{"synopsis":"You might think hackers are just a bunch of online troublemakers, but that's not the whole story! Follow Tim and Moby as they guide you through the underground history of hacking. First, you'll learn about the MIT students who had to sneak behind their professors' backs to create some of the earliest computer programs. Next, you'll find out about the phreakers, hackers who learned to control the telephone systems. Then, you'll hear about modern-day black hats, hackers who cause all sorts of trouble, and white hats, the good hackers hired to stop them. Finally, you'll explore the hacktivist groups who use their coding skills to advance political goals. So hold on to your (hopefully white) hats as we delve into the hidden world of hackers! ","name":"Hackers","display_name":"","name_app":"","EntryID":"6056","courses":[],"free":"no","permafree":"","d_updated":"0","sensitive_content":"","subtitles":[{"language":"en","label":"English","file":"\/technology\/computerscience\/hackers\/movies\/subtitles_en.vtt"}],"show_on_site":"Yes","moe_approved":null,"lesson_plan":"https:\/\/educators.brainpop.com\/bp-topic\/hackers\/","icons":{"high_res_icon":"\/technology\/computerscience\/hackers\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/hackers\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/hackers\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/hackers\/screenshot1.png","\/technology\/computerscience\/hackers\/screenshot2.png","\/technology\/computerscience\/hackers\/screenshot3.png"],"movies":{"high":"\/new_common_images\/ipad_movies\/25\/256507.mp4","low":"\/new_common_images\/iphone_movies\/25\/256506.mp4","high_v2":"\/technology\/computerscience\/hackers\/movies\/272533.mp4","low_v2":"\/technology\/computerscience\/hackers\/movies\/272456.mp4","flash":"\/technology\/computerscience\/hackers\/mysteries.swf"},"related_jr_topics":[],"related_topics":[{"EntryID":"251","name":"Computers","name_app":"","free":"","show_free_tag":"","d_creation":"1148067300","url":"\/technology\/computerscience\/computers\/","icons":{"high_res_icon":"\/technology\/computerscience\/computers\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/computers\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/computers\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/computers\/screenshot1.png","\/technology\/computerscience\/computers\/screenshot2.png","\/technology\/computerscience\/computers\/screenshot3.png"],"d_updated":"0","product":"bp"},{"EntryID":"3066","name":"Computer History","name_app":"","free":"","show_free_tag":"","d_creation":"1173847980","url":"\/technology\/computerscience\/computerhistory\/","icons":{"high_res_icon":"\/technology\/computerscience\/computerhistory\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/computerhistory\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/computerhistory\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/computerhistory\/screenshot1.png","\/technology\/computerscience\/computerhistory\/screenshot2.png","\/technology\/computerscience\/computerhistory\/screenshot3.png"],"d_updated":"0","product":"bp"},{"EntryID":"5663","name":"Computer Programming","name_app":"","free":"yes","show_free_tag":"","d_creation":"1386007320","url":"\/math\/dataanalysis\/computerprogramming\/","icons":{"high_res_icon":"\/math\/dataanalysis\/computerprogramming\/icon.png","high_res_icon_180x180":"\/math\/dataanalysis\/computerprogramming\/icon_180x180.png","high_res_icon_360x360":"\/math\/dataanalysis\/computerprogramming\/icon_360x360.png"},"screenshots":["\/math\/dataanalysis\/computerprogramming\/screenshot1.png","\/math\/dataanalysis\/computerprogramming\/screenshot2.png","\/math\/dataanalysis\/computerprogramming\/screenshot3.png"],"d_updated":"0","product":"bp"},{"EntryID":