If stock photography has taught us one thing it's how to recognise a hacker! But how much do we really know about these shady characters, with their ill-fitting balaclavas and their Windows 7 laptops?
Here's my essential stock photography guide to #cybersecurity...
First things first, hacking has come on leaps and bounds in the last few years. Backing up your sensitive data on C60 cassette and labelling it "Flock of Seagulls Megamix' is no longer enough to keep your information safe!
And hackers are actually very hard to spot. That's because they dress head-to-toe in black (or very very very dark grey) since they live on the Dark Web and want to blend into the background.
What hackers want from you is personal information. No matter how trivial it still has value to them - and they'll go to extrodinarily lengths to get it!
There are many types of hacker. Some are 'crackers': experts at breaking into networks. Their 'tell' is their habit of saying "I'M IN" in a deep voice once they've got past the firewall. Watch out for anyone you don't know using that phrase.
'Keystroke hacking' involves a criminal examine your keyboard in minute detail, often with a magnifying glass, to see which keys have the most pizza grease stains on them. It's only a matter of minutes before they've deduced what your password is.
'Shoulder surfing' is another popular hacker trick to find out your password. The criminal pretends to be examining dandruff on your shoulder, but in reality he's watching you type! Always shield your pin, or wear a blouse with huge shoulder pads to obscure their view.
Sometimes a hacker doesn't even need to be in the same room as you to access your data. He can 'infect' your computer with a virus, from distances of up to 12 feet. Popular viruses include worms, Trojans and spywear. Always wipe your screen with disinfectant to protect yourself.
Ransomwear is also a frequent hacker tactic. Instead of stealing your data they lock your computer and charge you several 'bit coins' to unlock it. Fortunately bitcoin looks like chocolate money, so try paying them with that: it's probably worth more now.
I know, traditionally we used to protect our computers by leaving a padlock on the keyboard, telling the hacker that we're wise to their tricks. However modern cyber criminals can by special 'keys' from the internet to unlock these. Nowadays you have to be more vigilant.
So to be safe online:
- Never share your computer with your family.
- Don't open emails if they look interesting.
- Always forget your password.
- If in doubt for God's sake don't click anything!
Hackers normally celebrate their success by doing the 'Hacker Haka', a traditional dance involving stamping of the feet and partitioning of the C drive. So if you don't want to cause their next celebration you'd best heed my #CyberSecurity hints!
The internet is very complex and can easily trap the unwary. So if you're still worried about 'netting' try mastering teletext first, or typing numbers into a calculator: it's much safer than making a big mistake online.
Stay safe everyone...
• • •
Missing some Tweet in this thread? You can try to
force a refresh
In the shadowy corners of the shortwave spectrum lurk the Numbers Stations: strange radio broadcasts of mysterious blocks of numbers in creepy monotone voices!
It's actually an old form of spycraft which is still in use today. Let's take a listen...
A Numbers Station is a type of one-way voice link for sending information to spies in foreign countries. Operating on Short Wave radio bands they transmit a secret code of spoken numbers.
Use of Numbers Stations peaked during the Cold War, but some are still operating today.
Numbers Stations are operated by various national intelligence agencies. At set times on a pre-arranged frequency a musical tone is played, followed by a speech synthesised voice reading out blocks of numbers. To most listeners it sounds both creepy and meaningless.
Today in pulp I revisit a mystery of the recent past: did ‘John Titor’ really travel back in time from 2038 to the year 2000 to warn us about an apocalyptic future? And why was he so keen on getting his hands on a 1975 IBM 5100 computer?
Let’s find out...
In 1998, US radio talk-show host Art Bell read out a fax from a man claiming to be from the future. Two years later the same man, calling himself Time_Traveler_0, left similar messages on the Time Travel Instutute’s internet forum.
They told a strange tale…
“Greetings. I am a time traveler from the year 2036. I am on my way home after getting an IBM 5100 computer system from the year 1975.”
For the next two years Time_Traveler_0, now calling himself John Titor, would leave many similar messages on internet forums.
The Bawdyguard, by John Dexter. Nightstand Books, 1971.
'John Dexter' didn't actually exist. It was a house alias - along with J X Williams - for a range of writers knocking out cheesy sex pulp for Greenleaf publishing. At least 20% of each novel had to be sex scenes with the other 80% titillation, voyeurism or padding. Not much space for character arcs or a hero's journey...
Greenleaf initially specialized in sci-fi magazines, until they discovered sex was selling better. A number of writers were quietly supplying novels for both scenes. Robert Silverberg, Harlan Ellison and Donald E Westlake all provides pseudonymous sex novels for the publisher.
Case 32: High Marks For Malice (1989). Nordic knits always work and they're great for detectives. Pastels are very flattering but you'll need a good lint roller if it's a long case you're investigating. This is a clear fashion win.
Case 51: A Model Crime (1990). Gold is a hard colour to pull off, but the details are on point here: single button and shoulder pads make it a power look and Nancy has sensibly avoided the '90s waitcoat trend. Another win.