others. So that's phase two.
Phase three. Again, you should recognize that one. So this is really about the topic that you engage the key leader with. Is it something important to the company? Is it something important to him or her? In the first step of your research, you looked at things that that person was interested in. And so now you engage in something
that is near and dear to that person's heart. Either professionally or emotionally or personal. And what you're trying to do there is win some of that symbolic capital. Some of that social capital.
Again, you're trying to meet as much of that person as you can so they see your face, they know who you are. Calendar invites. So force the engagement. Like, you'll say, yeah, yeah, come by my office. And then go to that person's secretary
and get on their calendar. Force that engagement. That's what that last one was about. But don't force it, okay? That one should also look familiar.
So make yourself more in demand. Deliver on what you promised. Again, most business people, most jobs, I mean, does this sound unusual to you? No. How many of us actually pursue it?
Actually do it? Gotta engage in self-promotion, but don't be too obvious about it. And then move laterally. So find out who influences that person. Who is their friend? Who do they trust? Just the way you do it in a computer.
You need to move laterally in the social organization and then become a trusted agent for them. And the other thing I would say that's not on here, is you need someone to watch your back. Someone that you trust. Someone that can tell you what's going on inside,
inside the office space that you don't have access to. Or someone that can say, dude, there's trouble coming. So make sure you have someone watching your back and giving you feedback on your trade craft. Cover your tracks. Don't wanna get caught doing that, right?
You shouldn't have to cover your tracks if you've done it right. But you do need to be careful, right? Because if you get caught, you're done. It is a threaded effort through all five phases. And you don't wanna burn any relationships when you leave.
So when you move back to the hacker community, you don't wanna burn any bridges. And then the last phase, document and research. So that's actually part of pen testing, right? So what'd you find out? Write it down. Diagram it out.
Again, a person that you would probably know here, that's exactly what he does when he moves back and forth between the hacker community and the corporate side. And by the way, do not leave it anywhere where someone can find it. So disconnect, lock it up, encrypt it.
Only you have access to that information. All right, so those are the six phases. You go like, all right, well, what's the big deal? We all know it. Some of us practice it at different degrees.
But what's the difference? What were these code switchers doing that I thought was different than most people? So I'll use my fancy academic term. So they used metacognition. How many people know what metacognition is?
Do you wanna give us a definition or do you want me to? Thinking about thinking, that's right. So I'll give you an example. Metacognition normally involves three conversations with yourself.
The first one is the one that you're having with the person you're talking to. The second one is kinda in near real time analyzing how that person is responding to what you're having a conversation with them about. So I've been looking at all of you. Some of you are interested. Some of you are sort of interested.
Some of you don't know what the hell to think about it. So the second conversation is, and that's the empathy part. I'm constantly reading your body language. I'm constantly looking how my words are landing. I'm constantly analyzing, am I communicating with that person, are they in receive or have they shut the friggin' squelch
or raised the squelch up to the point they can't hear me? That's conversation number two. But there's a third conversation. That third conversation is outside of those two conversations and you're asking yourself, why do I believe my strategy is right?
Am I doing the right thing between in this two-way conversation, in the first two phases? So you're constantly asking yourself, standing outside, I envisioned it and I do it. I mean, it's like you're just kinda outside
looking at the conversation that's happening. So it's an out-of-bouty kind of thinking about what's going on here? How many of us ask, why do I believe things that I do? How many of us ask that question? Why do I believe what I believe? That's a metacognitive thought.
Most people just say, I believe it. It's what I believe in. But no one says, well, why do I believe that? That's metacognition and that's one of the things that you need to be successful, to pull it off. If you're not analyzing those three-way conversations, you're gonna come across a little bit ungenuine.
And you have to have that empathetic thing because you have to, on the fly, be able to correct if you say something wrong. So that's the first kind of tradecraft difference. The second one is, you never come out of character, ever, with anyone.
