Making the internet a secure and safe place is a huge industry today, mainly because we need to stay ahead of hackers who have bad intentions. But not all hackers are bad! There are different types: white hats are the good guys, black hats are the bad guys, and gray hats are somewhere in between.
My friend Sammy Camar is one of the good guys. He got interested in hacking and technology when he was just 10 years old. His mom spent all she had to buy him his first computer. On the first day, he set up the internet and had an amazing time. He went online to look up information about the X-Files, a show he loved. He found a chat room to talk about it, but someone told him to leave. He stayed anyway, and suddenly, his computer crashed. He was scared but also thought it was the coolest thing ever and wanted to learn how to do it.
Back in the mid-90s, hacking was different from what it is today. It was more about curiosity than causing harm. Sammy, who was still too young to drink, figured out how to hack into Myspace, an early social media site. He created a worm that spread quickly, making everyone who visited his page see “Sammy is my hero” on their profiles. Myspace had to shut down their site for a day. While Myspace didn’t go after him, the government did, and he had to agree not to use a computer for three years.
Now, Sammy works by finding weaknesses in technology products like smart fridges, cars, and baby monitors. Everything we use has technology, from our garage doors to our cars. Sammy’s job is to understand how these systems should work and find out how they might not work as intended.
Sammy is part of a growing group of young white hat hackers who are hired to break into systems and fix their weaknesses. Companies often offer cash rewards, known as bug bounties, to those who can find these hidden problems. Platforms like HackerOne connect talented people to these tasks.
It’s important to stop thinking of hacking as only a criminal activity. The hacking community includes software engineers, hobbyists, academics, and security researchers. For example, Microsoft once paid a bounty to a five-year-old who bypassed parental controls on an Xbox, and Google did the same for a seven-year-old.
In one case, Uber’s bug bounty program involved a hacker named MDV working with Uber’s security team to discuss a potential issue. The conversation was friendly and cooperative, which is how companies should respond.
This cooperation is great to see, but it’s necessary because vulnerabilities can be serious. What keeps a white hat hacker from turning bad if they find a big vulnerability? The same things that keep a local doctor from doing something wrong: ethics, laws, and personal morals. Most people won’t misuse their knowledge, and as long as we’re ready for those who might, we can manage the risks.
Technology has been around since ancient times, but now it allows criminals to automate their attacks and reach more people. Someone in Eastern Europe can attack someone in the United States with little effort, which makes today’s digital world very different.
Imagine you are a white hat hacker like Sammy Camar. Create a scenario where you discover a vulnerability in a popular app. Write a short script or perform a skit with your classmates, showing how you would responsibly report the issue to the company and help them fix it. This will help you understand the ethical responsibilities of a white hat hacker.
Choose a famous ethical hacker or a significant hacking event from history. Research their contributions to cybersecurity and prepare a presentation for the class. Focus on how their actions have helped improve digital security and what lessons can be learned from their experiences.
Work in groups to design a mock bug bounty program for a fictional company. Decide what types of vulnerabilities you would want to find, how you would reward ethical hackers, and how you would ensure the security of your company’s systems. Present your program to the class and discuss the importance of such initiatives.
Participate in a class debate on the topic: “Is hacking a crime or a contribution to society?” Prepare arguments for both sides, considering the roles of white hat, black hat, and gray hat hackers. This will help you explore the ethical and legal aspects of hacking.
Research and explore different cybersecurity tools used by ethical hackers, such as penetration testing software or network security scanners. Create a poster or infographic that explains how these tools work and how they help protect digital systems. Share your findings with the class to enhance everyone’s understanding of cybersecurity measures.
Here’s a sanitized version of the provided YouTube transcript:
—
Trying to make the internet secure and a safe place has become a billion-dollar industry, primarily designed to stay one step ahead of malicious hackers. You’ll notice I mentioned malicious hackers because hackers come in different categories: white hats are the good guys, black hats are the bad guys, and gray hats fall somewhere in between.
