Knowledge (XXG)

List of cybercriminals

Source 📝

574: 566:. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or 593: 615:. Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around. They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. As the computer industry matured, individuals with malicious intentions ( 863:. He stole from 217 American banks in total stealing $ 400 million and is alleged to have donated all the money to Africa and Palestine, though Trial documents did not mention any donations or charity activities. Despite much false information on the internet Bendelladj did not get sentenced to death, and claims saying he donated any money to charity is almost impossible to verify. The SpyEye software was also sold to other hackers and used as part of a botnet. 3903: 3913: 2068:
Gordon Meyer, a sociologist who has since left academia but continues to be involved in the computer industry (and to publish the Computer Underground Digest), wrote in his seminal paper The Social Organization of the Computer Underground that the "computer underground consists of actors in three
998:
Accused of causing 63 million dollar in damages. Primarily for his role in trafficking credit cards he obtained by hacking other hackers. Pleaded guilty to conspiracy to commit access device fraud and bank fraud, access device fraud, bank fraud, intentional damage to a protected computer, and
969:
Pleaded guilty to five counts of "unauthorised acts with intent to impair operation of or prevent/hinder access to a computer", two of "unauthorised computer access with intent to commit other offences", one of "unauthorised computer access with intent to commit other offences", and one of
2873: 650:, was sentenced to two years of probation. In May 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of 1445:
Pleaded guilty to theft and hacking offenses which fall under the Computer Misuse Act and six charges of intentionally accessing sites containing credit card details and using this information for financial gain
1094:
Pleaded guilty to four federal charges of violating United States Code Section 1030, Fraud and Related Activity in Connection with Computers, specifically subsections (a)(5)(A)(i), 1030 (a)(5)(B)(i) and 1030(b)
854:
Pleaded guilty to one count of conspiring to commit wire and bank fraud, 10 counts of wire fraud, one count of conspiring to commit computer fraud and abuse, and 11 counts of computer fraud and abuse
812:
Convicted of 38 counts involving unauthorized access of business information systems and stealing over two million credit card numbers. Pleaded guilty to conspiracy to commit bank fraud.
2590:"Russian Cyber-Criminal Sentenced to 14 Years in Prison for Role in Organized Cybercrime Ring Responsible for $ 50 Million in Online Identity Theft and $ 9 Million Bank Fraud Conspiracy" 1474:
Admitted to cracking US and Israeli computers, and pleaded guilty to conspiracy, wrongful infiltration of computerized material, disruption of computer use and destroying evidence
4130: 2441: 3084: 1452:
Three years of psychiatric treatment after evidence emerged that he was suffering from a mental condition which needed medical treatment rather than incarceration
3054: 3150: 2890: 2589: 1961: 3116: 537: 2547: 3360: 1851:
Intentional access of federal interest computers without authorization thereby preventing authorized access and causing a loss in excess of US$ 1,000
1336: 1157:
Pleaded guilty on August 11, 2004, to one count of intentionally causing or attempting to cause damage to a protected computer via his version of the
2495: 2837: 34: 2874:"Study for an Impact Assessment on a Proposal for a New Legal Framework on Identity Theft - European Commission (Fortezza mentioned as example)" 2714: 1940: 639: 3656: 1027:
On November 20, 2012, was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization
367: 3449: 4177: 3614: 3776: 3742: 3715: 3278: 3024: 2625: 2470: 3274: 3020: 1125:
Pleaded guilty to hacking into the cell-phone account of celebrity Paris Hilton and participated in an attack on data-collection firm
61: 4108: 3692: 3195: 2416: 2235: 2141: 2035: 2006: 2449: 3711: 1857:
Three years probation and 400 hours of community service in a manner determined by the Probation Office and approved by the Court
4172: 2056: 1488: 1423:
Eight months "open custody", by the Montreal Youth Court, one year of probation, restricted use of the Internet and a small fine
1387: 1372: 818:
Sentenced to 27 years' imprisonment for the 2016 conviction, concurrent with sentence of 14 years for the second set of charges
3834: 3453: 257: 78: 1236: 635: 530: 2520: 30: 3094: 976:
and said to have penetrated the servers of Department of Defense (DoD), Pentagon, NASA, NSA, other UK government websites.
2688: 2645: 470: 267: 150: 140: 1752:
15 charges including trespassing on the University of Texas computer network, altering data at NASA and the theft of the
1072:
Three years of formal probation, 90 days of community service, restitution paid to MySpace, restrictions on computer use
38: 1480:
Six months of community service, one year of probation, a two-year suspended prison sentence and fined about US$ 18,000
177: 165: 2971: 2337:"Hacker Sentenced to Prison for Breaking into Lowe's Companies' Computers with Intent to Steal Credit Card Information" 2336: 2108: 1534:
which caused service outages at a number of colleges and universities; victims were young males from whom he solicited
4182: 4077: 2085: 832:
Nine counts of Illegal Computer Trespass to computers and one count of money laundering for an amount of $ 25 million
692:, 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals, and 68 months for 252: 4049: 3062: 2173: 1597:
Four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication
3211: 3164: 1793:
One year and six months suspended sentence, 300 hours of community service and psychiatric assessment and treatment
2390: 1773: 1753: 1332: 944: 890: 604: 489: 227: 3538: 3124: 2771:Суд над арестованными в США по обвинению в кибермошенничестве российскими студентами завершится в ближайшие месяцы 3370: 523: 272: 3334: 2891:"Dutch Citizen Sentenced to 12 Years in Prison for Computer Hacking Scheme that Stole and Sold Credit Card Info" 2081: 857: 739: 678: 448: 407: 377: 327: 2565: 611:
underground, criminal convictions were rare because there was an informal code of ethics that was followed by
3643:
Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
2769: 1657:
Pleaded guilty to seven counts of mail, wire and computer fraud, money laundering and obstruction of justice
972:
Hacking attempt on the websites of Kent Police, Cambridge University and Oxford University. Former member of
4167: 1671: 1300: 1285: 1227: 1158: 1143: 187: 3480: 4078:"Two who raided computers pleading guilty—Late City Final Edition, Section 1, Page 6, Column 1, 383 words" 2853: 2818: 2722: 1898: 655: 442: 3308: 1211:
Six months detention at his parents' home plus two years probation and roughly US$ 65,000 in restitution
3160: 3117:"Blaster-B worm author sentenced to 18 months in jail - but bigger villain remains free, Sophos reports" 1801: 1080: 911: 666: 643: 3423: 2832: 1625:
31 charges of hacking and related charges. Pleaded guilty to 25 charges, the remaining 6 were dropped.
