Weaponizing Autism for the cyber security workforce.

  1. The broad depth of differences in adults on the spectrum

10 reasons why Asperger people are better at cybersecurity

  1. Most hackers are atypical. A research document from Scotland Yard last year indicates the majority of hackers in England are Aspergers. Some of them are identified; others don’t disclose it.
  2. Aspergers are extremely detailed oriented, which leads to a “no stone unturned” approach to cybersecurity.
  3. Aspergers are cognitively different, so they are naturally “out of the box” and find innovative solutions to problems without the usual cognitive “Blind spot” of non-autistic people.
  4. Aspergers are extremely focused and can have a high level of concentration. They are capable of hyperfocusing and never let go when they are looking for something.
  5. They have a high capacity for analysis. You can find brilliant Asperger people working as Security Operations Center (SOC) analysts, for example.
  6. They have a demonstrated superior capacity to identify patterns. The Israeli army has created an elite squad (“unit 9900”) composed solely of Autistics to deduct with pattern recognition troop movements on satellite images.
  7. It’s been scientifically proven that Aspergers are methodological and make more rational decisions (less cognitive biases).
  8. Many Aspergers are “optimal problem solvers” — they focus on finding the best solutions, not one of the best.
  9. Autistics have what is called Specific Interests: They will read and memorize huge amounts of information in an obsessive way and, therefore, excel in their field of expertise.
  10. People on the spectrum search for intellectual stimulation, complex challenges, and many have the “investigator profile,” which is highly valuable for forensics and pen testing.

--

--

--

“I am always ready to learn although I do not always like being taught.” — Winston Churchill

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Importance Of Information Security For Your Business

The Engn33r’s Toolbox

Toolbox

Hybrid Analyst Video of the Day: Hacking Wifi Networks

{UPDATE} Bosque gatuno Hack Free Resources Generator

Student Success Story: Ezra Jackson Jr.

Meet Cirus: Hardware Features and Specifications

{UPDATE} Espadas - Spades Hack Free Resources Generator

ASSIGNMENT 4 — IT INFRASTRUCTURE SECURITY

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Rhett Greenhagen

Rhett Greenhagen

“I am always ready to learn although I do not always like being taught.” — Winston Churchill

More from Medium

Old Mick and his waffle house friend

The Power Of The Dog: Looks Aren’t Everything

The Bermuda Triangle — Mystery Solved or Unsolved

Cosmetic Industry in Dilemma Amidst the Pandemic.