1231:
185:, and defacing Burger King's Twitter account. He has also been convicted of intentionally causing damage to a protected computer system, obtaining information from a protected computer system, wire fraud, and aggravated identity fraud. Prosecutors said victims of the teen's actions have suffered about $ 1 million in damages. Pursuant to a plea agreement signed by the juvenile in August 2005, he received 11 months in a federal juvenile detention facility. In January 2007 his supervised release was revoked due to possession of a cell phone.
36:
437:
345:
412:
426:
1287:
505:
387:
376:
271:
473:
696:
531:
188:
In June 2008, an indictment for
Cameron LaCroix was returned from New Bedford Superior Court in Bristol County on a series of counts for computer offenses.
626:
45:
1268:
1097:
584:
352:
211:
1292:
71:
466:
1307:
498:
363:
316:
708:
636:
93:
445:
1297:
968:
807:
367:
338:
536:
526:
491:
1261:
600:
246:
281:
56:
50:
723:
703:
899:
405:
75:
973:
733:
1230:
1254:
1040:
999:
748:
1302:
1066:
1061:
652:
631:
462:
398:
1056:
1030:
771:
1092:
605:
797:
276:
863:
568:
889:
884:
67:
921:
879:
781:
691:
621:
207:
200:
Fancy Bear Goes
Phishing: The Dark History of the Information Age, in Five Extraordinary Hacks
1238:
776:
657:
713:
1180:
842:
822:
802:
792:
452:
339:
AMERICAN GREED: THE FUGITIVES – The new muggers: People who committed shocking cybercrimes
320:
302:
1206:
1149:
1113:
909:
728:
1281:
1170:
952:
817:
743:
346:
Paris Hilton hacker faces new charges after breaking into community college's network
1144:
915:
832:
827:
678:
178:
145:
1154:
1118:
1015:
837:
766:
686:
377:
Serial hacker
Cameron Lacroix gets four year jail term after taking plea bargain
17:
1123:
738:
663:
562:
469:. US Department of Justice; U.S. Attorney's Office, District of Massachusetts.
182:
149:
62:
Contentious material about living persons that is unsourced or poorly sourced
1196:
1175:
399:
Feds finally press charges against great Burger King
Twitter hacker of 2013
1201:
1128:
1087:
1035:
947:
847:
718:
364:
New
Bedford student charged with computer hacking, changing grades at BCC
1020:
932:
483:
474:
Decoding the information age with Scott
Shapiro: podcast and transcript
467:
Recidivist Hacker
Sentenced for Violating Supervised Release Conditions
388:
Feds unmask mystery hacker who "hamburgled" Burger King
Twitter account
353:
FBI charges
Massachusetts man with computer hacking, payment card theft
1071:
812:
758:
1025:
978:
1237:
This biographical article relating to a computer specialist is a
983:
203:
487:
436:
Tom Winter; Jeff Rossen; Jovanna
Billington (4 November 2014);
177:, is an American computer hacker best known for the hacking of
477:
29:
303:"Slip Opinions | Social Law Library | Boston, MA"
1242:
413:
Apologetic New Bedford hacker gets 4-year jail sentence
406:
Twitter @BurgerKing Hacker Given Four Year Jail Term
1189:
1163:
1137:
1106:
1080:
1049:
1008:
992:
961:
940:
931:
898:
872:
856:
757:
677:
645:
614:
593:
577:
555:
548:
140:
123:
115:
108:
247:Teen Pleads Guilty to Hacking Paris Hilton's Phone
1262:
499:
448:on 4 November 2014. Retrieved 15 August 2023.
8:
438:Ex-teen hacker tells Paris Hilton he's sorry
317:"COMMONWEALTH v. CAMERON LACROIX, Defendant"
152:, and defacing Burger King's Twitter account
1269:
1255:
937:
552:
506:
492:
484:
265:
263:
261:
105:
427:New Bedford hacker gets 4 years in prison
94:Learn how and when to remove this message
585:Sony BMG copy protection rootkit scandal
372:(New Bedford). Retrieved 15 August 2023.