"475","name":"Malware","name_app":"","free":"","show_free_tag":"","d_creation":"915167640","url":"\/technology\/computerscience\/malware\/","icons":{"high_res_icon":"\/technology\/computerscience\/malware\/icon.png","high_res_icon_180x180":"\/technology\/computerscience\/malware\/icon_180x180.png","high_res_icon_360x360":"\/technology\/computerscience\/malware\/icon_360x360.png"},"screenshots":["\/technology\/computerscience\/malware\/screenshot1.png","\/technology\/computerscience\/malware\/screenshot2.png","\/technology\/computerscience\/malware\/screenshot3.png"],"d_updated":"1515646800","product":"bp"}],"path":"\/technology\/computerscience\/hackers\/","related_games":[{"EntryID":"781","name":"The Meaning of Beep: Hackers","url":"\/games\/mobhackers\/","type":"meaningofbeep","alignments_description":"","alignment_guid":"F948BF0E-2F71-11E9-975D-C03D1327B6AC"},{"EntryID":"382","name":"Time Zone X: Hackers","url":"\/games\/timezonexhackers\/","type":"timezonex","alignments_description":"","alignment_guid":"F8161FFA-2F71-11E9-A4B2-9615B1605985"},{"EntryID":"232","name":"Blockly: Maze","url":"\/games\/blocklymaze\/","type":"generic_game","alignments_description":"You can code! Build a simple computer application by programming \u201ctag\u201d blocks to reach your target \u2013 no typing required. (Not compatible with IE8)","alignment_guid":""}],"sortify_games":[],"features":[{"type":"quiz","feature_id":"31308","name":"Quiz","feature_name":"Quiz","alignments_description":"","alignment_guid":"","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/hackers\/quiz\/","icon":"\/assets\/images\/quiz_svg_icon.svg"},{"type":"challenge","feature_id":"38860","name":"Challenge","feature_name":"Challenge","alignments_description":"Interactive tasks that playfully assess knowledge of a topic.","alignment_guid":"F18EA56C-2F71-11E9-94E3-AA5AD606DE66","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/hackers\/challenge\/","icon":"\/assets\/images\/challenge_svg_icon.svg"},{"feature_id":"6056","type":"concept_map","name":"Make-a-Map","alignments_description":"A concept mapping tool.","alignment_guid":"F224BA3E-2F71-11E9-BD27-D880ECF22D57","url":"\/make-a-map\/?topic=\/technology\/computerscience\/hackers\/","requires_flash":"","small_screen_compatible":""},{"feature_id":"6056","type":"make_a_movie","name":"Make-a-Movie","alignments_description":"A movie-making tool to produce BrainPOP-style movies.","alignment_guid":"F3433A4E-2F71-11E9-BB13-FC18EF64D98F","url":"\/make-a-movie\/?topic=6056","requires_flash":"","small_screen_compatible":""},{"type":"coding","feature_id":"38843","name":"Creative Coding","feature_name":"Creative coding","alignments_description":"Coding projects offered in both text- and block-based coding languages.","alignment_guid":"F47A5A78-2F71-11E9-8AB9-8A97AF8D6807","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/hackers\/creativecoding\/","icon":"\/assets\/images\/creativecoding_svg_icon.svg","coding_types":{"museum":{"type":"museum","instructions":"Code a digital museum to show what you know about hackers."},"story":{"type":"story","instructions":"Code a conversation to show what you know about hackers."},"game":{"type":"game","instructions":"Code a sorting game to show what you know about hackers."},"flag":{"type":"flag","instructions":"Create a flag that represents hackers."},"comic":{"type":"comic","instructions":"Create a comic about hackers."},"newscast":{"type":"newscast","instructions":"Create a newscast that explains the significance of Spacewar! to the development of hacking."},"meme":{"type":"meme","instructions":"Create a meme that describes the mission of white hats."