SlideShare ist ein Scribd-Unternehmen logo
1 von 21
Downloaden Sie, um offline zu lesen
hackers as a high-risk
    population

       @violetblue
Harm reduction methodology

      Ways to use it

      Hackers at risk
Harm reduction

Harm reduction typically refers to a range of controversial
public health policy strategies designed to reduce harmful
consequences associated with human behaviors,
specifically risky or illegal behaviors.

Conventional criticism of harm reduction is that any
tolerance of illegal or risky behavior is a demonstration to
society that the risky and illegal behaviors are acceptable.

                        And possibly even fun.
SFSI.org

SFSI.org is a nonprofit that provides confidential and
anonymous sex crisis counseling, as well as training for
medical professionals, clinic workers and caregivers.

* Instances include physical trauma and accidents, birth
control counseling, gender and orientation crises after sex
acts, sexual risk events, taboo or illegal sex acts.

* SFSI methodology applies harm reduction by suspending
judgment, and communicating facts and available choices.
Complex Humanitarian Emergency
            Training

UCSF's Global Health Master's Program, emergency and
crisis trial training for NGO workers, specifically field nurses
and doctors.
Live-action simulation of field confrontation in situations
such as wilderness training, media training, Geneva
Convention training risk assessment situations.
Homeless youth outreach

As a former homeless teen I was asked by a group of
neighborhood business associations to moderate forums
between neighborhood residents and the homeless youth
of Haight (San Francisco), and explain the harm reduction
approaches taken by neighborhood homeless youth
outreach organizations.

The work: facilitating discussions between neighborhood
residents and homeless youth, harm reduction outreach
organizations (Larkin Street Youth).
Hackers are the embodiment of
disobeying the security regime.



You are uniquely suited to be at-risk to yourselves.
Ilya Zhitomirskiy

"Those putting their reputations on the line, investing so
much heart, soul, time, energy and money in these
ventures are engaging in high stakes behavior.

It makes sense to me that there is great potential to fall to
very low places after investing so much and believing so
much in something."

                                  --Dr. Keely Kolmes, Psy.D.
"Are hackers cognitively different?"


Female and Male Hacker Conferences Attendees: Their
Autism-Spectrum Quotient (AQ) Scores (2011; pub 2012)
-Bernadette H. Schell, Ph. D. / June Melnychuk, Ph. D.

Teams distributed eight-page surveys at Black Hat and
Defcon (2005, 2006, 2007), HOPE 2006, the 2005
Executive Women's Forum for IT Security, and the 2006
IBM CASCON conference.

It is the first psychological study to be performed on non-
incarcerated hackers.
The results were middle-ground, with no push
toward one extreme of Asperger's prevalence
one way or the other.

According to the study, new research suggests that those labeled as
Asperger's syndrome individuals may not be "unfeeling geeks" or emotionally
and socially deficient.

The Intense World Theory sees the core issue in autism-spectrum disorders as
not being a lack of empathy or feeling -- but instead these individuals are
having a hypersensitivity-to-affective-experience issue.

Meaning, they feel "too much" in a room full of people and the information
comes in too fast than can be comfortably processed. This person would
combat social anxiety by focusing on details and switching attention, pulling
back in a way that appears to be callous or disengaged but is actually a coping
mechanism for overwhelming feelings, and choosing to hide their own.
Hacking is a complicated gift.
* Legal risks.
* Fighting common misperceptions between information sharing and advocacy.
* Lack of support system.
* Can't ask for help.
* Outcasts to society and companies.
* Fighting indifferent institutions.
* Limited communications.
* Hackers are culturally diverse; may not be working in same language of
targets, unknowns, or allies.
* Some hackers are more at risk than others (exceptional talent, access).
* High stakes: the high profileness of the info that you have to contain adds a
different level of pressure.
* Inner risks: solitary nature of hacking - isolation, depression, impostor
syndrome.
* Hackers do things that affect hundreds, thousands of people (often more).
* A moral universe where you're either a player or you get played; you're
owning or getting owned.
The long term effects of being secret keepers.
Actions and acts of hacking put the hacker at risk.