4138: 2943: 2916: 1992: 1837: 1567: 460: 402: 322: 2792: 1033:
Auernheimer was sentenced to 41 months in federal prison and ordered to pay $ 73,000 in restitution
17: 3365: 2694: 2445: 2420: 2309: 2146: 1611: 1239:) computer viruses. Charged and arrested for computer data sabotage against internet security firm 764:
Conspiracy to commit access device fraud, access device fraud, and possession of child pornography
437: 262: 172: 3871: 3457: 1386:
Spreading data into a computer network with the intention of causing damage as the creator of the
4082: 4054: 2548:"Russian Cyber-Criminal Sentenced to 27 Years in Prison for Hacking and Credit Card Fraud Scheme" 2178: 1738: 1219: 1202: 1013: 784:
Conspiring to commit computer fraud, computer fraud, and two counts of aggravated identity theft
3684: 3677: 1823:
and 2 counts of computer fraud and three counts of interstate transportation of stolen property
3393: 2362: 4124: 3908: 3688: 3652: 3648: 3618: 3191: 2231: 2031: 2002: 1998: 1762: 1632: 1257: 900: 634:. In that case, six teenagers broke into a number of high-profile computer systems, including 563: 432: 395: 362: 3785: 3751: 3244: 937:. It is estimated that with nine other people Svechinskaya had skimmed $ 3 million in total. 3810: 3398: 3282: 3028: 3021:""Botherder" Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code" 2367: 2314: 2286: 2281: 1516: 1309:
20 months in federal prison, US$ 5,000 fine and 100 hours of community service upon release
886: 843: 616: 612: 412: 113: 3805: 3595: 3566: 2521:"Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm | SecurityWeek.Com" 1915:
Two weeks jail sentence, 200 hours community service, two years probation, fined US$ 2,000
3155: 2841: 1816: 1335:
of all time," although McKinnon himself states that he was merely looking for evidence of
1111: 1103:
Restitution of US$ 15,000 to the U.S. federal government for infecting military computers
987: 930: 685: 670: 192: 83: 52: 2151: 3719: 1943:
in New York and a Los Angeles bank and two counts of "making harassing telephone calls"
33:
and may never be able to satisfy particular standards for completeness. You can help by
3505: 2227: 1987: 1552: 1460: 1354: 1189: 926: 798: 727: 567: 555: 501: 332: 285: 215: 96: 73: 4161: 3838: 3641: 3534: 3240: 2496:"Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft" 2259: 2255: 2113: 1787:
Trespassing on the University of Texas computer network and theft of the ZARDOZ file
1643: 1583: 1535: 1403: 1317: 875: 693: 627: 586: 582: 337: 232: 129: 3842: 3683:(November 2003 ed.). Checkmark Books, an imprint of Facts on File Inc. p.  2993: 622:
Convictions of computer crimes, or hacking, began as early as 1984 with the case of
573: 3966: 3940: 3089: 2743: 2674: 2668: 1431: 955: 756: 425: 292: 245: 100: 3962: 2749: 2592:(Press release). Washington, D.C.: U.S. Department of Justice. November 30, 2017 1862: 1361: 1357: 1174: 1041: 578: 495: 382: 119: 3778:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3744:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3188:
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
3249: 1699: 1635:
2,100 to ANU (to be paid in 3 months time) and a A$ 5,000 good-behaviour bond
1531: 1197: 1126: 1056: 689: 596: 551: 352: 347: 124: 2917:"Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data" 2340: 1055:
Pleaded guilty to violating California Penal Code 502(c)(8) for creating the
742:
crimes, breaching a Sexual Harm Prevention Order, conspiracy to commit fraud
3936: 3571: 3275:"Creator of Melissa Computer Virus Sentenced to 20 Months in Federal Prison" 2793:"US court frees "world's sexiest computer hacker" prosecuted for bank fraud" 2027: 1894: 1193: 677:. He then sold the botnets to the highest bidder, who in turn used them for 651: 631: 559: 372: 222: 202: 107: 68: 2052: 1101:
57 months in prison, forfeit a 1993 BMW and more than US$ 58,000 in profit
1005:
Extradited from Romania and sentenced to 144 months in U.S. federal prison
947:
and was released under $ 25,000 bail. Ordered to pay $ 35,000 in damages.
929:
to attack thousands of bank accounts and opened at least five accounts in
619:) would emerge to exploit computer systems for their own personal profit. 2718: 2394: 1931: 1923: 1902: 1340: 1059: 973: 934: 659: 647: 623: 608: 466: 197: 145: 3529: 3527: 838:
Two months jail sentence before they let him go due to lack of evidence
592: 3876: 1820: 1063: 454: 342: 317: 310: 182: 4031:
Hopkins, Jack (7 May 1986). "Computer intruder gets 2 weeks in jail".
2471:"Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft" 3212:"Female virus-writer, Gigabyte, arrested in Belgium, Sophos comments" 3120: 1906: 1249:
Released within 24 hours on bail due to being a minor (17 years old)
1240: 860: 674: 508: 357: 297: 135: 4109:"Hacker High: 10 Stories of Teenage Hackers Getting into the System" 3978:
Under the plea agreements, ... Rose ... will serve a year in prison.
1724:
One count of computer trespass and one count of computer conspiracy
1353:
On 16 October 2012, after a series of legal proceedings in Britain,
1129:
Group that exposed personal records of more than 300,000 consumers
688:
for 20 years. The next longest sentences are those of 13 years for
2745:Россиянку, подозреваемую в США в мошенничестве, отпустят под залог 1713:
Misdemeanor theft-of-service for a free-call scam to a 900 number
1575:
Six-month prison sentence and probation until the age of eighteen
1544:
Fined $ 5,000 (USD) and sentenced to six months in federal prison
1235:
Wrote the Coconut-A, Sahay-A, and Sharp-A (first virus written in
591: 572: 3994: 1663:
51 months in prison and ordered to pay US$ 56,000 in restitution
1347:
activity and other technologies potentially useful to the public
1508:
Nine months in jail and US$ 5,000 in restitution to each victim
1271:
Admitted the hacking and pleaded guilty to two felonies in 2004
684:
As of 2012, the longest sentence for computer crimes is that of
4016:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2670:
Algerijnse hacker star van amerikanen en schonk aan palestijnen
2610:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2201:
Emery, Julie (7 May 1986). "Light jail term for young hacker".
2069:
roles – computer hackers, phone phreaks, and software pirates."
1331:
Accused in 2002 of perpetrating the "biggest military computer
1277:
Sentenced to time served after spending seven months in prison
665:
In 2006, a prison term of nearly five years was handed down to
3418: 3416: 2646:"Hamza Bendelladj: Is the Algerian hacker a hero? | News" 2442:"TalkTalk hacker Elliott Gunton jailed in cryptocurrency scam" 1344: 3912:. Business; PART-D; Financial Desk. p. 2. Archived from 2417:"Three Norwich schools probed for weakness by teenage hacker" 1631:
A recorded conviction on all counts, a reparation payment of
1299:
Pleaded guilty to knowingly spreading a computer virus, the
3835:"Q&A: Mark Abene, from 'Phiber Optik' to security guru" 2854:"Feds Arrest 'Kurupt' Carding Kingpin? – Krebs on Security" 2819:
Is Department of Defense (DoD), Pentagon, NASA, NSA secure?
550:
Convicted computer criminals are people who are caught and
4142: 3309:"Kournikova virus kiddie gets 150 hours community service" 2566:"Russian Hacker Sentenced to 27 Years in Credit Card Case" 1893:
Four counts of Illegal Computer Trespass to computers at:
1765:
1,000 good-behaviour bond and 500 hours community service
3302: 3300: 3019:
Debra Wong Chang - United States Attorney (May 8, 2006).
