lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.21.1905030735140.13785@ip-172-30-0-239.ec2.internal>
Date: Fri, 3 May 2019 07:35:43 +0000 (UTC)
From: InfoSec News <alerts@...osecnews.org>
To: isn@...ts.infosecnews.org
Subject: [Newsletter/Marketing] [ISN] Spot the not-Fed: A day at
 AvengerCon, the Army's answer to hacker conferences

https://arstechnica.com/information-technology/2019/05/spot-the-not-fed-a-day-at-avengercon-the-armys-answer-to-hacker-conferences/

By Sean Gallagher
Ars Technica
5/2/2019

FORT MEADE, Maryland -- Late last year, I was invited to a relatively new 
hacker event in Maryland. Chris Eagle, a well-known researcher in the 
field of malware analysis and author of The IDA Pro Book, keynoted it. 
There were a number of really good talks at all levels of expertise, a 
couple of "Capture the Flag" (CTF) hacking challenges, and all the other 
typical hallmarks of a well-run hacker conference.

But this event, AvengerCon III, proved to be distinct in a number of ways from
the BSides conferences and other events I've attended. The first difference was
that keynote: Eagle, a senior lecturer at the Navy Postgraduate School, shared
some news about an upcoming release of an open reverse engineering tool by
referring to its "unclassified cover name." (The tool was Ghidra, a public
reverse-engineering tool developed by the National Security Agency.) There were
also a lot more people in camouflage than at most hacker events, and my CTF
teammates were military intelligence agents. Perhaps the biggest giveaway that
this wasn't any old hacker event? AvengerCon III was being held on Fort Meade
and hosted by the US Army's 781st Military Intelligence Battalion (Cyber).

Part of the 780th Military Intelligence Brigade, the 781st was once known as the
Army Network Warfare Battalion. It was the first Army unit formed to create a
"cyberspace operations capability" within the Army—conducting offensive and
defensive operations and intelligence collection in support of US forces around
the world. So technically, AvengerCon is not a conference. It's a "training
event," in Army parlance, intended to bring the hacker learning culture to the
Army's cyber warriors.


Hacker insurgency

AvengerCon was the brainchild of Capt. Skyler Onken and Capt. Steve Rogacki.
Until recently, Onken was company commander for Alpha Company 781st Military
Intelligence Battalion, a component of the 780th MI Brigade. He has now moved on
to the US Army Cyber School at Fort Gordon, Georgia. Rogacki is an officer from
a unit at Fort Gordon, Georgia. The two came up with the idea for AvengerCon
while attending DEF CON a few years ago. While sitting at a Johnny Rockets at
the Flamingo Hotel in Las Vegas, Onken said, the two were reveling in the
experience of DEF CON. "It's such great experience just being a part of the
[hacker] community, the things you learn, things you get to try, it gets you
excited," he recalled. "And we were like, 'We wish that the soldiers could get
that.'"

[...]


--
Subscribe to InfoSec News
https://www.infosecnews.org/subscribe-to-infosec-news/
https://twitter.com/infosecnews_

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