Actions and acts of hacking put the hacker's communities
                         at risk.

      Actions and acts of hacking put external people
(individuals, communities, vulnerable populations) at risk.
lessons from the streets
The code of the streets is a protective mechanism that
serves to protect gangsters from arrest as they violate legal
codes, but operates in a dual purpose to protect the
gangsters and those they care about.

A 'code' puts the focus on individuality as opposed to
societally imposed labels.

           The most simplified street code is this:

                      Make paper.
                      Stay fresh.
                      Don't snitch.
The most detailed explanation of street code was in the
portrayal of notorious real-life gangster Donnie Andrews, as
depicted through the character Omar Little in HBO’s The
Wire.

The underlying theme of the show was Omar's belief that "a
man's gotta have a code." This contrasted perceptions of a
character who was seen on the outside as a sawed-off
shotgun toting terror, and a double-crossing mastermind
who outsmarted both the biggest drug dealers and police
time and time again.
* Omar is careful to distinguish between players and citizens.
* He never robs or murders people who are not involved in the drug trade.
* His code is not to hurt anyone who is not already in the game.
* Sunday is off limits for killing and robbing.
* Bad people deserve to be punished.
* Truth can’t be subverted to punish bad people.
* No talking on phones about business.
* No loose talk.
* Defend yourself whenever necessary.
* Look out for your own.
* Recon is required: he will scout out a location, sometimes for days, making
sure he knows everything about it before he will make his strike.
* Stay sharp: he talks often about how one must do difficult jobs, so as to keep
their senses sharpened, their wits too.
* You live by the gun, accept you'll die by the gun.
* Never get high on your own supply.
* Don't snitch.
Instances

●   Anonymity policies: perfect example of failure to reduce harm.

●   Transparency/disclosure No one listens to hackers.
    RainForestPuppy: good example of harm reduction.

●   Hacker "gentleman's agreements" another good example:
    reduces risk of a bigger threat to both entities, to limit behavior that is bad
    for business.

●   Hacktivism; the use of communication tools by activists
    and countermovements - “Telling activists not to use centralized
    email and social media platforms is about as useful as telling teenagers not
    to use drugs.” See also: OpSec for Hackers by grugq.
slideshare.net/grugq/opsec-for-hackers
hackers as a high-risk
    population

       @violetblue

Weitere ähnliche Inhalte

Andere mochten auch

Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Gohsuke Takama
 
Teenage Girls: Who are they?
Teenage Girls: Who are they?Teenage Girls: Who are they?
Teenage Girls: Who are they?Jordan Freedman
 
The parable of the ten teenage girls
The parable of the ten teenage girlsThe parable of the ten teenage girls
The parable of the ten teenage girlsGroovy Group
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeUtkarsh Sengar
 
The Teenage Girl as Consumer and Communicator
The Teenage Girl as Consumer and CommunicatorThe Teenage Girl as Consumer and Communicator
The Teenage Girl as Consumer and CommunicatorHavas PR
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for KidsPatrick Laverty
 
Peer to Peer Teen Dating Violence Prevention Training
Peer to Peer Teen Dating Violence Prevention TrainingPeer to Peer Teen Dating Violence Prevention Training
Peer to Peer Teen Dating Violence Prevention TrainingURGENT, Inc.
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to courseIIIT Hyderabad
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2IIIT Hyderabad
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?Blue Coat
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserNew Horizons Bulgaria
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?Stephen Kho
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Gohsuke Takama
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online securityPaul Berryman
 

Andere mochten auch (17)

Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
Privacy is Personal Security, Digital Privacy is Digital Self Defense 11-18-2015
 
Teenage Girls: Who are they?
Teenage Girls: Who are they?Teenage Girls: Who are they?
Teenage Girls: Who are they?
 