1603:
46 months in federal prison and US$ 4,125 in restitution
1135:
11 months in a Massachusetts juvenile detention facility
3712:"Kevin Mitnick sentenced to nearly four years in prison" 3190:. Hershey, PA: Business Science Reference. p. 146. 2391:"Kevin Mitnick Sentenced to Nearly Four Years in Prison" 3235: 3233: 1166:
18 months in prison and 100 hours of community service
3679:
The Encyclopedia of High-Tech Crime and Crime-Fighting
2053:"The electronic discourse of the computer underground" 3904:"Hacker Enters Guilty Plea in Theft of Computer Data" 3245:"Court Okays Counter-Hack of eBay Hacker's Computer" 2216: 2214: 2212: 903:
plus forty years, without the possibility of parole
2339:. cybercrime.gov. December 15, 2004. Archived from 1417:Pleaded guilty to 56 charges of "mischief to data" 3676: 3640: 3144: 3142: 2690:В деле о хакерах таблоиды США нашли вторую Чэпман 4129:: CS1 maint: bot: original URL status unknown ( 2833:Man jailed for attempting to compromise websites 2559: 2557: 2393:. cybercrime.gov. August 9, 1999. Archived from 4044: 4042: 3897: 3895: 3567:"Hacker sentenced, must program jail computers" 3186:Holt, Thomas J.; Schell, Bernadette H. (2011). 2972:"MySpace speaks about Samy Kamkar's sentencing" 2715:"Kristina Svechinskaya: Accused Russian Hacker" 2626:"Hacker Hamza Bendelladj sentenced to 15 years" 2310:"Record 13-Year Sentence for Hacker Max Vision" 1538:who had stopped co-operating with his requests 3539:"Solar Sunrise hacker 'Analyzer' escapes jail" 2109:"FBI'S web site socked as hackers target feds" 531: 8: 4111:. Archived from the original on 1 March 2016 2836:, Kent Police, United Kingdom, 16 May 2013. 2249: 2247: 1995:—Law and Disorder on the Electronic Frontier 1962:Timeline of computer security hacker history 1905:Truck Co. and Resources Conservation Co. (a 673:to do his bidding via giant bot networks or 3800: 3798: 3561: 3559: 3335:"Anna Kournikova virus author stands trial" 3048: 3046: 2584: 2582: 2542: 2540: 1982: 1980: 1978: 1976: 970:"unauthorised access to computer material". 3995:"Judgment in U.S. v. Robert Tappan Morris" 3085:"Teen Pleds Guilty in Blaster Worm Attack" 2135: 2133: 2131: 1685:Writing and distributing computer viruses 703: 538: 524: 43: 3866: 3864: 3862: 3860: 3151:"Hacker Lamo Sentenced To Home Detention" 3806:"Phiber Optik Goes to Prison—Issue 2.04" 3706: 3704: 3269: 3267: 1939:Unauthorized access to computers at the 3988: 3986: 3937:"Legion of Doom's "Terminus" sentenced" 3670: 3668: 2966: 2964: 2944:"iPad Hack Statement Of Responsibility" 1972: 748:3½ years of imprisonment (most recent) 721: 715: 599:, who was convicted of computer charges 51: 4122: 3993:Ronald B. Standler (August 14, 2002). 3361:"Kournikova Virus Writer Found Guilty" 1024:United States (at time of sentencing) 893:, and conspiracy to traffic narcotics 745:November 2016; August 2019; July 2024 3594:Scoblionkov, Deborah (5 April 2001). 3394:"February 7, 2000: Mafiaboy's Moment" 3307:Robert Blincoe (September 27, 2001). 2024:Hackers: Crime in the Digital Sublime 1815:Illicit use of proprietary software ( 7: 3575:. Associated Press. February 6, 2002 2308:Poulsen, Kevin (February 12, 2010). 2282:"TJX Hacker Gets 20 Years in Prison" 1879:One to two years suspended sentence 18:List of convicted computer criminals 3716:United States Department of Justice 3506:"Teen hacker escapes jail sentence" 3279:United States Department of Justice 3025:United States Department of Justice 2994:"American owns up to hijacking PCs" 2363:"Crazy-Long Hacker Sentence Upheld" 880:altoid/frosty/Dread Pirate Roberts 646:. On May 1, 1984, one of the 414s, 258:forensics-focused operating systems 3902:Henry Weinstein (March 23, 1991). 3615:"Who Was Educating Your Children?" 3481:"'Bill Gates' hacker escapes jail" 3359:Joris Evers (September 28, 2001). 3333:John Leyden (September 14, 2001). 3123:. January 28, 2005. Archived from 2774:(in Russian). Information Security 2564:Perlroth, Nicole (21 April 2017). 2254:Robert Vamosi (January 27, 2006). 1303:, with the intent to cause damage 25: 4139:"CUSSE List of Convicted Hackers" 3961:Rodney Hoffman (March 31, 1991). 3935:Rodney Hoffman (March 27, 1991). 3149:George V. Hulme (July 15, 2004). 3093:. August 12, 2004. Archived from 3053:Brian Krebs (February 27, 2007). 2915:Zetter, Kim (November 20, 2012). 2256:"Cybercrime does pay; here's how" 662:. and Resources Conservation Co. 3784:. pp. 48–49. Archived from 3750:. pp. 48–49. Archived from 3718:. August 9, 1999. Archived from 2942:Zetter, Kim (January 23, 2013). 2107:Brian Blomquist (May 29, 1999). 2057:Florida International University 3617:. Antonnews.com. Archived from 3454:Federal Bureau of Investigation 2677:, édition du 22 septembre 2015. 2140:Andrew Brandt (April 2, 2001). 1502:Misdemeanor charges of hacking 815:August 2016 and September 2017 770:20 years of supervised release 679:denial-of-service (DoS) attacks 79:Hacking of consumer electronics 4033:The Seattle Post Intelligencer 3833:Elinor Mills (June 23, 2009). 3392:Tony Long (February 7, 2007). 2822:, TheHackerNews, May 14, 2011. 2448:. 26 July 2024. Archived from 2280:Zetter, Kim (March 25, 2010). 1719:35 hours of community service 636:Los Alamos National Laboratory 1: 3424:"Mafiaboy given eight months" 3281:. May 1, 2002. Archived from 2026:(November 3, 1999 ed.). 1941:Sloan-Kettering Cancer Center 1761:One-year suspended sentence: 640:Sloan-Kettering Cancer Center 3479:John Leyden (July 6, 2001). 3456:. April 2003. Archived from 2974:. TechSpot. January 31, 2007 2226:(August 23, 2005 ed.). 2082:"Interview with Chris Davis" 1884:Michael Princeton Wilkerson 1866: 1395:150 hours community service 1181: 918: 777: 178:Chaos Communication Congress 4178:Hacking (computer security) 3450:"FBI Facts and Figure 2003" 3055:"They'll Always Have Paris" 2840:September 25, 2013, at the 2086:Public Broadcasting Service 1364:order to the United States 999:aggravated identity theft. 