A Hacker's Hierarchy of Operational Needs