What teenage girls are to follow
What teenage girls are to followWhat teenage girls are to follow
What teenage girls are to follow
 
The parable of the ten teenage girls
The parable of the ten teenage girlsThe parable of the ten teenage girls
The parable of the ten teenage girls
 
Hackers The Anarchists Of Our Time
Hackers The Anarchists Of Our TimeHackers The Anarchists Of Our Time
Hackers The Anarchists Of Our Time
 
The Teenage Girl as Consumer and Communicator
The Teenage Girl as Consumer and CommunicatorThe Teenage Girl as Consumer and Communicator
The Teenage Girl as Consumer and Communicator
 
Online Security for Kids
Online Security for KidsOnline Security for Kids
Online Security for Kids
 
Peer to Peer Teen Dating Violence Prevention Training
Peer to Peer Teen Dating Violence Prevention TrainingPeer to Peer Teen Dating Violence Prevention Training
Peer to Peer Teen Dating Violence Prevention Training
 
Privacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to coursePrivacy and Security in Online Social Media : Intro to course
Privacy and Security in Online Social Media : Intro to course
 
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2Privacy and Security in Online Social Media : Policing and Social Media - Part 2
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
 
Are You a Hacker's Target?
Are You a Hacker's Target?Are You a Hacker's Target?
Are You a Hacker's Target?
 
Hack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the UserHack the Hackers 2012: Client Side Hacking – Targeting the User
Hack the Hackers 2012: Client Side Hacking – Targeting the User
 
hackers
hackershackers
hackers
 
4G LTE Security - What hackers know?
4G LTE Security - What hackers know?4G LTE Security - What hackers know?
4G LTE Security - What hackers know?
 
Online Security
Online SecurityOnline Security
Online Security
 
Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016Hackers and Hacking a brief overview 5-26-2016
Hackers and Hacking a brief overview 5-26-2016
 
Internet privacy ethics and online security
Internet privacy ethics and online securityInternet privacy ethics and online security
Internet privacy ethics and online security
 

Ähnlich wie Hackers and Harm Reduction / 29c3 / CCC

The Flyers #flushyourmeds
The Flyers #flushyourmedsThe Flyers #flushyourmeds
The Flyers #flushyourmedsflushmeds
 
Protective Protocals for Sheepdog Professionals
Protective Protocals for Sheepdog ProfessionalsProtective Protocals for Sheepdog Professionals
Protective Protocals for Sheepdog ProfessionalsStanley White
 
Racial Discrimination Essay
Racial Discrimination EssayRacial Discrimination Essay
Racial Discrimination EssayTia Chen
 
The Unknown
The UnknownThe Unknown
The Unknownfubu233
 
Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...
Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...
Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...CrimsonPublishersTNN
 
Whistle blowing----Jin Xu
Whistle blowing----Jin XuWhistle blowing----Jin Xu
Whistle blowing----Jin XuTruking
 
Expository Essays Topics.pdf
Expository Essays Topics.pdfExpository Essays Topics.pdf
Expository Essays Topics.pdfTiffany Rodriguez
 
Understanding Hate Crimes And Recognizing Victims
Understanding Hate Crimes And Recognizing VictimsUnderstanding Hate Crimes And Recognizing Victims
Understanding Hate Crimes And Recognizing VictimsJennifer York
 
Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...
Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...
Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...Quenby Wilcox
 
Essay On Politics.pdf
Essay On Politics.pdfEssay On Politics.pdf
Essay On Politics.pdfEvelin Santos
 
Essay On Politics. Essay on International Relations International Relations ...
Essay On Politics. Essay on International Relations  International Relations ...Essay On Politics. Essay on International Relations  International Relations ...
Essay On Politics. Essay on International Relations International Relations ...Amanda Harris
 

Ähnlich wie Hackers and Harm Reduction / 29c3 / CCC (12)

The Flyers #flushyourmeds
The Flyers #flushyourmedsThe Flyers #flushyourmeds
The Flyers #flushyourmeds
 