227:
1288:People from New Bedford, Massachusetts
411:Milton J. Valencia (28 October 2014);
465:, Massachusetts (13 September 2019);
7:
1227:
1225:
337:Daniel Bukszpan (23 October 2013);
1241:. You can help Knowledge (XXG) by
451:David Kushner (23 November 2015);
55:it lacks sufficient corresponding
25:
270:Brian Krebs (February 27, 2007).
243:Brian Krebs (13 September 2005);
198:Shapiro, Scott J. (23 May 2023).
1229:
480:audio. Retrieved 15 August 2023.
344:Veronica Linares (3 June 2014);
34:
351:Adam Greenberg (3 June 2014);
319:. 16 July 2011. Archived from
206:). Farrar, Straus and Giroux.
1:
472:Doni Holloway (6 June 2023);
397:Kevin Collier (4 July 2014);
348:. United Press International.
255:. Retrieved 4 September 2022.
181:'s cellular phone, accessing
127:
916:Kaminsky DNS cache poisoning
660:(findings published in 2010)
404:Shea Bennett (8 July 2014);
66:, especially if potentially
46:biography of a living person
1293:Hacking (computer security)
375:John Hawes (26 June 2014);
272:"They'll Always Have Paris"
119:camo, cam0, camZero, cmuNNY
70:or harmful. Please help to
64:must be removed immediately
49:includes a list of general
1324:
1224:
386:Dan Goodin (3 July 2014);
362:Curt Brown (3 June 2014);
148:'s cell phone, accessing
1308:Computer specialist stubs
519:
453:The Hacking of Hollywood
1298:American cybercriminals
637:US military cyberattack
627:Cyberattacks on Georgia
601:Cyberattacks on Estonia
78:more precise citations.
632:Sarah Palin email hack
431:The Providence Journal
772:Jeanson James Ancheta
606:Operation: Bot Roast
514:Hacking in the 2000s
444:. Archived from the
425:(28 October 2014);
277:The Washington Post
569:Operation Firewall
369:The Standard-Times
332:General references
1250:
1249:
1219:
1218:
1215:
1214:
697:associated events
673:
672:
622:Project Chanology
543:
542:
213:978-0-374-60118-8
156:
155:
124:Years active
104:
103:
96:
16:(Redirected from
1315:
1271:
1264:
1257:
1233:
1226:
938:
789:str0ke (milw0rm)
658:Operation Aurora
553:
522:
521:
508:
501:
494:
485:
423:Associated Press
417:The Boston Globe
325:
324:
323:on 16 July 2011.
313:
307:
306:
299:
293:
292:
290:
289:
280:. Archived from
267:
256:
241:
235:
232:
217:
136:
132:
129:
116:Other names
106:
99:
92:
88:
85:
79:
74:this article by
57:inline citations
38:
37:
30:
21:
1323:
1322:
1318:
1317:
1316:
1314:
1313:
1312:
1278:
1277:
1276:
1275:
1222:
1220:
1211:
1185:
1159:
1133:
1102:
1076:
1045:
1004:
988:
969:Anna Kournikova
957:
927:
902:
900:Vulnerabilities
894:
868:
852:
843:Dmitry Sklyarov
823:Albert Gonzalez
753:
669:
641:
610:
589:
573:
544:
515:
512:
334:
329:
328:
315:
314:
310:
301:
300:
296:
287:
285:
284:on May 16, 2011
269:
268:
259:
253:Washington Post
242:
238:
233:
229:
224:
214:
197:
194:
159:Cameron LaCroix
134:
130:
111:
110:Cameron LaCroix
100:
89:
83:
80:
61:
39:
35:
28:
27:American hacker
23:
22:
18:Cameron Lacroix
15:
12:
11:
5:
1321:
1319:
1311:
1310:
1305:
1300:
1295:
1290:
1280:
1279:
1274:
1273:
1266:
1259:
1251:
1248:
1247:
1234:
1217:
1216:
1213:
1212:
1210:
1209:
1204:
1199:
1193:
1191:
1187:
1186:
1184:
1183:
1178:
1173:
1167:
1165:
1161:
1160:
1158:
1157:
1155:Black Energy 1
1152:
1147:
1141:
1139:
1135:
1134:
1132:
1131:
1126:
1121:
1116:
1110:
1108:
1104:
1103:
1101:
1100:
1095:
1090:
1084:
1082:
1078:
1077:
1075:
1074:
1069:
1064:
1059:
1053:
1051:
1047:
1046:
1044:
1043:
1038:
