OpenIDEO is an open innovation platform. Join our global community to solve big challenges for social good. Sign Up / Login or Learn more

Faces of a Hacker

Who is a real hacker and what are his/her faces

Photo of Atul Narula
1 1

Written by

Sketch 1 (1,500 characters)

The illustration explains who is a hacker. A person who wants to control the technology world like a puppet and can put any mask to represent or hide his identity. 1. A hacker can be boy or girl next door. 2. A hacker can be social activist or anonymous. 3. A hacker can be police trying to break into a suspect iPhone or using tools like stingray/GSM interceptor to intercept calls without court orders. 4. A hacker can be a person who is state sponsored from China, Russia, Iran or North Korea as we see in all the recent cyber attacks. 5. A hacker can be person who is working with 5 EYES intelligence agency (USA, UK, NEW ZEALAND, AUSTRALIA, CANDA) or other intelligence agencies around the world. And these agencies work with device manufactures or social networking companies and forcing them to put backdoors in products or encryption protocols. 6. A hacker can be an employee of big technology companies like Facebook, Google, Android, Apple Twitter etc who control the Internet.

Sketch 2 (1,500 characters)

The illustration explains who is a hacker. A person who wants to control the technology world like a puppet and can put any mask to represent or hide his identity. 1. A hacker can be boy or girl next door. 2. A hacker can be social activist or anonymous. 3. A hacker can be police trying to break into a suspect iPhone or using tools like stingray/GSM interceptor to intercept calls without court orders. 4. A hacker can be a person who is state sponsored from China, Russia, Iran or North Korea as we see in all the recent cyber attacks. 5. A hacker can be person who is working with 5 EYES intelligence agency (USA, UK, NEW ZEALAND, AUSTRALIA, CANADA) or other intelligence agencies around the world. And these agencies work with device manufactures or social networking companies and forcing them to put backdoors in products or encryption protocols. 6. A hacker can be an employee of big technology companies like Facebook, Google, Android, Apple Twitter etc who control the Internet.

What have you learned through this sketching process? (1,000 characters)

I have been working in cyber security since some time now. I liked this challenge a lot as it was related to the field I am working in. When I started sketching the big task was where to focus, as the cyber security field is very big. Later I decided that I would focus on hacker and surveillance. I started with the definition hacker and seeing the existing images that are use to represent a hacker. Using all my knowledge of deep web, government surveillance programs, tools used, state sponsored attacks and other cyber security topics, I came up with an idea of sketching a hacker. The most exciting part was to put in a sketch all the ideas that were in my head and to create a story around the vision of hacking and surveillance. I learned how challenging is to represent this big picture I have in mind in an image. I also learned how to use basic concepts to make people understand about cyber security with the help of story telling. I hope I get a chance to work with mentors.

Tell us more about you. (1,000 characters)

I am 34-year-old cyber security kid. I would call my self a kid in a cyber security world, as there is lot to learn in this world. Presently based out of Mexico City. I like to learn every day and this love for learning made me learn cyber security and designing skills. I various languages and I’ve been at this cyber security startup space for since last 8 years and I have learned a lot working in this space. I want to represent on an illustration that cyber security isn’t only about technology that a normal person couldn’t understand but it is related to all of us and is a important part of us.

Why are you participating in this Challenge? (750 characters)

I have worked in cyber security field for some years now and what I have felt is that there is a great need of presenting cyber security information to people so that they can understand it easily. Only by this way they will be able to secure their information and data. Normally visiting clients I am being often asked about cyber security topics and current cyber security news. And I always felt the need of some infographics or some basic images that would make my work easy. Last weekend while I was searching about some cyber security news and I found the IDEO challenge. Thus this challenge helped me portray a hacker and the cyber security world. I hope my work can help to resolve this problem.

Website(s)

https://www.securitynewspaper.com/

What is your experience with the field of cybersecurity?

  • I have considerable experience and/or knowledge in the cybersecurity field.

What best describes you?

  • I’m a cybersecurity professional with an interest in visuals.

How did you hear about this OpenIDEO Challenge?

  • In the news

Location: City

Mexico City Mexico

Location: State / District

Mexico City Mexico

Location: Country

  • Mexico

1 comment

Join the conversation:

Comment
Photo of Dima Boulad

Hello Atul Narula  Happy to see your contribution to the Cybersecurity challenge. How would you consider pushing this idea further? We've had a large number of very interesting creations, have you had a chance to browse other submissions? There's a very interesting conversation around cybersecurity going on!