4199: 3775:Dreyfus, Suelette (1997). 3741:Dreyfus, Suelette (1997). 3639:McWilliams, Brian (2004). 3602:. Philadelphia City Paper. 3161:United Business Media, Inc 2030:; 1 edition. p. 200. 1873:Found guilty of espionage 945:personal recognizance bond 669:, who created hundreds of 490:2600: The Hacker Quarterly 228:List of computer criminals 28: 4050:"Computer User Sentenced" 3963:"Correction Re: Terminus" 3880:. Melbourne. May 25, 2003 2174:"Computer User Sentenced" 1997:(January 1994 ed.). 1709: 1706: 1695: 823:Pascal van den Essenburg 790:57 months federal prison 718: 712: 706: 2770: 2744: 2689: 2575:– via NYTimes.com. 753:Conor Brian Fitzpatrick 709: 408:Cloud computing security 4173:Computing-related lists 3675:Michael Newton (2004). 2222:Richard Gissel (2005). 1829:One-year jail sentence 1730:One-year jail sentence 1337:free energy suppression 1066:social networking site 1062:that spread across the 982:Two years imprisonment 889:, conspiracy to commit 870:15 years jail sentence 570:) and electronic fraud. 188:Hackers on Planet Earth 2687:Козловский, Владимир. 2051:Steve Mizrach (2009). 856:He is a co-creator of 603:In the infancy of the 600: 589: 558:such as breaking into 443:Homebrew Computer Club 3722:on September 26, 2009 3596:"Who's Laughing Now?" 1388:Anna Kournikova virus 1159:Blaster computer worm 1081:Jeanson James Ancheta 912:Kristina Svechinskaya 667:Jeanson James Ancheta 644:Security Pacific Bank 595: 576: 3872:"Hack to the future" 3430:. September 13, 2001 2525:www.securityweek.com 2397:on December 19, 2011 2343:on November 30, 2011 2022:Paul Taylor (1999). 1993:The Hacker Crackdown 1949:Two years probation 1838:Robert Tappan Morris 1691:18 months in prison 1568:juvenile delinquency 461:Masters of Deception 403:Application security 35:adding missing items 3916:on October 20, 2012 3373:on January 31, 2013 3167:on January 22, 2009 3059:The Washington Post 2695:BBC Russian Service 2446:Eastern Daily Press 2421:Eastern Daily Press 1612:Julian Paul Assange 740:Computer Misuse Act 719:Sentencing date(s) 607:subculture and the 438:Chaos Computer Club 173:Black Hat Briefings 47:Part of a series on 4183:Lists of criminals 4083:The New York Times 4055:The New York Times 3285:on August 20, 2006 3218:. 16 February 2004 3127:on August 19, 2009 3000:. January 24, 2006 2224:Digital Underworld 2179:The New York Times 1739:Nahshon Even-Chaim 1572:21 September 2000 1420:12 September 2001 1392:27 September 2001 1220:Kimberley Vanvaeck 1203:The New York Times 1144:Jeffrey Lee Parson 1132:13 September 2005 1014:Andrew Auernheimer 738:Money laundering, 700:Computer criminals 601: 590: 268:Social engineering 4018:The Seattle Times 3909:Los Angeles Times 3845:on August 5, 2009 3658:978-0-596-00732-4 3537:(June 15, 2001). 3460:on March 26, 2007 3243:(April 6, 2007). 2612:The Seattle Times 2203:The Seattle Times 1999:Project Gutenberg 1953: 1952: 1876:15 February 1990 1258:Jerome Heckenkamp 1246:16 February 2004 1057:"Samy is my hero" 1030:20 November 2012 927:Zeus Trojan horse 925:Accused of using 901:life imprisonment 660:Kenworth Truck Co 613:white hat hackers 564:computer networks 548: 547: 396:Computer security 363:Keystroke logging 16:(Redirected from 4190: 4154: 4152: 4150: 4141:. Archived from 4134: 4128: 4120: 4118: 4116: 4096: 4095: 4093: 4091: 4086:. March 17, 1984 4074: 4068: 4067: 4065: 4063: 4046: 4037: 4036: 4028: 4022: 4021: 4013: 4007: 4006: 4004: 4002: 3990: 3981: 3980: 3975: 3973: 3958: 3952: 3951: 3949: 3947: 3932: 3926: 3925: 3923: 3921: 3899: 3890: 3889: 3887: 3885: 3868: 3855: 3854: 3852: 3850: 3841:. Archived from 3830: 3824: 3823: 3821: 3819: 3802: 3793: 3792: 3790: 3783: 3772: 3766: 3765: 3763: 3762: 3756: 3749: 3738: 3732: 3731: 3729: 3727: 3708: 3699: 3698: 3682: 3672: 3663: 3662: 3646: 3636: 3630: 3629: 3627: 3626: 3610: 3604: 3603: 3591: 3585: 3584: 3582: 3580: 3563: 3554: 3553: 3551: 3549: 3531: 3522: 3521: 3519: 3517: 3502: 3496: 3495: 3493: 3491: 3476: 3470: 3469: 3467: 3465: 3446: 3440: 3439: 3437: 3435: 3420: 3411: 3410: 3408: 3406: 3389: 3383: 3382: 3380: 3378: 3369:. Archived from 3356: 3350: 3349: 3347: 3345: 3330: 3324: 3323: 3321: 3319: 3304: 3295: 3294: 3292: 3290: 3271: 3262: 3261: 3259: 3257: 3237: 3228: 3227: 3225: 3223: 3208: 3202: 3201: 3183: 3177: 3176: 3174: 3172: 3163:. Archived from 3156:Information Week 3146: 3137: 3136: 3134: 3132: 3113: 3107: 3106: 3104: 3102: 3081: 3075: 3074: 3072: 3070: 3061:. Archived from 3050: 3041: 3040: 3038: 3036: 3027:. Archived from 3016: 3010: 3009: 3007: 3005: 2990: 2984: 2983: 2981: 2979: 2968: 2959: 2958: 2956: 2954: 2939: 2933: 2932: 2930: 2928: 2912: 2906: 2905: 2903: 2902: 2887: 2881: 2880: 2878: 2870: 2864: 2863: 2861: 2860: 2850: 2844: 2829: 2823: 2815: 2809: 2808: 2806: 2804: 2789: 2783: 2782: 2780: 2779: 2766: 2760: 2759: 2757: 2756: 2740: 2734: 2733: 2731: 2730: 2725:on July 24, 2012 2721:. Archived from 2711: 2705: 2704: 2702: 2701: 2684: 2678: 2666: 2660: 2659: 2657: 2656: 2642: 2636: 2635: 2633: 2632: 2622: 2616: 2615: 2607: 2601: 2600: 2598: 2597: 2586: 2577: 2576: 2574: 2572: 2561: 2552: 2551: 2544: 2535: 2534: 2532: 2531: 2517: 2511: 2510: 2508: 2507: 2492: 2486: 2485: 2483: 2482: 2467: 2461: 2460: 2458: 2457: 2438: 2432: 2431: 2429: 2428: 2413: 2407: 2406: 2404: 2402: 2387: 2381: 2380: 2378: 2376: 2359: 2353: 2352: 2350: 2348: 2333: 2327: 2326: 2324: 2322: 2305: 2299: 2298: 2296: 2294: 2277: 2271: 2270: 2268: 2266: 2251: 2242: 2241: 2218: 2207: 2206: 2198: 2192: 2191: 2189: 2187: 2170: 2164: 2163: 2161: 2159: 2150:. Archived from 2137: 2126: 2125: 2123: 2121: 2104: 