And you convince yourself that you are who you say you are. So there's no doubt inside of you that says, I'm not that person. It's hard to do. I'll give you, I got an example of one where I did that. So can you do that?
And by the way, if you've drawn it before, most of you will realize that it takes a whole hell of a lot of energy to do that. Most of the people I talked to when they were done code-switching and went home for the day where they could let their guard down were exhausted because it requires a high level of self-awareness
and understanding of your environment 24-7. It's not easy to do. And then the last thing is this metamorphosis period. So it's not just, you can't turn it on and off. You gotta take some time to do it. Most people said it took them 10 to 12 hours to do it.
So there's me, my different roles. This one up here? So I was a train, right? So I dressed up like that guy. We were doing key leader, I don't even know what a key leader engagement is in the military. So we were talking to some Afghan official.
And the trainee was supposed to be interfacing with the key leader. And I kept coming in and out of the room and handing the key leader a piece of paper and interrupting the interview, right? So much so that even the instructor who did not recognize me told me to stop interrupting me.
And then afterwards, I walked in the room and I took this shit off and I said, does anybody recognize me? And they're like, no. I go, well, I was the guy that was pissing you off when you were interviewing the key leader. And you had no awareness that someone was coming in the room while you were talking to that key leader.
Could have been a bad guy. This guy right here, the guy that's laughing, Pakistan Air Force Colonel, my counterpart when I was in Pakistan, told me, I don't know why I like you, but I do.
Think about that. I don't know why I like you, but I do. Why? Because I, in my heart, said, I'm gonna go to this freaking deployment and I'm gonna like the people I'm working with. Even if maybe I don't.
He said, I don't know why I like you, but I do. Oh yeah, that's me in a truck, go to the Khyber Pass. We told the guard that we were Danish, just from that. Because Americans weren't allowed in the Khyber Pass.
So what does all this mean? How are we doing on time, Ming? So I wanna have a discussion with you guys. I've talked enough. How are we doing? How much? Okay, so I wanna have a discussion now
with you guys and say, if you think this is all BS, I'm happy, I'll take it. If you think there's something to it, tell me that. So, here's a question. Is it deception, or the true nature of socialization?
Are we ever who we say we are? Thoughts? Sir? I see it as true nature, but I think someone on the other side may see there's a deception. Yeah? It really happens when you're talking to someone.
What do they, how do they, they perceive themselves. Yeah, so that's an interesting, yeah, that's an interesting question. So, I won't go to the slide,
because it's a geek out slide. Yeah, so what he said was, did the people that were doing code switching, the chameleon hackers, did they know who they were? Or were they lost in space somewhere? Is that a nice summation? What else did you ask? We're always putting on this front. Yeah.
More than. Yeah. So, one of the people I interviewed said, they have a core that doesn't change. I'm not sure I totally believe that. They said, look, we have a core. So that 10 to 12 hour period is you're doing
an external change of who you are, but you're maintaining the core. So they spin in, so before they go into the socialization episode, they spin into the behavior. They act the way they need to inside the organization, and when it's time to leave, they spin out.
So they actually de-evolve the things that they added to their personality back to their core. This person said they always stayed centered. This is one in particular, one that was very, very good at it. That they never allowed themselves to get moved left or right of their core.
Okay, I'm not sure that's normal human behavior, but that's what this person said. So they said, most of them said, they knew who they were in the core, and all of it was a facade. Sir.
Yeah, it's a great question. So what he asked was, were they faking
what they were doing, and what else did you say? Oh, yeah, a psychological pathology. So, I would say, so he asked if they're better at it
than the rest of us, and if they're all, was it psychological? The interesting thing is, when I look around here, there's a high percentage of people, more, I think, than in the population,
that are in this community that do that. I mean, that's the anecdote. I don't have good research statistics on that, but anecdotally, as I look around, I'd say, yeah, there is a high percentage. There is, yeah.
