What makes a mobile threat researcher tick?