2098: 2097: 2095: 2093: 2078: 2072: 2071: 2065: 2063: 2048: 2042: 2041: 2019: 2013: 2012: 1984: 1928: 1927: 1926: 1842: 1841: 1840: 1806: 1805: 1804: 1778: 1777: 1776: 1743: 1742: 1741: 1704: 1703: 1702: 1679:The Black Baron 1676: 1675: 1674: 1648: 1647: 1646: 1628:5 December 1996 1616: 1615: 1614: 1588: 1587: 1586: 1557: 1556: 1555: 1530:Found guilty of 1521: 1520: 1519: 1493: 1492: 1491: 1465: 1464: 1463: 1436: 1435: 1434: 1408: 1407: 1406: 1377: 1376: 1375: 1322: 1321: 1320: 1290: 1289: 1288: 1262: 1261: 1260: 1224: 1223: 1222: 1179: 1178: 1177: 1163:28 January 2005 1148: 1147: 1146: 1116: 1115: 1114: 1085: 1084: 1083: 1046: 1045: 1044: 1018: 1017: 1016: 1002:1 February 2013 960: 959: 958: 916: 915: 914: 891:computer hacking 887:money laundering 844:Hamza Bendelladj 803: 802: 801: 704: 671:zombie computers 656:Sundstrand Corp. 540: 533: 526: 413:Network security 114:Hacker Manifesto 53:Computer hacking 44: 39:reliable sources 21: 4198: 4197: 4193: 4192: 4191: 4189: 4188: 4187: 4158: 4157: 4148: 4146: 4137: 4121: 4114: 4112: 4107: 4104: 4099: 4089: 4087: 4076: 4075: 4071: 4061: 4059: 4048: 4047: 4040: 4030: 4029: 4025: 4015: 4014: 4010: 4000: 3998: 3992: 3991: 3984: 3971: 3969: 3960: 3959: 3955: 3945: 3943: 3934: 3933: 3929: 3919: 3917: 3901: 3900: 3893: 3883: 3881: 3870: 3869: 3858: 3848: 3846: 3832: 3831: 3827: 3817: 3815: 3804: 3803: 3796: 3788: 3781: 3774: 3773: 3769: 3760: 3758: 3754: 3747: 3740: 3739: 3735: 3725: 3723: 3710: 3709: 3702: 3695: 3674: 3673: 3666: 3659: 3638: 3637: 3633: 3624: 3622: 3612: 3611: 3607: 3600:mycitypaper.com 3593: 3592: 3588: 3578: 3576: 3565: 3564: 3557: 3547: 3545: 3533: 3532: 3525: 3515: 3513: 3504: 3503: 3499: 3489: 3487: 3478: 3477: 3473: 3463: 3461: 3448: 3447: 3443: 3433: 3431: 3422: 3421: 3414: 3404: 3402: 3391: 3390: 3386: 3376: 3374: 3358: 3357: 3353: 3343: 3341: 3332: 3331: 3327: 3317: 3315: 3306: 3305: 3298: 3288: 3286: 3273: 3272: 3265: 3255: 3253: 3239: 3238: 3231: 3221: 3219: 3210: 3209: 3205: 3198: 3185: 3184: 3180: 3170: 3168: 3148: 3147: 3140: 3130: 3128: 3115: 3114: 3110: 3100: 3098: 3083: 3082: 3078: 3068: 3066: 3065:on May 16, 2011 3052: 3051: 3044: 3034: 3032: 3031:on May 31, 2009 3018: 3017: 3013: 3003: 3001: 2992: 2991: 2987: 2977: 2975: 2970: 2969: 2962: 2952: 2950: 2941: 2940: 2936: 2926: 2924: 2914: 2913: 2909: 2900: 2898: 2895:www.justice.gov 2889: 2888: 2884: 2876: 2872: 2871: 2867: 2858: 2856: 2852: 2851: 2847: 2842:Wayback Machine 2830: 2826: 2816: 2812: 2802: 2800: 2791: 2790: 2786: 2777: 2775: 2772: 2768: 2767: 2763: 2754: 2752: 2746: 2742: 2741: 2737: 2728: 2726: 2713: 2712: 2708: 2699: 2697: 2691: 2686: 2685: 2681: 2667: 2663: 2654: 2652: 2644: 2643: 2639: 2630: 2628: 2624: 2623: 2619: 2609: 2608: 2604: 2595: 2593: 2588: 2587: 2580: 2570: 2568: 2563: 2562: 2555: 2546: 2545: 2538: 2529: 2527: 2519: 2518: 2514: 2505: 2503: 2500:www.justice.gov 2494: 2493: 2489: 2480: 2478: 2475:www.justice.gov 2469: 2468: 2464: 2455: 2453: 2452:on 26 July 2024 2440: 2439: 2435: 2426: 2424: 2415: 2414: 2410: 2400: 2398: 2389: 2388: 2384: 2374: 2372: 2371:. July 11, 2006 2361: 2360: 2356: 2346: 2344: 2335: 2334: 2330: 2320: 2318: 2307: 2306: 2302: 2292: 2290: 2279: 2278: 2274: 2264: 2262: 2253: 2252: 2245: 2238: 2230:. p. 222. 2221: 2219: 2210: 2200: 2199: 2195: 2185: 2183: 2172: 2171: 2167: 2157: 2155: 2139: 2138: 2129: 2119: 2117: 2106: 2105: 2101: 2091: 2089: 2080: 2079: 2075: 2061: 2059: 2050: 2049: 2045: 2038: 2021: 2020: 2016: 2009: 2001:. p. 336. 1986: 1985: 1974: 1970: 1958: 1922: 1921: 1920: 1836: 1835: 1834: 1819:code) owned by 1800: 1799: 1798: 1772: 1771: 1770: 1737: 1736: 1735: 1698: 1697: 1696: 1682:United Kingdom 1670: 1669: 1668: 1642: 1641: 1640: 1610: 1609: 1608: 1582: 1581: 1580: 1551: 1550: 1549: 1536:tickling videos 1515: 1514: 1513: 1487: 1486: 1485: 1459: 1458: 1457: 1442:United Kingdom 1430: 1429: 1428: 1402: 1401: 1400: 1371: 1370: 1369: 1328:United Kingdom 1316: 1315: 1314: 1284: 1283: 1282: 1256: 1255: 1254: 1218: 1217: 1216: 1190:computer crimes 1173: 1172: 1171: 1142: 1141: 1140: 1112:Cameron Lacroix 1110: 1109: 1108: 1102: 1079: 1078: 1077: 1040: 1039: 1038: 1012: 1011: 1010: 992:Fortezza/Xakep 988:David Schrooten 971: 966:United Kingdom 954: 953: 952: 931:Bank of America 910: 909: 908: 797: 796: 795: 735:United Kingdom 702: 686:Albert Gonzalez 556:computer crimes 544: 515: 514: 484: 476: 475: 428: 418: 417: 398: 388: 387: 313: 303: 302: 288: 278: 277: 248: 238: 237: 218: 208: 207: 193:Security BSides 168: 158: 157: 103: 89: 88: 84:List of hackers 64: 42: 23: 22: 15: 12: 11: 5: 4196: 4194: 4186: 4185: 4180: 4175: 4170: 4168:Cybercriminals 4160: 4159: 4156: 4155: 4145:on 30 May 2013 4135: 4103: 4102:External links 4100: 4098: 4097: 4069: 4038: 4023: 4008: 3982: 3953: 3927: 3891: 3856: 3825: 3794: 3791:on 2012-08-21. 3767: 3733: 3700: 3693: 3664: 3657: 3631: 3605: 3586: 3555: 3523: 3512:. July 6, 2001 3497: 3471: 3441: 3412: 3384: 3351: 3325: 3296: 3263: 3241:Poulsen, Kevin 3229: 3203: 3196: 3178: 3138: 3108: 3076: 3042: 3011: 2985: 2960: 2934: 2907: 2882: 2865: 2845: 2824: 2810: 2799:. 24 June 2013 2784: 2761: 2748:(in Russian). 2735: 2706: 2693:(in Russian). 2679: 2661: 2637: 2617: 2602: 2578: 2553: 2536: 2512: 2487: 2462: 2433: 2423:. 