My friend Sammy Camar is one of the good guys. He got into hacking and technology when he was around 10 years old. His mom spent everything she had to get him his first computer. On the first day, he set up the internet and had one of the best days of his life. He went online and started searching for information about the X-Files, one of his favorite shows. He found a chat room to discuss it, but when he entered, someone told him to leave. Despite the warning, he stayed, and shortly after, his computer crashed. He was scared that the computer was destroyed, but he also thought it was the coolest thing ever and wanted to learn how to do it.
Hacking in the mid-90s was very different from what people associate with it today. There was no malicious intent; it was driven by intellectual curiosity. Sammy, who was not even old enough to drink at the time, figured out how to hack into Myspace, a popular early social media site. When he was done, everyone who visited his Myspace page ended up with the phrase “Sammy is my hero” on their profiles. Essentially, he created a worm or virus that spread widely, forcing Myspace to take their entire site down within 24 hours. While Myspace didn’t pursue him, the government did, leading to a plea agreement that prevented him from touching a computer for three years.
Now, Sammy makes a living looking for vulnerabilities in online-enabled products like refrigerators, cars, and baby monitors. Everything we have has technology, whether it’s your garage, car, or door lock. He aims to understand how these systems are supposed to work and how they might not work as intended.
Sammy is part of a growing international workforce of young white hat hackers hired to break into systems and close their loopholes. Companies looking to identify hard-to-spot vulnerabilities often offer cash rewards called bug bounties. Platforms like HackerOne connect talented individuals to these tasks.
It’s important to stop thinking of hacking as solely related to criminal activity. The community is diverse, including software engineers, hobbyists, academics, and security researchers. For instance, Microsoft has paid a bounty to a five-year-old hacker who bypassed parental controls on an Xbox, and Google has done the same for a seven-year-old.
In one example, Uber’s bug bounty program involved a hacker named MDV engaging with a member of the Uber security team to discuss a potential issue he found. The conversation was friendly and cooperative, which is the ideal response from a company.
This kind of cooperation is positive to see, but it wouldn’t be necessary if vulnerabilities weren’t serious. What stops a white hat hacker from turning bad if they find a significant vulnerability? The same principles that prevent a local doctor from engaging in unethical practices apply here: ethics, legal codes, and individual moral character. The number of individuals who would misuse their knowledge for malicious intent is relatively small, and as long as we are prepared for them, we can manage the risks.
Technology has been around since the dawn of civilization, and it allows criminals to automate their attacks and scale them. Now, someone in Eastern Europe can attack someone in the United States with minimal effort and repercussions, which is what makes the current landscape so different.
—
This version removes any inappropriate language and maintains the essence of the original content.
Hacking – The act of breaking into a computer system to access data or information without permission. – Example sentence: The company improved its defenses to prevent hacking attempts on its network.
Hackers – Individuals who use their technical skills to gain unauthorized access to computer systems. – Example sentence: Hackers often target weak passwords to break into accounts.
Technology – The application of scientific knowledge for practical purposes, especially in industry and computing. – Example sentence: Advances in technology have made it easier to communicate with people around the world.
Vulnerabilities – Weaknesses in a computer system that can be exploited by hackers to gain unauthorized access. – Example sentence: Regular software updates help fix vulnerabilities that could be exploited by cybercriminals.
Ethics – Principles that govern a person’s behavior, especially regarding what is right and wrong in the digital world. – Example sentence: Understanding ethics is important for anyone working in cybersecurity to ensure they protect user privacy.
Security – Measures taken to protect a computer system against unauthorized access or attack. – Example sentence: Installing antivirus software is a basic step in improving your computer’s security.
Systems – Collections of hardware and software that work together to perform specific tasks. – Example sentence: The school’s computer systems were upgraded to handle more students accessing online classes.
Internet – A global network of computers that allows people to communicate and share information. – Example sentence: The internet is a valuable resource for students researching their school projects.
Cooperation – Working together towards a common goal, especially in solving cybersecurity issues. – Example sentence: Cooperation between different organizations is crucial to combat cyber threats effectively.
Software – Programs and other operating information used by a computer. – Example sentence: Developers are constantly updating software to improve functionality and security.