Sign In

Communications of the ACM

Contributed articles

Why Computer Talents Become Computer Hackers


Why Computer Talents Become Computer Hackers, illustration

Start with talent and skills driven by curiosity and hormones, constrained only by moral values and judgment.

The full text of this article is premium content


Comments


Rafael Anschau

I think this text is absolutely unjust with hackers. Who said "putting hackers on the line"
is desirable ? Yeah, stifle curiosity, stifle their desire to do things their own
way, mold them to the political economical machine! I wonder what would have been of Bill Gates and Steve Wozniack had they been subjected to such attitude. Often, the capacity to do things your way is more beneficial to people on the long term than any preconceived, imposed career path.


Anonymous

they did forget at least one key motive for hackers. Specifically relating to piracy, society and marketing targets young people and yet at the same time, they forget that young people have limited finances. This means that the psychological methods employed by advertisers for various media create hungry consumers without the resources to fulfill their desire through the means that are condoned by the system. These pirates then turn to other methods of satisfying the desires instilled in them by the creators of the content, such as piracy.


Anonymous

The study lumps a lot of things under one roof. There is a difference between "pirating" a song and cracking into a company system to extract industrial information.

Also, I suspect there are some real cultural differences here. The US and China are very different societies, and any assumed similarities must be taken with care.

Further, the PLA and other parts of the Chinese government look for these kids. See
http://www.techrepublic.com/blog/security/what-the-mandiant-report-reveals-about-the-future-of-cyber-espionage/9112
and
http://intelreport.mandiant.com/Mandiant_APT1_Report.pdf
which explicitly fingers PLA unit 61398 as the unit that has been actively stealing from US countries.


Anonymous

I think part of the problem is that these people are geniuses, and they don't want to work in a scenario where the ones in charge are far, far, far from genius. The non-geniuses also lack the ability to remain objective, so when a genius tells them that they can't get 5 from 2 and 1 just because they used 2 last time to get to 5, they're offended. So geniuses are not desired, and sometimes their reputations are ruined. I'm no genius, but this is a constant theme in my life.


Anonymous

There are some major flaws with this study. First off the range in differing environments was far too small. Since much of what people learn is from their environment people in different areas may respond differently to the events that you have tested. Also six subjects seems like too few to draw an accorate conclusion. I think before any school decides to implement any changes to their policy based on this expirement they should try to first recreate the expirement and see if they get the same results.

Also please use the term cyber criminals instead of hackers when you are referring to criminals. Not all hackers are criminals and it is offensive to put them all under one category.

I do appericate the fact that someone is actually looking into this though and hope that your research will inspire further research.


CACM Administrator

The following letter was published in the Letters to the Editor in the July 2013 CACM (http://cacm.acm.org/magazines/2013/7/165490).
--CACM Administrator

Exploring the malicious hacker problem, Zheng-chuan Xu et al.'s "Why Computer Talents Become Computer Hackers" (Apr. 2013) overlooked many motivations for computer talents becoming computer hackers, due, possibly, to cultural differences between China and the West, as suggested in the article, or just to the authors' limited findings, which were based on interviews with only six known computer hackers in Shanghai. Moreover, the article did not distinguish between hackers who ethically go to extremes of computing and malicious hackers willing to do harm to achieve their goals.

My own research at SRI International, 19711995, funded by the U.S. National Science Foundation, U.S. Department of Defense, and U.S. Department of Justice, involved interviews with more than 100 notorious malicious computer hackers in the U.S. and Western Europe. That work was documented in case studies in my books Crime by Computer (1976) and Fighting Computer Crime (1983), both published by Charles Scribner's Sons, Inc. Malicious hacking is still motivated in much the same way as it always has been, starting with phone phreaking in the 1960s.

One significant motivation the article clearly overlooked is that some young hackers are looking for shortcuts to a high-paying career in information technology without first undergoing a formal education. Such an irrational strategy typically concentrates on learning from manuals, the Web, personal experimentation, and experienced hackers, as noted in the article, believing that if they engage in sufficiently outrageous but brilliant conduct, with ends justifying means, as was done by some highly publicized malicious hackers before them, they will be noticed by their victims and hired at high pay to protect society from further harm.

My own interviews revealed many kinds of deviant behavior associated with ready access to the powerful, pervasive, vulnerable, fragile information technology at the heart of almost every organization's and user's operations, including negativism, delusions of grandeur, infantile ideals, grandiose, overt behavior, frequent regressions, compensatory mechanisms, peer pressure, fragile ego, irrationality, antisocial behavior, poor grooming and personal habits, unhealthy diet, use of alcohol and drugs, squalid living, disrespect for authority, deception, thievery and burglary, piracy, extortion, endangerment, misuse, abuse, negligence, sabotage, espionage, misrepresentation, intimidation, physical and mental violence, bullying as subject and object, autism, idiot-savantism, sibling rivalry, reaction to parental aberrations and broken homes, hero worship, sexual excess, attention deficit disorder, and more.

I agree with the findings in the article as far as they went, that "...hacker candidates encounter porous security, are tolerated by some academics, and are encouraged by like-minded individuals." They are also sometimes inadvertently encouraged by naive reformers at hacker conferences and by the early success of a few malicious hacker heroes (such as "Cap'n Crunch," "Fiber Optic," and Kevin Mitnick). These hacking mentors and others are described in my books, as well as in others, including Hackers, Heroes of the Computer Revolution by Steven Levy (Anchor Press/Doubleday, 1984), The Hacker Crackdown by Bruce Sterling (Bantam, 1992), and The Fugitive Game by Jonathan Littman (Little, Brown and Company, 1996).

Donn B. Parker
Los Altos, CA


Displaying all 6 comments

Log in to Read the Full Article

Sign In

Sign in using your ACM Web Account username and password to access premium content if you are an ACM member, Communications subscriber or Digital Library subscriber.

Need Access?

Please select one of the options below for access to premium content and features.

Create a Web Account

If you are already an ACM member, Communications subscriber, or Digital Library subscriber, please set up a web account to access premium content on this site.

Join the ACM

Become a member to take full advantage of ACM's outstanding computing information resources, networking opportunities, and other benefits.
  

Subscribe to Communications of the ACM Magazine

Get full access to 50+ years of CACM content and receive the print version of the magazine monthly.

Purchase the Article

Non-members can purchase this article or a copy of the magazine in which it appears.
Read CACM in a free mobile app!
Access the latest issue, plus archived issues and more
ACM Logo
  • ACM CACM apps available for iPad, iPhone and iPod Touch, and Android platforms
  • ACM Digital Library apps available for iOS, Android, and Windows devices
  • Download an app and sign in to it with your ACM Web Account
Find the app for your mobile device
ACM DL Logo