avatarTeri Radichel

Summary

Teri Radichel reflects on the influence of the Cult of the Dead Cow (CDC) on cybersecurity culture and her personal journey in technology, despite not being part of such groups in her youth.

Abstract

Teri Radichel shares her reflections on reading "Cult of the Dead Cow," a book that stirs nostalgia and a sense of missed opportunity from her childhood when she was unaware of bulletin board systems and groups like the CDC. She contrasts her own upbringing, with strict rules and a lack of like-minded peers, to the experiences of the CDC members. Despite these challenges, Radichel developed a passion for technology and cybersecurity, eventually connecting with key figures in the field through social media and professional networks. She emphasizes the importance of community, even if it's through modern platforms like Twitter, in fostering a shared interest in security and technology. Radichel's story is one of accidental entry into cybersecurity, persistence, and the belief that one can contribute to the field at any stage in life.

Opinions

  • Radichel expresses a sense of jealousy and wonder about what might have been had she connected with computer groups like the CDC in her youth.
  • She acknowledges the role of strict parenting and geographical isolation in shaping her early experiences with technology.
  • Radichel values the connections made through social media and professional networks, viewing them as modern equivalents to bulletin board systems.
  • She admires the CDC members and other historical figures in cybersecurity, such as those from the L0pht, for their contributions and influence on the industry.
  • Radichel is inspired by the stories and individuals she has encountered in her career, including Marcus Hutchins, and sees Twitter as a platform that fosters a sense of community among security experts and enthusiasts.
  • She believes that her background, despite not being part of a well-known hacker group, has positioned her to make a meaningful impact in the fight against cybercrime.
  • Radichel identifies with the figure of Mudge from the CDC, appreciating his approach to security work that balances technical mastery with adherence to legal boundaries.

Cult of the Dead Cow

A taste of cybersecurity history and culture

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

🔒 Related Stories: Data Breaches | Security Books

💻 Free Content on Jobs in Cybersecurity | ✉️ Sign up for the Email List

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

I recently read the book, Cult of the Dead Cow. As I was reading it, I felt a little jealous. I remember having the same feeling when I read about Jobs and Wozniak tinkering with electronics at a young age. I was learning about computers during the same period these kids were creating their bulletin boards, but I never got involved in any of these groups. How could they connect when I could not? There were no other nerdy kids around. I didn’t know about bulletin boards and couldn’t get online if I wanted.

Like members of the CDC, I grew up with limitations related to long-distance in a small town where my parents prohibited using the modem due to the associated cost. In my household, things were pretty strict. I’m not sure I would have participated in all the CDC activities as a result. Some questionable activities existed during the gap when computers were just coming out, and no laws existed regarding their use. As for phreaking, something the book explains, I wouldn’t dare touch the modem, let alone get involved in that. The repercussions would be painful. We lived far from town and movie theaters, so sadly, I only saw War Games a few years ago. It came out around the same time I taught myself to program from a book.

I always wonder…what if I had watched War Games back then? Would it have inspired me to try to somehow get access to that modem that was off-limits? Would I have found a way to connect with other kids messing around with computers outside of my small town in Washington state?

It’s interesting to me that some of the major tech companies like Amazon, Google, and Microsoft sprung up in Seattle and San Francisco, but the CDC started in Texas, and a major hacking hub sprung up in Boston. Other cities make an appearance later in the book. It probably wouldn’t have mattered if there were kids geeking out in Seattle because that was a foreign land to me. The “local” news people on TV who lived over an hour away talked about weather and events there that didn’t pertain to us. It was the place we journeyed to every so often when the relatives came to visit to see Pike Place Market, the Space Needle, and ride the now non-existent trolley on the waterfront.

Maybe if I had met someone like the CDC members when I grew up, I would have not taken a hiatus from computers when I didn’t know what to do next. Who knows? Perhaps not having this connection led me to do things I would not have done if I had my nose buried in a computer the whole time. In grade school, I mostly interacted with a couple of girls I went to school with, and the neighbor girls. My parents sent me to small private schools. I had three people class from 5th to 8th grade.

The girls from school and I were so different. Their mom was Filipino. Their dad met her in the military. These girls were short, petite, and cute. I was tall and felt like a giraffe when I stood next to them. They were girlie. I was nerdy, though I attempted to be a bit girlie at some points, reading the latest teen fashion magazines. We used to play in their mom’s craft store out in the middle of the woods in an old, run-down house. I liked making things with all materials strewn about the store. There wasn’t anyone actively at the store handling the cash register. I never saw it open and wondered if anyone ever bought anything there. It made me think about running a business someday.

