Defcon for Kids Raising a New Generation of 'Hackers'

The Defcon Conference introduced a new track this year to expose kids age 8 to 16 to the world of hacking

At the Defcon conference in Las Vegas last week, kids aged 8 to 16 were exposed to the world of hacking. Some may fear indoctrinating a new generation of Anonymous and LulzSec members, but young minds can expand the horizons of technology and computer security to effectively combat hacking collectives such as these.

The kids track spanned two days, and attendees witnessed presentations and listened to lectures from a range of security experts, including officials from the Department of Homeland Security and the NSA (National Security Agency). Kids were encouraged to think outside the box to be able to identify security flaws in the computer and gaming platforms they use every day.

Roughly 60 kids took part in the first ever kids track at the annual Defcon conference. The children weren't just sent off to learn about the dark side in Las Vegas on their own, though--they had to be accompanied by a parent.

Truth be told, kids are sort of natural 'hackers'. Kids have an innate sense of wonder and curiosity that--for most--dies a slow death as they get older. If you have ever played the "why?" game with a four year old, you know that curiosity is boundless. In many cases being more "mature" is just code for being more jaded and simply accepting things at face value rather than tenaciously searching for deeper answers.

Hackers--and hacking--are not inherently insidious. In fact, hacking purists get their feathers ruffled because hacking is a benign, perfectly acceptable practice, and the term has been co-opted by the dark side.

While most people just use technology in its prescribed manner, hackers consider what it can do, rather than what it is supposed to do. Hackers push the envelope and find the weak spots. They don't stop at what a device or program does--they dig beneath the surface to understand how and why it does what it does. They use unorthodox methods and think outside the box.

Malicious hackers use these skills to circumvent the design of a device or program and expose security holes. They break into corporate and government networks and compromise sensitive data. They intercept usernames and passwords, steal identities, and rip-off bank accounts. They give hacking a bad name.

There is another side to the hacking coin, though. In an "it takes a thief to catch a thief" sort of way, we need people with those same skills, and that same sense of wonder and curiosity--but with better ethics and a truer moral compass. We need hackers who can find the same holes as the malicious hackers, but work to plug them and protect systems and data rather than exploiting and compromising.

Cameron Camp, Researcher for ESET, says "Young hackers need to be convinced that hacker life is rewarding without going to the "dark side"--that interesting careers are to be had working for the good guys," adding, "To that end, we see recent efforts from Google and Facebook at providing bounties to incentivize hackers for finding and reporting bugs, not exploiting them."

The Defcon kids track is an awesome idea. It's a wonder it took this long to introduce such a concept. I expect the kids track at future Defcon conferences to have greater attendance, and hopefully we will all benefit one day from raising a new generation of hackers.

Join the CSO newsletter!

Error: Please check your email address.

Tags hackersDefconapplicationssecuritysoftwaredata protectionmalware

More about FacebookGoogleNational Security AgencyNSARSA

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Tony Bradley

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place