5 April 2019 2408: 2382: 2354: 2328: 2300: 2272: 2243: 2236: 2208: 2193: 2165: 2154:on May 1, 2009 2142:"Hacker Speak" 2127: 2099: 2073: 2043: 2036: 2014: 2007: 1988:Bruce Sterling 1971: 1969: 1966: 1965: 1964: 1957: 1954: 1951: 1950: 1947: 1944: 1937: 1936:United States 1934: 1929: 1917: 1916: 1913: 1910: 1901:Data Control, 1891: 1890:United States 1888: 1885: 1881: 1880: 1877: 1874: 1871: 1868: 1865: 1859: 1858: 1855: 1852: 1849: 1848:United States 1846: 1843: 1831: 1830: 1827: 1824: 1813: 1812:United States 1810: 1807: 1795: 1794: 1791: 1788: 1785: 1782: 1779: 1767: 1766: 1759: 1756: 1750: 1747: 1744: 1732: 1731: 1728: 1725: 1721: 1720: 1717: 1714: 1711: 1710:United States 1708: 1705: 1693: 1692: 1689: 1686: 1683: 1680: 1677: 1665: 1664: 1661: 1660:10 April 1995 1658: 1655: 1654:United States 1652: 1649: 1637: 1636: 1629: 1626: 1623: 1620: 1619:Mendax/profff 1617: 1605: 1604: 1601: 1600:9 August 1999 1598: 1595: 1594:United States 1592: 1589: 1577: 1576: 1573: 1570: 1566:Two counts of 1564: 1563:United States 1561: 1558: 1553:Jonathan James 1546: 1545: 1542: 1539: 1532:email bombings 1528: 1527:United States 1525: 1524:Terri DiSisto 1522: 1510: 1509: 1506: 1503: 1500: 1499:United States 1497: 1494: 1482: 1481: 1478: 1475: 1472: 1469: 1466: 1461:Ehud Tenenbaum 1454: 1453: 1450: 1447: 1443: 1440: 1437: 1425: 1424: 1421: 1418: 1415: 1412: 1409: 1397: 1396: 1393: 1390: 1384: 1381: 1378: 1366: 1365: 1355:Home Secretary 1351: 1348: 1329: 1326: 1323: 1311: 1310: 1307: 1304: 1297: 1296:United States 1294: 1291: 1286:David L. Smith 1279: 1278: 1275: 1272: 1269: 1268:United States 1266: 1263: 1251: 1250: 1247: 1244: 1233: 1230: 1225: 1213: 1212: 1209: 1206: 1186: 1185:United States 1183: 1180: 1168: 1167: 1164: 1161: 1155: 1154:United States 1152: 1149: 1137: 1136: 1133: 1130: 1123: 1122:United States 1120: 1117: 1105: 1104: 1099: 1096: 1092: 1091:United States 1089: 1086: 1074: 1073: 1070: 1067: 1053: 1052:United States 1050: 1047: 1035: 1034: 1031: 1028: 1025: 1022: 1019: 1007: 1006: 1003: 1000: 996: 993: 990: 984: 983: 980: 977: 967: 964: 961: 949: 948: 941: 938: 923: 920: 917: 905: 904: 897: 894: 884: 883:United States 881: 878: 872: 871: 868: 867:23 April 2016 865: 852: 849: 846: 840: 839: 836: 833: 830: 827: 824: 820: 819: 816: 813: 810: 807: 804: 799:Roman Seleznev 792: 791: 788: 785: 782: 781:United States 779: 776: 772: 771: 768: 765: 762: 761:United States 759: 754: 750: 749: 746: 743: 736: 733: 730: 728:Elliott Gunton 724: 723: 720: 717: 716:Conviction(s) 714: 711: 708: 701: 698: 568:identity theft 546: 545: 543: 542: 535: 528: 520: 517: 516: 513: 512: 505: 502:Nuts and Volts 498: 493: 485: 482: 481: 478: 477: 474: 473: 464: 458: 452: 449:Legion of Doom 446: 440: 435: 429: 424: 423: 420: 419: 416: 415: 410: 405: 399: 394: 393: 390: 389: 386: 385: 380: 375: 370: 365: 360: 355: 350: 345: 340: 335: 330: 325: 320: 314: 309: 308: 305: 304: 301: 300: 295: 289: 286:Practice sites 284: 283: 280: 279: 276: 275: 270: 265: 260: 255: 249: 244: 243: 240: 239: 236: 235: 230: 225: 219: 216:Computer crime 214: 213: 210: 209: 206: 205: 200: 195: 190: 185: 180: 175: 169: 164: 163: 160: 159: 156: 155: 154: 153: 148: 143: 132: 127: 122: 117: 110: 104: 97:Hacker culture 95: 94: 91: 90: 87: 86: 81: 76: 74:Cryptovirology 71: 65: 60: 59: 56: 55: 49: 48: 24: 14: 13: 10: 9: 6: 4: 3: 2: 4195: 4184: 4181: 4179: 4176: 4174: 4171: 4169: 4166: 4165: 4163: 4144: 4140: 4136: 4132: 4126: 4110: 4106: 4105: 4101: 4085: 4084: 4079: 4073: 4070: 4062:September 11, 4058:. May 1, 1983 4057: 4056: 4051: 4045: 4043: 4039: 4034: 4027: 4024: 4019: 4012: 4009: 3996: 3989: 3987: 3983: 3979: 3968: 3964: 3957: 3954: 3942: 3938: 3931: 3928: 3915: 3911: 3910: 3905: 3898: 3896: 3892: 3879: 3878: 3873: 3867: 3865: 3863: 3861: 3857: 3844: 3840: 3839:CNET Networks 3836: 3829: 3826: 3813: 3812: 3807: 3801: 3799: 3795: 3787: 3780: 3779: 3771: 3768: 3757:on 2011-05-21 3753: 3746: 3745: 3737: 3734: 3721: 3717: 3713: 3707: 3705: 3701: 3696: 3694:0-8160-4978-5 3690: 3686: 3681: 3680: 3671: 3669: 3665: 3660: 3654: 3650: 3645: 3644: 3635: 3632: 3621:on 2013-08-08 3620: 3616: 3609: 3606: 3601: 3597: 3590: 3587: 3574: 3573: 3568: 3562: 3560: 3556: 3548:September 11, 3544: 3540: 3536: 3535:Kevin Poulsen 3530: 3528: 3524: 3516:September 11, 3511: 3507: 3501: 3498: 3490:September 11, 3486: 3482: 3475: 3472: 3459: 3455: 3451: 3445: 3442: 3429: 3425: 3419: 3417: 3413: 3401: 3400: 3395: 3388: 3385: 3372: 3368: 3367: 3362: 3355: 3352: 3340: 3336: 3329: 3326: 3314: 3310: 3303: 3301: 3297: 3284: 3280: 3276: 3270: 3268: 3264: 3252: 3251: 3246: 3242: 3236: 3234: 3230: 3217: 3213: 3207: 3204: 3199: 3197:9781616928056 3193: 3189: 3182: 3179: 3166: 3162: 3158: 3157: 3152: 3145: 3143: 3139: 3126: 3122: 3118: 3112: 3109: 3097:on 2011-06-06 3096: 3092: 3091: 3086: 3080: 3077: 3064: 3060: 3056: 3049: 3047: 3043: 3030: 3026: 3022: 3015: 3012: 2999: 2995: 2989: 2986: 2973: 2967: 2965: 2961: 2949: 2945: 2938: 2935: 2922: 2918: 2911: 2908: 2896: 2892: 2886: 2883: 2875: 2869: 2866: 2855: 2849: 2846: 2843: 2839: 2835: 2834: 2828: 2825: 2821: 2820: 2814: 2811: 2798: 2794: 2788: 2785: 2773: 2765: 2762: 2751: 2747: 2739: 2736: 2724: 2720: 2716: 2710: 2707: 2696: 2692: 2683: 2680: 2676: 2672: 2671: 2665: 2662: 2651: 2647: 2641: 2638: 2627: 2621: 2618: 2613: 2606: 2603: 2591: 2585: 2583: 2579: 2567: 2560: 2558: 2554: 2549: 2543: 2541: 2537: 2526: 2522: 2516: 2513: 2501: 2497: 2491: 2488: 2476: 2472: 2466: 2463: 2451: 2447: 2443: 2437: 2434: 2422: 2418: 2412: 2409: 2396: 2392: 2386: 2383: 2370: 2369: 2364: 2358: 2355: 2342: 2338: 2332: 2329: 2317: 2316: 2311: 2304: 2301: 2289: 2288: 2283: 2276: 2273: 2265:September 11, 2261: 2257: 2250: 2248: 2244: 2239: 2237:1-4116-4423-9 2233: 2229: 2225: 2217: 2215: 2213: 2209: 2204: 2197: 2194: 2186:September 11, 2182:. May 1, 1984 2181: 2180: 2175: 2169: 2166: 2153: 2149: 2148: 2143: 2136: 2134: 2132: 2128: 2116: 2115: 2114:New York Post 2110: 2103: 2100: 2087: 2083: 2077: 2074: 2070: 2058: 2054: 2047: 2044: 2039: 2037:0-415-18072-4 2033: 2029: 2025: 2018: 2015: 2010: 2008:0-553-56370-X 2004: 2000: 1996: 1994: 1989: 1983: 1981: 1979: 1977: 1973: 1967: 1963: 1960: 1959: 1955: 1948: 1945: 1942: 1938: 1935: 1933: 1930: 1925: 1924:Gerald Wondra 1919: 1918: 1914: 1911: 1908: 1904: 1900: 1896: 1892: 1889: 1887:The