It goes back, well, this is why I talked a little bit about George Mallory, and did he know who he was? If you look at his life, particularly after World War I,
not sure that he did, and he didn't exactly know where he fit in society anymore, either. Yeah, yeah, yeah, and there's a compartmentalization of maybe things that happened to you when you were young.
I'm not a psychologist. I did, I wrote my dissertation on social science, so I'm not a psychologist, but what I'm talking about is the social science part of the research. Anybody else? Sir, yeah, yeah, but you have to kinda know to do that.
I mean, not everyone knows to do that. Yeah, me, I have to work at it.
It's not something that I just do naturally. I have to, and so, you know, the first time I met that colonel, dude, I was like, on pins and needles, aware of everything, every interaction, everything that I was saying to him and how he was reacting to it, and when I got done with it, it was like, holy shit.
So no, that did not come easily for me. Who else, sir? Yep, yep, absolutely.
That's why I called it Tradecraft. It's definitely, it's definitely part of an intelligence Tradecraft toolkit, definitely. But it's being done in society, which is a really interesting thought. Sir, yeah, yeah, and then that's why,
so, you know, in my dissertation, I talked about that more research was needed on that core part, because they argued, core didn't change. I mean, I will show you the little geeky, I think I got the little geeky diagram. So that's the little geeky diagram that you can't read, but it'll be,
so that's the grounded theory model. Anybody know what grounded theory is? So you use grounded theory when you don't have a theory about something, and you just like go, okay, well what did the data tell me? So that's the wind in, wind out process. So you can see the inner, that red box grows, which is their, which is the habitus that they add to their personality. You see that blue box stays constant throughout.
And then when they exit on the right hand side, they're back to the blue box. And then a chain of socialization. So if you think about your life, it's a chain of these socialization episodes over time.
You spin in, you spin out, you spin in, you spin out, you spin in, you spin out. The interesting thing is socialization theory, and I'm gonna geek out on you just for a second, never looked at the chain. It only looked at, you go into an organization, and what is the process for you to become from being an outsider to an insider?
But it never said, well dude, that's not actually the way it works. You move around, when you move around, you actually experience socialization like this, and not as a single episode. So I'll get off the geek now, go back to the, okay?
Sir? Mostly at home, I think, by themselves. I mean, I gotta be careful, because I want to protect the identity of these people,
but one of them, this is the ultimate chameleon, right? This person, I interviewed them, they said they were one thing. At the end of the interview, I said, is there something that I didn't ask you that I should have? And the person said, I used to be a different sex.
The ultimate chameleon. So they were one sex, and they moved to the other sex. And they didn't really talk much about their past experiences on the other side. But they used it to their advantage,
so they could surprise people with certain tones of voice. They came out of something that other people weren't expecting, so it was a control device for this person. It was a really interesting interview, probably one of the better ones that I had. Because there's the ultimate chameleon, man. Not only did they talk about the internal social part,
but they actually physically did something about their external look. What else? David.
It is, you know, it's social engineering, right?
I mean, that is what we're talking about here. I didn't want to, I never used that term. But it is an extreme form of social engineering. Yeah, yeah. That's why I used the five phases of the hack.
And it wasn't just me. I mean, several of my interviewees, when they described the process, used that five phases of a hack to structure their conversation with me about how they did it. So how can we train someone to do that? I'll go back to ESR's comment about martial arts.
There were a couple of other interviewees that I talked about, that I talked to, that used martial arts to focus their mental thoughts. Makes sense. And then that's just that awareness, that awareness that there is a subconscious
and you can do something about it. And then how to avoid getting caught. That's what I talked about. You gotta believe it in your heart. If you don't believe it, you're gonna get caught. So I think I'm on just about done. So last thought.
The literature actually talks about this. So we have such access to information that we're being told repeatedly over all different kinds of media. This is the way you need to be. This is the way you need to act. This is the way you need to dress. Think about it.
