Skip to main content

Ex NSA And Ex Unit 8200 Spies

http://www.forbes.com/sites/kashmirhill/2014/09/10/meet-the-ex-nsa-and-ex-unit-8200-spies-cashing-in-on-security-fears/

Before Edward Snowden smashed its digital doors wide open, the National Security Agency was seen as the mysterious keeper of an arsenal of dark-voodoo hacking weapons. Now we know the truth: NSA employees are almost too good at what they do–as are their counterparts at Israel’s elite military signal intelligence group, Unit 8200. Unlike people at most government agencies, NSAers and Unit 8200 alums include world experts in their craft, in this case hacking and defending networks and devices. With data breaches now a daily news item, a stint at either agency has become résumé gold for entrepreneurs. Some agency folks are leaving more out of a moral duty to restore some balance back to the private sector. In the last year ex-NSA founders have snagged $9 million for bug-bounty firm Synack, $2.5 million for attack-detection firm Area 1 Security and $10.3 million for e-mail encryption play Virtru. “I think it’s a direct correlation to Snowden,” says Ted Schlein, a veteran cybersecurity venture investor at Kleiner Perkins Caufield & Byers. The path from spy to startup is also in full swing in Israel, where entrepreneurs envy the earlier success of 8200 alums such as Gil Shwed and Marius Nacht, the billionaire cofounders of Check Point Software, and Nir Zuk, founder of Palo Alto Networks (market value: $6.6 billion). Here are some of the more high-profile defectors and players in the spy-versus-spy game.



1. LEV KADYSHEVITCH, Head Of Research, Biocatch
Its algorithms determine the identity of users based on how they interact with apps, exploiting research on human response to certain phenomena, such as the brief disappearance of a mouse cursor. The 8200-alum-packed firm has $14 million in funding.
2. GIORA ENGEL, Cofounder, LightCyber
With his Unit 8200 buddy Michael Mumcuoglu he established LightCyber in 2011 to detect breaches using a network appliance that flags strange-looking traffic. It has raised $12 million to date from VCs and Check Point’s billionaire cofounder Marius Nacht.
3. TED SCHLEIN, Managing Partner, Kleiner Perkins Caufield & Byers
Schlein did not belong to either spy agency but he recognizes their potential. Silicon Valley’s top cybersecurity financier recently backed two NSAer firms: Synack and Area 1 Security. “The portrayal of the NSA doing things that are bad is not making it the hot place to work inside the intelligence community. I think a lot of their creativity is being curtailed,” says Schlein. “As a VC, I think it’s wonderful. As a citizen of the U.S., I’d make a different argument.”
4. LIOR DIV, CEO, CybeReason
The Unit 8200 alum moved his startup from Israel to Boston to tap talent and a bigger market. Its software infers the presence of an attack under way and displays the situation in an easy-to-grasp graphical interface. Div raised $4.6 million earlier this year from Charles River Ventures.
5. JAY KAPLAN and 10. MARK KUHR, Cofounders, Synack
Kaplan, 28, and Kuhr, 30, spent four years in offensive security at NSA’s counterterrorism division, hacking around for weak spots and finding plenty to exploit. They quit early last year and quickly raised $1.5 million to launch Synack, an army of several hundred freelancers who get paid if they find bugs in clients’ codes–except this time the bugs get fixed. “We don’t work for the NSA anymore. We wouldn’t leave a vulnerability or anything like that,” says Kaplan. “But we would turn away China’s elite hacking force as a customer.”
6. ERAN BARAK, CEO and cofounder, Hexadite
Barak was a five-year veteran and officer at Unit 8200 before going into business earlier this year. Hexadite plans to bring automated incident response to the masses. It already has four customers in Israel and the U.S. YL Ventures backed Barak and his colleagues with $2.5 million.
7. OREN FALKOWITZ, Cofounder, Area 1 Security
Falkowitz spent six years at the NSA crunching mountains of data to uncover attacks. He and five colleagues left in 2012 to start Sqrrl, an analytics firm in Boston. He moved to Silicon Valley this year to launch Area 1, which monitors employee clicks and flags any dangerous behavior or deviations. It received $2.5 million in funding in May. “There are lots of mafias out here: PayPal, Palantir. I don’t want to use the word mafia,’ but I want one for NSA grads,” he says. “People who come from there have an innate knowledge that you can’t teach.”
8. ROB SEGER, Cofounder, Morta Security
Seger’s two years in the NSA’s Protocol Exploitation office is not on his LinkedIn profile. He left the agency to consult in 2008 and two years ago started Morta to spot threats already inside a network firewall. “When we told investors we were ex-NSAers interested in going into security, they instantly wanted to give us money,” says Seger. Palo Alto Networks bought the firm this year. “Historically, everyone was fearful of the NSA, but no one actively disliked ex-NSAers. Snowden changed that.”
9. GILI RAANAN, Partner, Sequoia Capital
Raanan, an 8200 alum and VC in Herzliya, Israel, started and sold two security software firms and now funds the 8200 diaspora, with money in Adallom, Mintigo and Seculert. He prizes the talent that the Israel military consistently produces at a young age. “Graduates have the frame of mind that nothing is impossible. It goes beyond the tech, it’s a state of mind for life.”