Protective Protocals for Sheepdog Professionals
Protective Protocals for Sheepdog ProfessionalsProtective Protocals for Sheepdog Professionals
Protective Protocals for Sheepdog Professionals
 
Racial Discrimination Essay
Racial Discrimination EssayRacial Discrimination Essay
Racial Discrimination Essay
 
Crime definition
Crime definitionCrime definition
Crime definition
 
The Unknown
The UnknownThe Unknown
The Unknown
 
Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...
Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...
Serial Social Media Psychopathy-Identifying a Novel Social Media Phenomena_Cr...
 
Whistle blowing----Jin Xu
Whistle blowing----Jin XuWhistle blowing----Jin Xu
Whistle blowing----Jin Xu
 
Expository Essays Topics.pdf
Expository Essays Topics.pdfExpository Essays Topics.pdf
Expository Essays Topics.pdf
 
Understanding Hate Crimes And Recognizing Victims
Understanding Hate Crimes And Recognizing VictimsUnderstanding Hate Crimes And Recognizing Victims
Understanding Hate Crimes And Recognizing Victims
 
Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...
Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...
Feb. '14 Family Courts in Crisis - (judicial corruption, human rights violati...
 
Essay On Politics.pdf
Essay On Politics.pdfEssay On Politics.pdf
Essay On Politics.pdf
 
Essay On Politics. Essay on International Relations International Relations ...
Essay On Politics. Essay on International Relations  International Relations ...Essay On Politics. Essay on International Relations  International Relations ...
Essay On Politics. Essay on International Relations International Relations ...
 

Kürzlich hochgeladen

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 

Kürzlich hochgeladen (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Hackers and Harm Reduction / 29c3 / CCC

