SCENE: Early morning. College campus, student center. JOE and TED sit in folding chairs behind a card table with a sign taped in front: "Job Recruiters." JOE and TED are big men, arms folded, clean cut, dark suits. LARRY, an older student, approaches.
LARRY: What's the gig?
JOE: We're with the FBI. We're looking for recruits who know a lot about computers.
LARRY: Sure, I know a lot about computers.
TED: Do you know anything about security vulnerabilities on the Net?
LARRY: I know Windows is full of them.
JOE: Would you be willing to take some tests at FBI headquarters?
LARRY: You mean like push-ups and shooting guns, that kind of thing?
TED: Something like that.
LARRY: I'd love to help you out, but I've got a job with Google as soon as I graduate.
SCENE: Late afternoon. A high school gymnasium. JOE and TED sit in folding chairs behind a card table, under a sign that says "Career Day." JAYSON, a young student, approaches.
JAYSON: Who are you?
JOE: We're with the FBI. We're looking for special kids who know a lot about computers.
JAYSON: I know about computers.
TED: Do you know about the bad men who do bad things on the Internet?
JAYSON: Is that a trick question?
JOE: Do you know how to write software?
JAYSON: Nothing pretty, but I can throw down some code.
JOE: Do you know what a Trojan horse is?
JAYSON: You mean, like, Greeks bearing gifts, that Homer stuff?
TED: No, like a virus or a worm.
JAYSON: And the reason I would admit to writing an Internet worm is ... ?
JOE: Cybercrime is getting out of hand. The FBI needs help keeping up with the increasing fraud and threats.
JAYSON: You're in luck. After school, I run an Internet security company. Me and my homies can fix you right up. Here's my card. But I warn you, we don't come cheap.
SCENE: Midday. Middle school playground. JOE and TED, in sunglasses, sit on folding chairs behind a card table at the far end of the playground. ALEXIS, a young girl, approaches.
ALEXIS: What are you doing here?
JOE: We're with the FBI. We're looking for special kids who know something about computers.
ALEXIS: My sister and I run a video Web site for our friends.
TED: Do you know about the mean men on the Internet?
ALEXIS: Like AOL and the music industry?
JOE: No, like bad men who send bad things into your computer over the Internet.
ALEXIS: Our firewall filters most of that junk.
TED: Would you be willing to go to Washington?
ALEXIS: Lunchtime is almost over. I've got to get back to class. Nice talking with you. Bye.
If you've got the right stuff, and you know a phishing scheme from a fly rod, the FBI is looking for you. If you've got an industry tip, send it to email@example.com, or call 516-562-5326.
To discuss this column with other readers, please visit John Soat's forum.
To find out more about John Soat, please visit his page.
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.