Sprinter 1886: 1883: 1882: 1878: 1875: 1872: 1869: 1864: 1861: 1860: 1856: 1854:7 March 1991 1853: 1850: 1847: 1844: 1839: 1833: 1832: 1828: 1826:12 June 1991 1825: 1822: 1818: 1814: 1811: 1808: 1803: 1797: 1796: 1792: 1789: 1786: 1783: 1780: 1775: 1774:Richard Jones 1769: 1768: 1764: 1760: 1757: 1755: 1751: 1748: 1745: 1740: 1734: 1733: 1729: 1726: 1723: 1722: 1718: 1715: 1712: 1707:Phiber Optik 1701: 1694: 1690: 1687: 1684: 1681: 1678: 1673: 1667: 1666: 1662: 1659: 1656: 1653: 1650: 1645: 1644:Kevin Poulsen 1639: 1638: 1634: 1630: 1627: 1624: 1621: 1618: 1613: 1607: 1606: 1602: 1599: 1596: 1593: 1590: 1585: 1584:Kevin Mitnick 1579: 1578: 1574: 1571: 1569: 1565: 1562: 1559: 1554: 1548: 1547: 1543: 1540: 1537: 1533: 1529: 1526: 1523: 1518: 1517:David D'Amato 1512: 1511: 1507: 1505:9 March 2001 1504: 1501: 1498: 1495: 1490: 1484: 1483: 1479: 1477:15 June 2001 1476: 1473: 1470: 1467: 1462: 1456: 1455: 1451: 1448: 1444: 1441: 1438: 1433: 1427: 1426: 1422: 1419: 1416: 1413: 1410: 1405: 1404:Michael Calce 1399: 1398: 1394: 1391: 1389: 1385: 1382: 1379: 1374: 1368: 1367: 1363: 1360:withdrew her 1359: 1356: 1352: 1349: 1346: 1342: 1338: 1334: 1330: 1327: 1324: 1319: 1318:Gary McKinnon 1313: 1312: 1308: 1305: 1302: 1301:Melissa virus 1298: 1295: 1292: 1287: 1281: 1280: 1276: 1273: 1270: 1267: 1264: 1259: 1253: 1252: 1248: 1245: 1242: 1238: 1234: 1231: 1229: 1226: 1221: 1215: 1214: 1210: 1208:15 July 2004 1207: 1205: 1204: 1199: 1195: 1191: 1188:One-count of 1187: 1184: 1176: 1170: 1169: 1165: 1162: 1160: 1156: 1153: 1150: 1145: 1139: 1138: 1134: 1131: 1128: 1124: 1121: 1118: 1113: 1107: 1106: 1100: 1097: 1093: 1090: 1087: 1082: 1076: 1075: 1071: 1068: 1065: 1061: 1058: 1054: 1051: 1048: 1043: 1037: 1036: 1032: 1029: 1026: 1023: 1020: 1015: 1009: 1008: 1004: 1001: 997: 994: 991: 989: 986: 985: 981: 978: 975: 968: 965: 962: 957: 951: 950: 946: 942: 940:24 June 2013 939: 936: 932: 928: 924: 921: 913: 907: 906: 902: 898: 895: 892: 888: 885: 882: 879: 877: 876:Ross Ulbricht 874: 873: 869: 866: 864: 862: 859: 853: 850: 847: 845: 842: 841: 837: 834: 831: 828: 825: 822: 821: 817: 814: 811: 808: 805: 800: 794: 793: 789: 786: 783: 780: 774: 773: 769: 767:January 2024 766: 763: 760: 758: 755: 752: 751: 747: 744: 741: 737: 734: 732:Glubz/planet 731: 729: 726: 725: 705: 699: 697: 695: 694:Kevin Mitnick 691: 687: 682: 680: 676: 672: 668: 663: 661: 657: 653: 649: 648:Gerald Wondra 645: 641: 637: 633: 629: 628:414 area code 625: 620: 618: 614: 610: 606: 598: 594: 588: 587:Kevin Poulsen 584: 583:Kevin Mitnick 580: 575: 571: 569: 565: 561: 557: 553: 541: 536: 534: 529: 527: 522: 521: 519: 518: 511: 510: 506: 504: 503: 499: 497: 494: 492: 491: 487: 486: 480: 479: 472: 468: 465: 462: 459: 456: 453: 450: 447: 444: 441: 439: 436: 434: 431: 430: 427: 422: 421: 414: 411: 409: 406: 404: 401: 400: 397: 392: 391: 384: 381: 379: 376: 374: 371: 369: 366: 364: 361: 359: 356: 354: 351: 349: 346: 344: 341: 339: 336: 334: 331: 329: 326: 324: 321: 319: 316: 315: 312: 307: 306: 299: 296: 294: 291: 290: 287: 282: 281: 274: 273:Vulnerability 271: 269: 266: 264: 261: 259: 256: 254: 251: 250: 247: 246:Hacking tools 242: 241: 234: 233:Script kiddie 231: 229: 226: 224: 221: 220: 217: 212: 211: 204: 201: 199: 196: 194: 191: 189: 186: 184: 181: 179: 176: 174: 171: 170: 167: 162: 161: 152: 149: 147: 144: 142: 139: 138: 137: 133: 131: 130:Maker culture 128: 126: 123: 121: 118: 116: 115: 111: 109: 106: 105: 102: 98: 93: 92: 85: 82: 80: 77: 75: 72: 70: 67: 66: 63: 58: 57: 54: 50: 46: 45: 40: 36: 32: 27: 19: 4147:. Retrieved 4143:the original 4115:11 September 4113:. Retrieved 4088:. Retrieved 4081: 4072: 4060:. Retrieved 4053: 4032: 4026: 4017: 4011: 3999:. Retrieved 3977: 3970:. Retrieved 3967:RISKS Digest 3956: 3944:. Retrieved 3941:RISKS Digest 3930: 3918:. Retrieved 3914:the original 3907: 3882:. Retrieved 3875: 3847:. Retrieved 3843:the original 3828: 3816:. Retrieved 3814:. April 1994 3809: 3786:the original 3777: 3770: 3759:. Retrieved 3752:the original 3743: 3736: 3724:. Retrieved 3720:the original 3678: 3642: 3634: 3623:. Retrieved 3619:the original 3613:Rizza, Joe. 3608: 3599: 3589: 3577:. Retrieved 3570: 3546:. Retrieved 3543:The Register 3542: 3514:. Retrieved 3509: 3500: 3488:. Retrieved 3485:The Register 3484: 3474: 3462:. Retrieved 3458:the original 3444: 3432:. Retrieved 3428:The Register 3427: 3403:. Retrieved 3397: 3387: 3375:. Retrieved 3371:the original 3364: 3354: 3342:. Retrieved 3339:The Register 3338: 3328: 3316:. Retrieved 3313:The Register 3312: 3287:. Retrieved 3283:the original 3254:. Retrieved 3248: 3220:. Retrieved 3215: 3206: 3187: 3181: 3169:. Retrieved 3165:the original 3154: 3129:. Retrieved 3125:the original 3111: 3099:. Retrieved 3095:the original 3090:CRN Magazine 3088: 3079: 3067:. Retrieved 3063:the original 3058: 3033:. Retrieved 3029:the original 3014: 3002:. Retrieved 2997: 2988: 2978:December 27, 2976:. Retrieved 2953:February 15, 2951:. Retrieved 2947: 2937: 2927:February 15, 2925:. Retrieved 2921:Threat Level 2920: 2910: 2899:. Retrieved 2897:. 2015-03-09 2894: 2885: 2868: 2857:. Retrieved 2848: 2831: 2827: 2817: 2813: 2801:. Retrieved 2796: 2787: 2776:. Retrieved 2764: 2753:. Retrieved 2738: 2727:. Retrieved 2723:the original 2709: 2698:. Retrieved 2682: 2675:De Standaard 2669: 2664: 2653:. Retrieved 2649: 2640: 2629:. Retrieved 2620: 2611: 2605: 2594:. Retrieved 2569:. Retrieved 2528:. Retrieved 2524: 2515: 2504:. Retrieved 2502:. 2020-08-13 2499: 2490: 2479:. Retrieved 2477:. 