  • 1. hackers as a high-risk population @violetblue
  • 2. Harm reduction methodology Ways to use it Hackers at risk
  • 3. Harm reduction Harm reduction typically refers to a range of controversial public health policy strategies designed to reduce harmful consequences associated with human behaviors, specifically risky or illegal behaviors. Conventional criticism of harm reduction is that any tolerance of illegal or risky behavior is a demonstration to society that the risky and illegal behaviors are acceptable. And possibly even fun.
  • 4. SFSI.org SFSI.org is a nonprofit that provides confidential and anonymous sex crisis counseling, as well as training for medical professionals, clinic workers and caregivers. * Instances include physical trauma and accidents, birth control counseling, gender and orientation crises after sex acts, sexual risk events, taboo or illegal sex acts. * SFSI methodology applies harm reduction by suspending judgment, and communicating facts and available choices.
  • 5. Complex Humanitarian Emergency Training UCSF's Global Health Master's Program, emergency and crisis trial training for NGO workers, specifically field nurses and doctors. Live-action simulation of field confrontation in situations such as wilderness training, media training, Geneva Convention training risk assessment situations.
  • 6. Homeless youth outreach As a former homeless teen I was asked by a group of neighborhood business associations to moderate forums between neighborhood residents and the homeless youth of Haight (San Francisco), and explain the harm reduction approaches taken by neighborhood homeless youth outreach organizations. The work: facilitating discussions between neighborhood residents and homeless youth, harm reduction outreach organizations (Larkin Street Youth).
  • 7. Hackers are the embodiment of disobeying the security regime. You are uniquely suited to be at-risk to yourselves.
  • 8. Ilya Zhitomirskiy "Those putting their reputations on the line, investing so much heart, soul, time, energy and money in these ventures are engaging in high stakes behavior. It makes sense to me that there is great potential to fall to very low places after investing so much and believing so much in something." --Dr. Keely Kolmes, Psy.D.
  • 9.
  • 10. "Are hackers cognitively different?" Female and Male Hacker Conferences Attendees: Their Autism-Spectrum Quotient (AQ) Scores (2011; pub 2012) -Bernadette H. Schell, Ph. D. / June Melnychuk, Ph. D. Teams distributed eight-page surveys at Black Hat and Defcon (2005, 2006, 2007), HOPE 2006, the 2005 Executive Women's Forum for IT Security, and the 2006 IBM CASCON conference. It is the first psychological study to be performed on non- incarcerated hackers.
  • 11. The results were middle-ground, with no push toward one extreme of Asperger's prevalence one way or the other. According to the study, new research suggests that those labeled as Asperger's syndrome individuals may not be "unfeeling geeks" or emotionally and socially deficient. The Intense World Theory sees the core issue in autism-spectrum disorders as not being a lack of empathy or feeling -- but instead these individuals are having a hypersensitivity-to-affective-experience issue. Meaning, they feel "too much" in a room full of people and the information comes in too fast than can be comfortably processed. This person would combat social anxiety by focusing on details and switching attention, pulling back in a way that appears to be callous or disengaged but is actually a coping mechanism for overwhelming feelings, and choosing to hide their own.
  • 12. Hacking is a complicated gift.
  • 13. * Legal risks. * Fighting common misperceptions between information sharing and advocacy. * Lack of support system. * Can't ask for help. * Outcasts to society and companies. * Fighting indifferent institutions. * Limited communications. * Hackers are culturally diverse; may not be working in same language of targets, unknowns, or allies. * Some hackers are more at risk than others (exceptional talent, access). * High stakes: the high profileness of the info that you have to contain adds a different level of pressure. * Inner risks: solitary nature of hacking - isolation, depression, impostor syndrome. * Hackers do things that affect hundreds, thousands of people (often more). * A moral universe where you're either a player or you get played; you're owning or getting owned.
  • 14. The long term effects of being secret keepers.
  • 15. Actions and acts of hacking put the hacker at risk. Actions and acts of hacking put the hacker's communities at risk. Actions and acts of hacking put external people (individuals, communities, vulnerable populations) at risk.
  • 16. lessons from the streets The code of the streets is a protective mechanism that serves to protect gangsters from arrest as they violate legal codes, but operates in a dual purpose to protect the gangsters and those they care about. A 'code' puts the focus on individuality as opposed to societally imposed labels. The most simplified street code is this: Make paper. Stay fresh. Don't snitch.
  • 17. The most detailed explanation of street code was in the portrayal of notorious real-life gangster Donnie Andrews, as depicted through the character Omar Little in HBO’s The Wire. The underlying theme of the show was Omar's belief that "a man's gotta have a code." This contrasted perceptions of a character who was seen on the outside as a sawed-off shotgun toting terror, and a double-crossing mastermind who outsmarted both the biggest drug dealers and police time and time again.
  • 18. * Omar is careful to distinguish between players and citizens. * He never robs or murders people who are not involved in the drug trade. * His code is not to hurt anyone who is not already in the game. * Sunday is off limits for killing and robbing. * Bad people deserve to be punished. * Truth can’t be subverted to punish bad people. * No talking on phones about business. * No loose talk. * Defend yourself whenever necessary. * Look out for your own. * Recon is required: he will scout out a location, sometimes for days, making sure he knows everything about it before he will make his strike. * Stay sharp: he talks often about how one must do difficult jobs, so as to keep their senses sharpened, their wits too. * You live by the gun, accept you'll die by the gun. * Never get high on your own supply. * Don't snitch.
  • 19. Instances ● Anonymity policies: perfect example of failure to reduce harm. ● Transparency/disclosure No one listens to hackers. RainForestPuppy: good example of harm reduction. ● Hacker "gentleman's agreements" another good example: reduces risk of a bigger threat to both entities, to limit behavior that is bad for business. ● Hacktivism; the use of communication tools by activists and countermovements - “Telling activists not to use centralized email and social media platforms is about as useful as telling teenagers not to use drugs.” See also: OpSec for Hackers by grugq.
  • 21. hackers as a high-risk population @violetblue