Comments

Popular posts from this blog

The Difference Between LEGO MINDSTORMS EV3 Home Edition (#31313) and LEGO MINDSTORMS Education EV3 (#45544)

http://robotsquare.com/2013/11/25/difference-between-ev3-home-edition-and-education-ev3/ This article covers the difference between the LEGO MINDSTORMS EV3 Home Edition and LEGO MINDSTORMS Education EV3 products. Other articles in the ‘difference between’ series: * The difference and compatibility between EV3 and NXT ( link ) * The difference between NXT Home Edition and NXT Education products ( link ) One robotics platform, two targets The LEGO MINDSTORMS EV3 robotics platform has been developed for two different target audiences. We have home users (children and hobbyists) and educational users (students and teachers). LEGO has designed a base set for each group, as well as several add on sets. There isn’t a clear line between home users and educational users, though. It’s fine to use the Education set at home, and it’s fine to use the Home Edition set at school. This article aims to clarify the differences between the two product lines so you can decide which

Let’s ban PowerPoint in lectures – it makes students more stupid and professors more boring

https://theconversation.com/lets-ban-powerpoint-in-lectures-it-makes-students-more-stupid-and-professors-more-boring-36183 Reading bullet points off a screen doesn't teach anyone anything. Author Bent Meier Sørensen Professor in Philosophy and Business at Copenhagen Business School Disclosure Statement Bent Meier Sørensen does not work for, consult to, own shares in or receive funding from any company or organisation that would benefit from this article, and has no relevant affiliations. The Conversation is funded by CSIRO, Melbourne, Monash, RMIT, UTS, UWA, ACU, ANU, ASB, Baker IDI, Canberra, CDU, Curtin, Deakin, ECU, Flinders, Griffith, the Harry Perkins Institute, JCU, La Trobe, Massey, Murdoch, Newcastle, UQ, QUT, SAHMRI, Swinburne, Sydney, UNDA, UNE, UniSA, UNSW, USC, USQ, UTAS, UWS, VU and Wollongong.

Building a portable GSM BTS using the Nuand bladeRF, Raspberry Pi and YateBTS (The Definitive and Step by Step Guide)

https://blog.strcpy.info/2016/04/21/building-a-portable-gsm-bts-using-bladerf-raspberry-and-yatebts-the-definitive-guide/ Building a portable GSM BTS using the Nuand bladeRF, Raspberry Pi and YateBTS (The Definitive and Step by Step Guide) I was always amazed when I read articles published by some hackers related to GSM technology. H owever , playing with GSM technologies was not cheap until the arrival of Software Defined Radios (SDRs), besides not being something easy to be implemented. A fter reading various articles related to GSM BTS, I noticed that there were a lot of inconsistent and or incomplete information related to the topic. From this, I decided to write this article, detailing and describing step by step the building process of a portable and operational GSM BTS. Before starting with the “hands on”, I would like to thank all the pioneering Hackers and Researchers who started the studies related to previously closed GSM technology. In particul