In this long chapter, which continues and concludes what we started in the previous one, we will examine what has emerged from the questionnaire, but only with reference to information than can be considered “technical and criminological data.” When does a hacker become a hacker? How does he increase his knowledge? What motivates him? Is it possible to identify behavioral models while he is hacking? Is it possible to identify patterns? How does he see his actions? Which ones sign their violations and why? Are there common generalized learning procedures everyone has to follow in the world of hacking?