Fulfills Step 1 of GSUSA Ambassador Cybersecurity Basics badge requirements.
Info Needed for the badge requirements: All hackers use similar strategies and tools, but their motivations and affiliations set them apart. There are three main categories of hackers: Gray Hat Hackers: Hackers who operate between the two categories, following personal ethics but sometimes breaking laws or acting without permission. White Hat Hackers: Ethical hackers who use their skills legally to protect people and organizations. Black Hat Hackers: Unethical hackers who break into systems for personal or financial gain.
Items Needed
- VTK Hacker Character Cards by GSUSA (print and cut ahead of time; one card per scout, up to 8 scouts – or choose one less than the total number of scouts)
- Add at least one “Detective” card to the mix, but ensure there are enough detective cards for all remaining scouts (i.e. if there are 12 scouts, there are 8 Hacker Characters and 4 Detectives OR if there are 6 scouts, use only 5 Hacker Characters and 1 Detective)
Instructions
- Scouts will role-play attending a convention and figure out who the “good guys” and “bad guys” are. Each scout will receive a card describing their character. Scouts create a name and background for their character (e.g., hobbies, favorite food, upbringing).
- Distribute one Hacker Character Card or Detective Card to each scout.
- Scouts mingle and act in character for 15–20 minutes.
- Ask the Detective (or multiple detectives) to group the scouts into white hat, black hat, or gray hat hackers based on character descriptions. Allow discussion and challenges to decisions, revealing character details along the way.
Suggested Character Card Solutions
- Card 1: Black or gray hat hacker (unauthorized access to a university website, intent determines category)
- Card 2: White hat hacker (hired to identify vulnerabilities)
- Card 3: Black hat hacker (illegal access to accounts)
- Card 4: Gray hat hacker (unauthorized access, intent to assist company)
- Card 5: White hat hacker (legal hacking competition)
- Card 6: Black hat hacker (illegal activities for financial gain)
- Card 7: White hat or gray hat hacker (authorized spying, ethical considerations apply)
- Card 8: Gray hat hacker (unauthorized access motivated by justice)