1033:
1028:
1023:
1018:
1012:
1010:
1006:
1005:
1003:
1002:
996:
994:
990:
989:
987:
986:
981:
976:
971:
965:
963:
959:
958:
956:
955:
950:
944:
942:
935:
929:
928:
926:
925:
919:
913:
910:Shatter attack
906:
904:
896:
895:
893:
892:
887:
882:
876:
874:
873:Hacking forums
870:
869:
867:
866:
860:
858:
854:
853:
851:
850:
845:
840:
835:
830:
825:
820:
815:
810:
805:
800:
795:
790:
787:
784:
779:
774:
769:
763:
761:
755:
754:
752:
751:
746:
741:
736:
731:
729:PLA Unit 61398
726:
721:
716:
711:
706:
701:
700:
699:
689:
683:
681:
675:
674:
671:
670:
668:
667:
661:
655:
653:Operation Troy
649:
647:
643:
642:
640:
639:
634:
629:
624:
618:
616:
612:
611:
609:
608:
603:
597:
595:
591:
590:
588:
587:
581:
579:
575:
574:
572:
571:
566:
559:
557:
550:
546:
545:
541:
540:
534:
529:
520:
517:
516:
513:
511:
510:
503:
496:
488:
482:
481:
470:
460:
449:
434:
420:
409:
402:
395:
384:
381:Naked Security
373:
360:
349:
342:
333:
330:
327:
326:
308:
294:
257:
236:
234:Shapiro (2023)
226:
225:
223:
220:
219:
218:
212:
193:
190:
154:
153:
142:
141:Known for
138:
137:
125:
121:
120:
117:
113:
112:
109:
102:
101:
42:
40:
33:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
1320:
1309:
1306:
1304:
1303:Living people
1301:
1299:
1296:
1294:
1291:
1289:
1286:
1285:
1283:
1272:
1267:
1265:
1260:
1258:
1253:
1252:
1246:
1244:
1240:
1235:
1232:
1228:
1223:
1208:
1205:
1203:
1200:
1198:
1195:
1194:
1192:
1188:
1182:
1179:
1177:
1174:
1172:
1169:
1168:
1166:
1162:
1156:
1153:
1151:
1148:
1146:
1143:
1142:
1140:
1136:
1130:
1127:
1125:
1122:
1120:
1117:
1115:
1112:
1111:
1109:
1105:
1099:
1096:
1094:
1091:
1089:
1086:
1085:
1083:
1079:
1073:
1070:
1068:
1065:
1063:
1060:
1058:
1055:
1054:
1052:
1048:
1042:
1039:
1037:
1034:
1032:
1029:
1027:
1024:
1022:
1019:
1017:
1014:
1013:
1011:
1007:
1001:
998:
997:
995:
991:
985:
982:
980:
977:
975:
972:
970:
967:
966:
964:
960:
954:
951:
949:
946:
945:
943:
939:
936:
934:
930:
923:
920:
917:
914:
911:
908:
907:
905:
901:
897:
891:
888:
886:
883:
881:
878:
877:
875:
871:
865:
862:
861:
859:
855:
849:
846:
844:
841:
839:
836:
834:
831:
829:
826:
824:
821:
819:
816:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
788:
785:
783:
780:
778:
775:
773:
770:
768:
765:
764:
762:
760:
756:
750:
747:
745:
744:World of Hell
742:
740:
737:
735:
732:
730:
727:
725:
722:
720:
717:
715:
712:
710:
707:
705:
702:
698:
695:
694:
693:
690:
688:
685:
684:
682:
680:
676:
665:
662:
659:
656:
654:
651:
650:
648:
644:
638:
635:
633:
630:
628:
625:
623:
620:
619:
617:
613:
607:
604:
602:
599:
598:
596:
592:
586:
583:
582:
580:
576:
570:
567:
564:
561:
560:
558:
554:
551:
547:
539: →
538:
535:
533:
530:
528:
525:←
524:
523:
518:
509:
504:
502:
497:
495:
490:
489:
486:
479:
475:
471:
468:
464:
461:
458:
454:
450:
447:
443:
439:
435:
432:
428:
424:
421:
418:
414:
410:
407:
403:
400:
396:
393:
389:
385:
382:
378:
374:
371:
370:
365:
361:
358:
354:
350:
347:
343:
340:
336:
335:
331:
322:
318:
312:
309:
304:
298:
295:
283:
279:
278:
273:
266:
264:
262:
258:
254:
250:
248:
240:
237:
231:
228:
221:
215:
209:
205:
201:
196:
195:
191:
189:
186:
184:
180:
176:
172:
168:
164:
160:
151:
147:
143:
139:
126:
122:
118:
114:
107:
98:
95:
87:
77:
73:
69:
65:
59:
58:
52:
48:
47:
41:
32:
31:
19:
1243:expanding it
1236:
1221:
1098:Sony rootkit
864:Bluehell IRC
833:Dan Kaminsky
828:Sven Jaschan
456:
441:
430:
422:
416:
401:. Daily Dot.