}}},{"type":"primary_source_html","feature_id":"46758","name":"Primary Source","feature_name":"Primary Source","alignments_description":"","alignment_guid":"51B1A914-088A-11EC-A00C-F8205A196CE0","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/hackers\/primarysource\/","icon":"\/assets\/images\/primarysource_svg_icon.svg"},{"type":"related_reading","feature_id":"31309","name":"Related Reading","feature_name":"Related Reading","alignments_description":"High-interest, informational texts that extend understanding of a topic.","alignment_guid":"F6E26710-2F71-11E9-BD9B-AE86D75F7D15","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/hackers\/relatedreading\/","icon":"\/assets\/images\/relatedreading_svg_icon.svg"},{"type":"transcript","feature_id":"32413","name":"Movie Transcript","feature_name":"Transcript","alignments_description":"","alignment_guid":"","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/hackers\/transcript\/","icon":""},{"type":"worksheet","feature_id":"44286","name":"Worksheet","feature_name":"Worksheet","alignments_description":"","alignment_guid":"EA432F50-0889-11EC-AF3E-A6AC9796797A","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/hackers\/worksheet\/","icon":"\/assets\/images\/worksheet_svg_icon.svg"},{"type":"graphic_organizer","feature_id":"44285","name":"Graphic Organizer","feature_name":"Graphic Organizer","alignments_description":"","alignment_guid":"E9AB488E-0889-11EC-9550-FF2E6961E094","requires_flash":"","small_screen_compatible":"","url":"\/technology\/computerscience\/hackers\/graphicorganizer\/","icon":"\/assets\/images\/graphicorganizer_svg_icon.svg"},{"type":"vocabulary","feature_id":"44287","name":"Vocabulary","feature_name":"Vocabulary","alignments_description":"","alignment_guid":"EADF0880-0889-11EC-91BE-8C601E0E7A84","requires_flash":"","small_screen_compatible":"Yes","url":"\/technology\/computerscience\/hackers\/vocabulary\/","icon":"\/assets\/images\/vocabulary_svg_icon.svg"},{"EntryID":"781","game":"true","name":"Meaning of Beep","game_name":"The Meaning of Beep: Hackers","alignment_guid":"F948BF0E-2F71-11E9-975D-C03D1327B6AC","alignments_description":"","url":"\/games\/mobhackers\/","type":"meaningofbeep","icon":"\/assets\/images\/meaningofbeep_svg_icon.svg","requires_flash":"","small_screen_compatible":"Yes"},{"EntryID":"382","game":"true","name":"Time Zone X","game_name":"Time Zone X: Hackers","alignments_description":"","alignment_guid":"F8161FFA-2F71-11E9-A4B2-9615B1605985","url":"\/games\/timezonexhackers\/","type":"timezonex","icon":"\/assets\/images\/timezonex_svg_icon.svg","requires_flash":"","small_screen_compatible":"Yes"},{"EntryID":"232","game":"true","name":"GameUp","url":"\/games\/game-finder\/?game_keyword=topic: Hackers&topic_id=d04da9f6330ab0a2","type":"generic_game","requires_flash":"","small_screen_compatible":"Yes","icon":"\/assets\/images\/gameup_svg_icon.svg","count":3}],"feature_promo":{"featured_1":{"title":"Make-a-Movie","type":"make_a_movie","image":"\/technology\/computerscience\/hackers\/292129.png","url":"\/technology\/computerscience\/hackers\/makeamovie"},"featured_2":{"title":"Creative Coding","type":"coding","image":"\/technology\/computerscience\/hackers\/292130.png","url":"\/technology\/computerscience\/hackers\/creativecoding"}},"themes":[{"name":"Computer Science and Coding","display_name":"","path":"\/computerscienceandcoding\/","num_of_resources":26},{"name":"Digital Citizenship","display_name":"Digital Citizenship","path":"\/digitalcitizenship\/","num_of_resources":30}],"alignment_guid":"F1086718-2F71-11E9-B877-CA68BB084C45"}
LOG IN
Please log in to access this feature.

Limited Student Access
This topic is not available for students in Kindergarten, 1st Grade, 2nd Grade, 3rd Grade, 4th Grade, 5th Grade, 6th Grade, 7th Grade, 8th Grade, 9th Grade, 10th Grade, 11th Grade and 12th Grade. Contact your administrator for guidance on teaching this topic.