hacking heroes
No. 1 - Robert Tappan Morris
Even if you know next to nothing about computer
viruses, you've probably heard of "worms." That's because news stories
about this particularly contagious (and therefore destructive) breed of
virus abound.Blame Robert Tappan Morris for it all.Back in
1988, while a graduate student at Cornell University, Morris created
the first worm and released it on the Internet. He claimed it was all an
experiment gone awry, a test to see how big the then-new Internet was.
The worm turned out to be more than a test: it replicated quickly,
slowing computers to the point of non-functionality and virtually
crippling the Internet. He was eventually fined and sentenced to three
years probation.Since then, he's earned his Ph.D. from Harvard
and made millions designing software. Today, he's a computer science
professor at MIT. Not bad.
No. 2 - Kevin Mitnick
Kevin Mitnick started out just wanting a free ride on the bus.He
came a long way from his hacks into the Los Angeles metropolitan bus
system and early dabbling in phone fraud. Mitnick went on to become the
most wanted computer hacker in the country, known (and wanted) primarily
for his hack into Digital Equipment Corporation's network to steal
their software.It may have been his first notable break-in, but Mitnick
went on to other big targets, including cell phone giants Nokia and
Motorola.Even his eventual arrest was notable: After hacking into
fellow hacker Tsutomu Shimomura's computer, Mitnick was tracked down by
Shimomura and the FBI in 1995.Today, Mitnick has served a
five-year sentence and come clean, but he continues to profit off his
former title, authoring books and working as a security consultant.
No. 3 - Adrian Lamo
It's true that companies sometimes hire hackers to test their systems for weaknesses, but no one ever hired Adrian Lamo.In
2002 and 2003, Lamo broke into several high-profile targets, just for
kicks. He then told the targets what he had been able to do and how he
did it. How kind of him. Lamo's targets included Microsoft, Yahoo and
the
New York Times, where he inserted his contact info into their database
of experts.Known as "the homeless hacker," Lamo slept in
abandoned buildings and hacked via laptop from Internet cafes and public
libraries. His network-busting technique of choice involved going in
through the out door, entering sites through proxy access, a setup that
corporations often use to let their computers connect out to the
Internet. That led to his arrest in 2003.Lamo served two years probation and now works as a tech journalist.
No. 4 - Gary McKinnon (aka Solo)
Scottish-born, London-based hacker McKinnon wasn't just in it for fun; he had a political axe to grind.Conspiracy-theorist
McKinnon broke into computers at the U.S. Department of Defense, Army,
Navy, Air Force and NASA sometime in 2001 and 2002. What exactly was he
looking for? Evidence of really fuel-efficient alien spacecraft, for
one.No joke.McKinnon believes the U.S. government was
hiding alien technology that could solve the global energy crisis. Now,
in the process of snooping around for this stuff, the self-taught hacker
concedes he may have deleted a whole bunch of other files and maybe
some hard drives as he attempted to cover up his tracks. Nothing
significant, he insists.The U.S. government begs to differ,
claiming McKinnon's hack job cost them $700,000 to fix. They also kind
of doubt the whole UFO story and wonder if his snooping had more earthly
intentions. Back in the U.K., Gary's lawyers insist that their client,
who suffers from Asperger's Syndrome, deserves special mental health
considerations.Gary himself has become a cause celebre, with his pending extradition being protested by celebrities like Sting.
No. 5 - Raphael Gray (aka Curador)
Raphael Gray called himself a saint, insisting he
was only trying to help e-commerce sites when he broke into their
databases to steal credit card numbers and personal information from
26,000 or so American, British and Canadian customers in 2000.
The then-18-year-old Welsh teenager insisted he was merely trying
to draw attention to lax online security systems. So, if he was really
just trying to help, then why did he post the card numbers online? Well,
that's another question.Gray was sentenced in 2001 to three years of psychiatric treatment.
No. 6 - John Draper
Draper is pretty much the granddaddy of hackers.Back
in the early 1970s, he was the king of "phone phreaking," meaning he
was playing the phone company. Back in the pre-Internet, pre-personal
computer days, the phone system was the big computer to beat and Draper
did it well.Draper's breakthrough came when he and a friend
realized that a toy whistle, a giveaway in a breakfast cereal box,
emitted the same frequency as the tones used by AT&T switches to
route phone calls.Building off that, Draper made homemade
devices, "blue boxes" that could get you all the long distance calls you
wanted...for free. What did all this get him? Some time in
prison, as well as the attention of Apple co-founder Steve Wozniak, who
wanted to get in on phone phreaking himself. Draper went on to write one
of the first word-processing programs, EasyWriter, but now specializes
in, go figure, security.
No. 7 - Kevin Poulsen (aka Dark Dante)
Today, Kevin Poulsen is an editor at tech-savvy
Wired magazine, but back in the 1980s, he was just your average phone-phreaking, Porsche-driving hack.Poulsen
gained some notoriety for a clever prank he played on Los Angeles radio
station KIIS, in which he rigged the phones to allow only him to get
through and win a trip to Hawaii and the aforementioned Porsche.Known
as Dark Dante, Poulsen also took on more serious targets. His break-in
to the FBI's database eventually led to his 1991 arrest and five years
prison time. Since then, he's gone respectable, retiring to the
editor's chair and using his cybersleuth powers for good deeds, like
tracking sex offenders on MySpace.
No. 8 - Dmitri Galushkevich
When pretty much the whole country of Estonia was
suddenly caught up in Internet gridlock in May 2007, the
very-small-but-very-tech-savvy former Soviet Republic thought they knew
who to blame: the Russian government.At the time, the two
countries were caught up in a series of riots over the removal of
Soviet-era statues, but now it had gotten serious. The weapon of choice?
A botnet.The hackers responsible for the cyberterror hijacked
computers and used them, en masse, to overload servers across the
country. ATM machines didn't work, Web pages didn't load, government
systems were shut down.It took weeks for Estonian officials to
untangle the mess and even longer for them to find the culprit: Dmitri
Galushkevich, a 20-year-old ethnic Russian living in Estonia. Was he
working alone? Unclear, but for wreaking this havoc, Galushkevich was
fined 17,500 kroons. Or about $1,620.
No. 9 - Jonathan James (aka c0mrade)
On the list of computer systems you'd want to be
really, really, really secure, the Department of Defense surely shows
up, which makes Jonathan James' (aka c0mrade) break-in to the DoD's
Defense Threat Reduction Agency server all the more impressive. James'
1999 spree included not only the DoD, but NASA as well. The then
16-year-old used his purveyed access to steal software, not defense
secrets, but James still got into some dangerous territory, including
software used to control the International Space Station's living
environment. For his crimes, he served an abbreviated minor's sentence of six months and also had to pledge to give up computer use.
No. 10 - The Deceptive Duo
In 2002, the Deceptive Duo (really 20-year-old
Benjamin Stark and 18-year-old Robert Lyttle) were responsible for a
series of high-profile break-ins to government networks, including the
U.S. Navy, NASA, FAA and Department of Defense. Like so many
other hackers, California-based Lyttle and Florida-based claimed they
were merely trying to expose security failures and protect Americans in a
post-911 world. The two hackers posted messages, left email addresses
and defaced Web sites in an attempt to get the government's
attention...and get the government's attention, they did. Lyttle
and Stark pleaded guilty in 2005. Stark was sentenced to two years
probation, Lyttle served four months in prison with three years
probation, and both were ordered to pay tens of thousands of dollars in
restitution for the damage they caused.
No comments:
Post a Comment