In the last five years, it's ridiculous how media has hammered and hammered and hammered at us. And so the literature actually talks about the fact that our exposure to this kind of media, the one that tells you how you should act, how you should be, how you should say,
that it actually is starting to bring out some of these skill sets across the population. It's more not the natural people, but you actually are being programmed based on your exposure to the media. Some of it's conscious, some of it's subconscious. So the literature actually talks about that,
which then is increasing the ability for you to manipulate your habitus, because it's being done to you, and now you've kind of worn that computer path, worn that electrical path, so it's open. So now you can do other things with it.
Just a thought. But it's one of the things that I wanna do some more research in. So that's all I got. Any other questions? Yes, sir.
Yeah, I mean, as I learned, because I did grounded theory, right, so I didn't know what the hell I was getting into. But as I talked to more and more of them, I was like, oh. And some of it, I think, was, one of them actually said to me, I reserve the right to make myself more sexy and better looking than I really am. He said that to me.
I'm like, oh, okay. So yeah, I would say that, like all of us, I mean, we tell, we always like to embellish the story a little bit. So I think there was some of it. Not a lot, but enough that it was noticeable. What else?
Sorry. Yeah, yeah, couple of them. And most of the time, it was,
most of the time it was the introverts. Which, and if you know anything about introversion, right, you need to be by yourself to recharge. So if you always had to be someone else in a socialization episode, then it wears on your energy over time. So most of the people that I saw that maybe had a little problem with it
were people that were, by nature, to me, appeared to be introverts. Sir? Maybe.
I will tell you that some people that said, oh, I wanna talk to you for half an hour, ended up talking to me for two. I mean, it was amazing when I went down to the questions. And as a good interviewer, you do mostly, you don't interact, you just listen. So, I mean, I had one interview that went for six hours.
I had a lot to say. Sir? Of their peers? Didn't really talk to them much about that.
But I think they know. Yeah, I would also tell you that some of them thought they were better at it than they really were. I can tell you that for sure. They're like, yeah, okay. You got this down. No, not as good as you think you do.
Sir?
Yeah, so you mean the ease at which it takes for you to go through that transformation, that transaction, right? Yeah.
So that's a great question. So I'll summarize and tell you, again, it was about symbolic and social capital. There was a little bit of economic capital in there, too. So you can hack and always look over your shoulder
and take from others and maybe go to jail, or you can take those same skills and go, hey, if I take them over there, I can get paid to do that. I mean, if you actually look at some of the folks, that's what it was. It started with economic capital, but then it was also about prestige.
It was also about recognition. It was also about coming from a counterculture and then trying to fit in in this other one and saying, I'm just as good as you are, if not better. So I will tell you, it was less about economic capital, more about that need for symbolic capital, more about that need to validate your self-worth
but have it done externally. So I think I gotta stop, right? I'm getting a hug. Is that right, me? I got a few more minutes. Okay, but in the end, it was really about that symbolic and social capital, the need for that. I mean, I didn't get a lot into their childhood, but most of the people I talked to had,
some had a fairly good childhood, but most did not. Most grew up in a rural environment. Most were bored out of their minds, and the computer was a release. Most of them had broken homes. A lot of them had broken homes and found themselves on the dark side
and then figured out how to get out of there. Anything else? I got the impression that they did believe
that when they were in the role, they did believe. I mean, that's kind of where I came, that's where I got the, dude, if you don't believe in your heart, it's not gonna work. I don't know, they seemed a little strange when they were out of the role, to me.
They still could, it seemed like they didn't quite let go all the way. That's what it was, that's what it seemed like to me. Unless you got deep into a conversation, and then you learned a lot of really interesting things about them. One of them said that he was made fun of as a kid by all the jocks, but when he was hacking,
he was like God, because nobody could see who he was, nobody could see his face, his body, whatever. They were only analyzing and looking at his intellectual capabilities.
Anything else? Okay, thanks very much, I appreciate it.