392:Ars Technica
391:
380:
368:
356:
321:the original
311:
297:
286:. Retrieved
282:the original
275:
252:
244:
239:
230:
199:
187:
179:Paris Hilton
174:
170:
166:
162:
158:
157:
146:Paris Hilton
90:
81:
63:
54:
44:
1016:SQL Slammer
838:Samy Kamkar
759:Individuals
724:Level Seven
687:Ac1db1tch3z
666:(2008–2010)
565:(2003–2006)
357:SC Magazine
135: 2019
131: 1999
84:August 2023
76:introducing
1282:Categories
903:discovered
890:darksun.ws
885:unkn0wn.eu
793:Lil Hacker
739:ShadowCrew
664:WebcamGate
563:Titan Rain
288:2009-05-09
192:References
183:LexisNexis
150:LexisNexis
133: – c.
51:references
1197:Conficker
1176:Agent.btz
704:Avalanche
692:Anonymous
549:Incidents
476:. MSNBC.
408:. adweek.
383:, Sophos.
222:Footnotes
1202:Koobface
1181:Mariposa
1129:Stration
1124:Clickbot
1088:PGPCoder
1036:Graybird
974:Code Red
948:ILOVEYOU
922:sslstrip
880:ryan1918
857:Darknets
848:Stakkato
786:Digerati
782:Dshocker
749:Sandworm
719:GhostNet
532:Timeline
446:original
442:NBC News
144:Hacking
68:libelous
1207:Waledac
1114:Rustock
1041:Blaster
1021:Welchia
953:Pikachu
933:Malware
803:camZero
341:. CNBC.
171:camZero
72:improve
1171:Asprox
1072:Mydoom
1067:Sasser
1062:NetSky
1000:Simile
924:(2009)
918:(2008)
912:(2002)
818:diabl0
813:Cyxymu
808:Coolio
777:SilenZ
679:Groups
210:
175:cmuNNY
161:, aka
53:, but
1145:Storm
1057:Bagle
1031:Gruel
1026:Sobig
979:Nimda
767:AKill
714:0x1fe
537:2010s
527:1990s
457:Wired
43:This
1239:stub
1190:2009
1164:2008
1150:ZeuS
1138:2007
1119:ZLOB
1107:2006
1093:Samy
1081:2005
1050:2004
1009:2003
993:2002
984:Klez
962:2001
941:2000
798:BadB
709:GNAA
646:2009
615:2008
594:2007
578:2005
556:2004
463:USAO
208:ISBN
204:EPUB
167:cam0
163:camo
734:RBN
478:MP3
1284::
455:.
440:.
429:.
415:.
390:.
379:.
366:.
355:.
274:.
260:^
251:.
173:,
169:,
165:,
128:c.
1270:e
1263:t
1256:v
1245:.
507:e
500:t
493:v
459:.
433:.
419:.
394:.
359:.
305:.
291:.
249:"
245:"
216:.
202:(
97:)
91:(
86:)
82:(
60:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.