• Translate

daily activities



Hack Attack

Did you know one of the first modern hackers used a toy whistle from a Cap’n Crunch cereal box to tap into the U.S. phone system? Or that companies often hire hackers called “red teams” to test the security of their systems and computer networks? You might think of hackers as thieves or troublemakers or spies—but is that always true? In this adventure, you’ll meet some real-life hackers and get a chance to decide for yourself.


what you’ll need



        Ask About Today

        What did you learn about hackers? Are all hackers bad?

        Skip the Ads

        Unfortunately, online videos often start with short advertisements. Remind your campers to click the "Skip" button as soon as they can to move ahead to the video.


        45-60 minutes


        What Is Computer Hacking, Anyway?

        YouTube thumbnail

        Excellent question. In this Code.org video, internet security experts Parisa Tabriz and Jenny Martin explain the most common computer hacking strategies and types of cybercrime.


        How Are Hackers Like Hammers?

        YouTube thumbnail

        When you hear the word “hacker,” you might think about someone in a dark room, using their computer to break into other computer systems and cause problems. But hacking can take many forms. Check out this short video from NOVA to see what we mean

        Remember: Online videos often start with advertisements. Click "Skip" as soon as you can.


        Learn to Speak Hacker

        What’s a “botnet”? Or “phishing”? Learn some hacker lingo with this handy guide from Spyscape.


        Meet a Real Hacker

        YouTube thumbnail

        Or at least watch a bunch of other kids meet one. You probably have a lot of the same questions!


        What Does Hacking Actually Look Like?

        YouTube thumbnail

        Hint: Not like in the movies, where there are blinking computer screens everywhere and a lot of fast typing. Watch as two experts explain what Hollywood gets wrong (and right) in some famous hacking scenes.


        Hacking Between Karate Lessons

        Meet Reuben Paul. He’s a 12-year old from Texas who has a knack for hacking—and he’s using his skills to raise awareness about security weaknesses in internet-connected devices and other items. Are any of them in your home?


        30-45 minutes


        Code Like the Ancient Greeks

        YouTube thumbnail

        Hacking computers involves a lot of code-breaking and puzzle solving. But even before computers, people came up with incredibly creative ways to protect and share information. For example, the ancient Greeks used something called a “scytale cipher” to code secret messages on long strips of leather. Watch this video from Jess Science to learn more and make one of your own!

        Share your work! We'd love to see it. Ask an adult to email a photo or video to us or share it on Instagram or Twitter by tagging @CampKinda.


        15-30 minutes


        Let's Get Stealthy

        How is a hacker like a ninja? For one thing, they both specialize in the art of stealth—keeping themselves hidden and undetected. So let’s learn some super stealthy ninja moves. Find an open space in your home and practice jumping, walking, and rolling silently. You may want to pause or rewind the video while you master each move.