I can honestly say that I have overall kept my hands clean. I may have copies of Chuck on my PC, but I have an Amazon Prime subscription too and in the past I have always had cable. It’s just an extension of the Hopper DVR, that’s all. I can honestly justify my use case to myself if anything, as I had my TV connected to my PC to drag movies over. I also had a run-in with cable boxes and DirectTV via a BBB complaint over misleading advertising.
Some of my old friends are “afraid” to visit any website I send them, but I’ve never hacked in that way. Now, I might have turned on the parental controls on their phones, but I paid for them. (Don’t tell them. They never read anything I post anyway)
Why Black Hat Hackers Sometimes Can’t Get Security Clearances
If you’re like many of my scientist, engineer, and computer expert clients, your hobbies and personal habits outside of work are, well, interesting. To be clear, I am not passing judgment. I actually say this with a sense of admiration, considering my own lack of technological prowess. But I sometimes find myself reminding these same clients that their recreational activities can raise eyebrows from the rest of us – including federal security officials. Here are a few examples that my “tech-y” friends would do well to keep in mind:
Long gone are the days of Napster and the general unawareness that file sharing copyrighted material was illegal. Now, many of my clients are being called to the carpet for this behavior – especially at the National Security Agency (NSA), which has an intense infatuation with this issue. If you have in the past downloaded anything illegally, make like Anthony Weiner and “hard delete” those files immediately. Then stop doing this! When the issue comes up later in security processing, as it inevitably will, you can at least say that you no longer have any of the illegally downloaded material in your possession, you have ceased the activity, and you have no future intent to re-start it. I know many of you see no reason why this should be a security concern, but trust me: your pre-polygraph interview is not the time to wax philosophical about what should and should not be in the public domain. I am not exaggerating when I say that roughly a quarter of the intelligence community denial cases I encounter involve illegal downloading.
Hacking The Neighbor's WI-FI
Hacking The Neighbor’s Cable Signal
Hopefully by now you get the point. For reasons that may (or may not) be obvious, federal agencies have deep concerns about any appearance of immoral conduct in the e-realm, despite the fact that these same agencies often need their own defenses tested or require offensive hackers to execute their mission. That rubs many folks’ sense of ethics the wrong way, but I’m only the messenger here and agencies are only implementing their interpretation of the National Adjudicative Guidelines for Security Clearances.
Just remember this: it’s better to be indignant and employed than righteous and broke.
This article is intended as general information only and should not be construed as legal advice. Consult an attorney regarding your specific situation.