2019-11-12 2474: 2465: 2454:. Retrieved 2450:the original 2436: 2425:. Retrieved 2411: 2399:. Retrieved 2395:the original 2385: 2373:. Retrieved 2366: 2357: 2345:. Retrieved 2341:the original 2331: 2319:. Retrieved 2313: 2303: 2291:. Retrieved 2285: 2275: 2263:. Retrieved 2260:CNET Reviews 2223: 2202: 2196: 2184:. Retrieved 2177: 2168: 2156:. Retrieved 2152:the original 2145: 2118:. Retrieved 2112: 2102: 2090:. Retrieved 2076: 2067: 2060:. Retrieved 2046: 2023: 2017: 1991: 1909:subsidiary) 1802:Leonard Rose 1489:Dennis Moran 1449:6 July 2001 1432:Raphael Gray 1383:Netherlands 1201: 995:Netherlands 979:16 May 2013 956:Lewys Martin 896:29 May 2015 858:Trojan horse 855: 829:Netherlands 713:Nationality 683: 664: 621: 602: 581:(left) with 549: 507: 500: 488: 483:Publications 328:Trojan horse 293:HackThisSite 112: 31:dynamic list 26: 2750:RIA Novosti 2401:January 22, 2375:January 22, 2347:January 22, 2321:January 22, 2293:January 22, 1946:1 May 1983 1912:7 May 1986 1863:Markus Hess 1754:ZARDOZ file 1651:Dark Dante 1362:extradition 1358:Theresa May 1306:1 May 2002 1175:Adrian Lamo 1098:8 May 2006 1042:Samy Kamkar 775:Tyler King 757:Pompompurin 579:Adrian Lamo 496:Hacker News 383:Infostealer 166:Conferences 120:Hackerspace 4162:Categories 4149:2 February 4001:August 23, 3884:August 23, 3818:August 23, 3761:2011-09-13 3726:August 23, 3625:2013-05-02 3579:August 23, 3250:Wired News 3171:August 23, 3121:Sophos Plc 2901:2021-08-01 2859:2021-08-01 2778:2011-11-26 2755:2010-12-04 2729:2010-11-02 2700:2010-11-02 2655:2018-05-24 2650:Al Jazeera 2631:2016-05-23 2596:2018-05-26 2530:2022-04-30 2506:2022-04-30 2481:2022-04-30 2456:2024-09-01 2427:2024-09-01 1968:References 1899:Sundstrand 1784:Australia 1749:Australia 1700:Mark Abene 1672:Chris Pile 1622:Australia 1373:Jan de Wit 1198:LexisNexis 1127:LexisNexis 690:Max Butler 617:black hats 597:Mark Abene 353:Logic bomb 348:Ransomware 125:Hacktivism 29:This is a 3572:USA Today 3464:March 27, 3256:April 21, 2028:Routledge 1895:Microsoft 1809:Terminus 1781:Electron 1468:Analyzer 1411:MafiaBoy 1380:OnTheFly 1194:Microsoft 943:Signed a 696:in 1999. 652:Microsoft 632:Milwaukee 626:from the 560:computers 552:convicted 471:Blue team 463:(defunct) 457:(defunct) 451:(defunct) 445:(defunct) 433:Anonymous 373:Web shell 223:Crimeware 203:Summercon 151:White hat 141:Black hat 134:Types of 108:Hackathon 69:Phreaking 4125:cite web 3849:June 28, 3649:O'Reilly 3510:BBC News 3366:PC World 3344:June 22, 3222:9 August 3035:June 22, 3004:June 22, 2998:BBC News 2838:Archived 2719:CBS News 2147:PC World 1990:(1993). 1956:See also 1932:The 414s 1903:Kenworth 1870:Germany 1821:AT&T 1817:UNIX 3.2 1746:Phoenix 1560:c0mrade 1439:Curador 1341:cover-up 1293:Kwyjibo 1265:MagicFX 1232:Belgium 1228:Gigabyte 1192:against 1060:XSS worm 974:NullCrew 935:Wachovia 851:Algeria 826:Twinkie 809:Russian 722:Penalty 624:The 414s 609:computer 467:Red team 323:Backdoor 198:ShmooCon 146:Grey hat 3877:The Age 3434:May 23, 3405:May 23, 3377:May 23, 3318:May 10, 3289:May 11, 3131:May 11, 3101:May 11, 2923:. Wired 2803:31 July 2158:May 10, 2062:May 10, 1591:Condor 1496:Coolio 1471:Israel 1414:Canada 1151:T33kid 1064:MySpace 922:Russia 899:Double 806:Track2 710:Handle 675:botnets 577:Hacker 455:LulzSec 343:Spyware 318:Rootkit 311:Malware 263:Payload 253:Exploit 183:DEF CON 136:hackers 62:History 4090:May 9, 3997:. rbs2 3972:May 9, 3946:May 9, 3920:May 9, 3691:  3655:  3216:Sophos 3194:  3069:May 9, 2571:21 May 2234:  2220:pg 26— 2120:May 8, 2092:May 9, 2088:. 2001 2034:  2005:  1907:Boeing 1339:and a 1241:Sophos 963:sl1nk 861:SpyEye 605:hacker 509:Phrack 426:Groups 358:Botnet 298:Zone-H 3811:Wired 3789:(PDF) 3782:(PDF) 3755:(PDF) 3748:(PDF) 3399:Wired 2948:Wired 2877:(PDF) 2797:RAPSI 2368:Wired 2315:Wired 2287:Wired 1790:1993 1758:1993 1727:1993 1716:1991 1688:1995 1541:2001 1350:2002 1325:Solo 1274:2004 1119:cam0 1088:Gobo 1069:2007 1049:samy 1021:Weev 835:2017 787:2019 707:Name 333:Virus 101:ethic 37:with 4151:2012 4131:link 4117:2008 4092:2009 4064:2008 4003:2008 3974:2009 3948:2009 3922:2009 3886:2008 3851:2009 3820:2008 3728:2008 3689:ISBN 3653:ISBN 3581:2008 3550:2008 3518:2008 3492:2008 3466:2007 3436:2009 3407:2009 3379:2009 3346:2009 3320:2009 3291:2009 3258:2010 3224:2017 3192:ISBN 3173:2008 3133:2009 3103:2009 3071:2009 3037:2009 3006:2009 2980:2010 2955:2018 2929:2018 2805:2017 2573:2017 2403:2012 2377:2012 2349:2012 2323:2012 2295:2012 2267:2008 2232:ISBN 2228:Lulu 2188:2008 2160:2009 2122:2009 2094:2009 2064:2009 2032:ISBN 2003:ISBN 1845:rtm 1333:hack 1200:and 933:and 848:Bx1 642:and 585:and 368:HIDS 338:Worm 99:and 3685:416 1763:A$ 1633:A$ 1345:UFO 1343:of 630:in 562:or 554:of 378:RCE 4164:: 4127:}} 4123:{{ 4080:. 4052:. 4041:^ 3985:^ 3976:. 3965:. 3939:. 3906:. 3894:^ 3874:. 3859:^ 3837:. 3808:. 3797:^ 3714:. 3703:^ 3687:. 3667:^ 3651:. 3647:. 3598:. 3569:. 3558:^ 3541:. 3526:^ 3508:. 3483:. 3452:. 3426:. 3415:^ 3396:. 3363:. 3337:. 3311:. 3299:^ 3277:. 3266:^ 3247:. 3232:^ 3214:. 3159:. 3153:. 3141:^ 3119:. 3087:. 3057:. 3045:^ 3023:. 2996:. 2963:^ 2946:. 2919:. 2893:. 2795:. 2717:. 2673:, 2648:. 2581:^ 2556:^ 2539:^ 2523:. 2498:. 2473:. 2444:. 2419:. 2365:. 2312:. 2284:. 2258:. 2246:^ 2211:^ 2176:. 2144:. 2130:^ 2111:. 2084:. 2066:. 2055:. 1975:^ 1897:, 1867:— 1243:. 1237:C# 1196:, 1182:— 919:— 778:— 681:. 658:, 654:, 638:, 469:/ 4153:. 4133:) 4119:. 4094:. 4066:. 4035:. 4020:. 4005:. 3950:. 3924:. 3888:. 3853:. 3822:. 3764:. 3730:. 3697:. 3661:. 3628:. 3583:. 3552:. 3520:. 3494:. 3468:. 3438:. 3409:. 3381:. 3348:. 3322:. 3293:. 3260:. 3226:. 3200:. 3175:. 3135:. 3105:. 3073:. 3039:. 3008:. 2982:. 2957:. 2931:. 2904:. 2879:. 2862:. 2807:. 2781:. 2758:. 2732:. 2703:. 2658:. 2634:. 2614:. 2599:. 2550:. 2533:. 2509:. 2484:. 2459:. 2430:. 2405:. 2379:. 2351:. 2325:. 2297:. 2269:. 2240:. 2205:. 2190:. 2162:. 2124:. 2096:. 2040:. 2011:. 539:e 532:t 525:v 41:. 20:)

Index

List of convicted computer criminals
dynamic list
adding missing items
reliable sources
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.