The Maturation Cycle of a Hacker

by lg0p89

Over the years, it has become apparent that there is no such thing as complete computer security.

There is always a flaw somewhere or an opening for an exploit.  For some people, this draws them to our game (to breach the subject's system).  It is the thrill of the chase that brings them back for more and more.  For some, this is for personal gain.  They may code a new virus or exploit.  At some point, because the user is generally the weakest link, access is gained to their email and system.  The subject's login codes are gained, as well as trade secrets.

What would drive someone to do the above mentioned activities?  The hacker starts young.  They are generally drawn to the tech-oriented activities.  This could take the form of electronics or computers.  After their appetite has been whetted, they seek more information and experience with the computer and its ability to reach and touch nearly everyone.  They may, for example, start to show more interest in the local high school's lack of security.  For instance, many years ago, to access the local high school's heating and cooling system, one could dial-in using a modem connected to a handset.  As long as you had the password, the A/C was at your disposal.

The hacker life cycle may be comparable to a tree.  The first is much like the seed being planted.  The hacker begins to be interested in computers.  This may start with video games or other electronica.  They bore with this and move on.  The newly minted hacker may start coding.  They are drawn to this as a basic curiosity.  There are no malevolent thoughts or actions.  They just want to know how it works.  If brazen enough, they may even try to upgrade their rights on a system.

After this area of expertise has been fully explored, the hacker may move forward into the next stage; let's call it the sapling stage.  This is done without thought due to boredom in school, personal pursuits, or other avenues drawing their attention.  They start to enjoy learning more about IT and security.  This is further enhanced as they find systems are not appropriately patched and compromising them would not take all too much work.  They may find this exciting, which only further fuels the fire.

The last stage would be analogous to a mature tree.  The hacker has a good sense of who they are and their self-identity.  They are comfortable spending time with other hackers.  If they don't know something, they are comfortable with asking an associate for a second opinion.

Some people may view this as a bad thing.  The knowledge is more of a tool, void of feelings and intent.  The writer views this more as a positive thing.  The curious mind is ever expanding and creative.

To remove any potential issues, there are ways to help keep the hacker on the more appropriate (i.e., legal) path.  The friends and associates may foster the curiosity and grow this in a positive manner by encouraging them to explore and think about the processes.  The mentor could be helping one of the next STEM generation.  In this, they can guide the hacking.  The parent, if this is the person helping the hacker/child, should not be what the writer calls a DVD parent (gives the child a DVD and tells them to watch; practically uses this as a baby sitter and a way to socialize their child), but should engage them in this.

The potential greatness is limitless.

Return to $2600 Index