The neighbor girls and I had little in common except that we were in the same 4-H club and went horseback riding together. We had some bonding moments, like when we stayed out a bit too late on the military reservation in the dark, at which point my parents called search and rescue. We ended up riding through a group of soldiers with tents and campfires. They were friendly and said hi to us as we nervously moseyed through. My parents should have known the horses always knew the way home, and we met them on the road back. The neighbor girls also had an Atari on which we played Pong and Space Invaders, but that’s about it. For programming or anything more technical, I was on my own with magazines and a book.

I’ve already written about how I got into technology and cyber security in other blog posts and my book. It was all kind of an accident. I always wonder if I would be farther along by now if somehow I had connected with other kids who shared a common interest. Despite the lack of encouragement or connections, technology sucked me in everywhere I went. Somehow I’m still here doing plugging away at computers and security, trying to move things along in the right direction the best I can.

Although I was never a member, as I read the CDC book, I recognized several names. Many people mentioned in the CDC book are on Twitter, and I got connected to them through social media in one way or another. I’ve been researching security for a long time. I discovered many of the people through a shared interest in security and technology. I didn’t know they were part of this group.

Initially, I scoured the Internet and found organizations, mailing lists, and publications that seem to have insight into what was going on in cybersecurity that was not widely known. I read books and eventually, took classes. Sometimes I heard stories that piqued my curiosity. I would investigate those topics further. I learned about the L0pht from Kim Zetter’s book on Stuxtnet. I already thought Mudge and his cohorts who testified in front of congress about the lack of security in technical products were pretty cool by the time I read the CDC book. I followed anyone I could on Twitter from that and other publications that sounded interesting and knowledgeable on security topics.

As I progressed in security, I started attending conferences. I followed people who gave compelling talks. I searched around online for other people posting security research. I obtained names and handles through presentations and articles with security insights and connections of connections. My search led me to many intriguing people.

I found the account with a picture of a fat cat wearing glasses who seemed pretty smart. He posted things about reversing malware, something that I had just gotten certified to do and was trying to learn more about it. Later, that turned out to be Marcus Hutchins, who stopped the infamous WannaCry virus and became somewhat of a celebrity. Soon after, he had a run-in with the FBI. I followed the whole story as it progressed, probably with greater interest due to the Twitter connection. Sometimes Twitter makes you feel like you know people, even if they have no idea who you are.

Perhaps Twitter has become the security community I lacked as a kid. Twitter and blog posts are the new bulletin board. It’s the online community of experts and noobs sharing research and ideas. And yes, sometimes drama. If you’re not on Twitter, it’s an excellent place to find real-time information on the latest cybersecurity threats and security research. I may not always know people personally I follow on Twitter, but I know their work. I read their tweets, blog posts, research, and watch their presentations to learn more about the topics I research. Sometimes, if I’m lucky, I meet them in person.

When I was speaking at conferences (before this crazy coronavirus), I was fortunate enough to bump into some kindred spirits. I don’t talk to them too often because we live far apart, but occasionally we jump on the phone or send each other a note to catch up. It’s always nice to have someone around who can relate to your struggles and listen to your nerdy tech talk. I’ve also had the great fortune to hang out and making friends with other AWS heroes from around the world as a member of that group. I’m also grateful for the opportunity to work with some brilliant people that I still keep in touch with even as I run my own security company.

Although I can’t help wishing that sometimes that I, too, had been in a nerdy computer group back in the day, my story goes to show that no matter where you came from, you can get involved and any point. And if I’m lucky, hopefully, I can make a difference in the fight against cybercriminals — this last point possibly making me different from some participating in certain activities in the CDC book. I’d say out of all the characters I most relate to Mudge, though I am nowhere near as smart! I just like his attitude of working in, with, and against the machine without crossing legal lines that get himself into trouble. The goal: to make the cyber world a better, safer place.

Follow for updates.

Teri Radichel | © 2nd Sight Lab 2020

About Teri Radichel:
~~~~~~~~~~~~~~~~~~~~
⭐️ Author: Cybersecurity Books
⭐️ Presentations: Presentations by Teri Radichel
⭐️ Recognition: SANS Award, AWS Security Hero, IANS Faculty
⭐️ Certifications: SANS ~ GSE 240
⭐️ Education: BA Business, Master of Software Engineering, Master of Infosec
⭐️ Company: Penetration Tests, Assessments, Phone Consulting ~ 2nd Sight Lab
Need Help With Cybersecurity, Cloud, or Application Security?
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
🔒 Request a penetration test or security assessment
🔒 Schedule a consulting call
🔒 Cybersecurity Speaker for Presentation
Follow for more stories like this:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 
❤️ Sign Up my Medium Email List
❤️ Twitter: @teriradichel
❤️ LinkedIn: https://www.linkedin.com/in/teriradichel
❤️ Mastodon: @teriradichel@infosec.exchange
❤️ Facebook: 2nd Sight Lab
❤️ YouTube: @2ndsightlab
Cult Of The Dead Cow
Cybersecurity
Security
Hacking
Hackers
Recommended from ReadMedium