Knowledge (XXG)

List of cybercriminals

Source 📝

563: 555:. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or 582: 604:. Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around. They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. As the computer industry matured, individuals with malicious intentions ( 852:. He stole from 217 American banks in total stealing $ 400 million and is alleged to have donated all the money to Africa and Palestine, though Trial documents did not mention any donations or charity activities. Despite much false information on the internet Bendelladj did not get sentenced to death, and claims saying he donated any money to charity is almost impossible to verify. The SpyEye software was also sold to other hackers and used as part of a botnet. 3892: 3902: 2057:
Gordon Meyer, a sociologist who has since left academia but continues to be involved in the computer industry (and to publish the Computer Underground Digest), wrote in his seminal paper The Social Organization of the Computer Underground that the "computer underground consists of actors in three
987:
Accused of causing 63 million dollar in damages. Primarily for his role in trafficking credit cards he obtained by hacking other hackers. Pleaded guilty to conspiracy to commit access device fraud and bank fraud, access device fraud, bank fraud, intentional damage to a protected computer, and
958:
Pleaded guilty to five counts of "unauthorised acts with intent to impair operation of or prevent/hinder access to a computer", two of "unauthorised computer access with intent to commit other offences", one of "unauthorised computer access with intent to commit other offences", and one of
2862: 639:, was sentenced to two years of probation. In May 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of 1434:
Pleaded guilty to theft and hacking offenses which fall under the Computer Misuse Act and six charges of intentionally accessing sites containing credit card details and using this information for financial gain
1083:
Pleaded guilty to four federal charges of violating United States Code Section 1030, Fraud and Related Activity in Connection with Computers, specifically subsections (a)(5)(A)(i), 1030 (a)(5)(B)(i) and 1030(b)
843:
Pleaded guilty to one count of conspiring to commit wire and bank fraud, 10 counts of wire fraud, one count of conspiring to commit computer fraud and abuse, and 11 counts of computer fraud and abuse
801:
Convicted of 38 counts involving unauthorized access of business information systems and stealing over two million credit card numbers. Pleaded guilty to conspiracy to commit bank fraud.
2579:"Russian Cyber-Criminal Sentenced to 14 Years in Prison for Role in Organized Cybercrime Ring Responsible for $ 50 Million in Online Identity Theft and $ 9 Million Bank Fraud Conspiracy" 1463:
Admitted to cracking US and Israeli computers, and pleaded guilty to conspiracy, wrongful infiltration of computerized material, disruption of computer use and destroying evidence
4119: 2430: 3073: 1441:
Three years of psychiatric treatment after evidence emerged that he was suffering from a mental condition which needed medical treatment rather than incarceration
3043: 3139: 2879: 2578: 1950: 3105: 526: 2536: 3349: 1840:
Intentional access of federal interest computers without authorization thereby preventing authorized access and causing a loss in excess of US$ 1,000
1325: 1146:
Pleaded guilty on August 11, 2004, to one count of intentionally causing or attempting to cause damage to a protected computer via his version of the
2484: 2826: 23: 2863:"Study for an Impact Assessment on a Proposal for a New Legal Framework on Identity Theft - European Commission (Fortezza mentioned as example)" 2703: 1929: 628: 3645: 1016:
On November 20, 2012, was found guilty of one count of identity fraud and one count of conspiracy to access a computer without authorization
356: 3438: 4166: 3603: 3765: 3731: 3704: 3267: 3013: 2614: 2459: 3263: 3009: 1114:
Pleaded guilty to hacking into the cell-phone account of celebrity Paris Hilton and participated in an attack on data-collection firm
50: 4097: 3681: 3184: 2405: 2224: 2130: 2024: 1995: 2438: 3700: 1846:
Three years probation and 400 hours of community service in a manner determined by the Probation Office and approved by the Court
4161: 2045: 1477: 1412:
Eight months "open custody", by the Montreal Youth Court, one year of probation, restricted use of the Internet and a small fine
1376: 1361: 807:
Sentenced to 27 years' imprisonment for the 2016 conviction, concurrent with sentence of 14 years for the second set of charges
3823: 3442: 246: 67: 1225: 624: 519: 2509: 19: 3083: 965:
and said to have penetrated the servers of Department of Defense (DoD), Pentagon, NASA, NSA, other UK government websites.
2677: 2634: 459: 256: 139: 129: 1741:
15 charges including trespassing on the University of Texas computer network, altering data at NASA and the theft of the
1061:
Three years of formal probation, 90 days of community service, restitution paid to MySpace, restrictions on computer use
27: 1469:
Six months of community service, one year of probation, a two-year suspended prison sentence and fined about US$ 18,000
166: 154: 2960: 2326:"Hacker Sentenced to Prison for Breaking into Lowe's Companies' Computers with Intent to Steal Credit Card Information" 2325: 2097: 1523:
which caused service outages at a number of colleges and universities; victims were young males from whom he solicited
4171: 4066: 2074: 821:
Nine counts of Illegal Computer Trespass to computers and one count of money laundering for an amount of $ 25 million
681:, 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals, and 68 months for 241: 4038: 3051: 2162: 1586:
Four counts of wire fraud, two counts of computer fraud and one count of illegally intercepting a wire communication
3200: 3153: 1782:
One year and six months suspended sentence, 300 hours of community service and psychiatric assessment and treatment
2379: 1762: 1742: 1321: 933: 879: 593: 478: 216: 3527: 3113: 2760:Суд над арестованными в США по обвинению в кибермошенничестве российскими студентами завершится в ближайшие месяцы 3359: 512: 261: 3323: 2880:"Dutch Citizen Sentenced to 12 Years in Prison for Computer Hacking Scheme that Stole and Sold Credit Card Info" 2070: 846: 728: 667: 437: 396: 366: 316: 2554: 600:
underground, criminal convictions were rare because there was an informal code of ethics that was followed by
3632:
Spam Kings: The Real Story behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements
2758: 1646:
Pleaded guilty to seven counts of mail, wire and computer fraud, money laundering and obstruction of justice
961:
Hacking attempt on the websites of Kent Police, Cambridge University and Oxford University. Former member of
4156: 1660: 1289: 1274: 1216: 1147: 1132: 176: 3469: 4067:"Two who raided computers pleading guilty—Late City Final Edition, Section 1, Page 6, Column 1, 383 words" 2842: 2807: 2711: 1887: 644: 431: 3297: 1200:
Six months detention at his parents' home plus two years probation and roughly US$ 65,000 in restitution
3149: 3106:"Blaster-B worm author sentenced to 18 months in jail - but bigger villain remains free, Sophos reports" 1790: 1069: 900: 655: 632: 3412: 2821: 1614:
31 charges of hacking and related charges. Pleaded guilty to 25 charges, the remaining 6 were dropped.
4127: 2932: 2905: 1981: 1826: 1556: 449: 391: 311: 2781: 1022:
Auernheimer was sentenced to 41 months in federal prison and ordered to pay $ 73,000 in restitution
3354: 2683: 2434: 2409: 2298: 2135: 1600: 1228:) computer viruses. Charged and arrested for computer data sabotage against internet security firm 753:
Conspiracy to commit access device fraud, access device fraud, and possession of child pornography
426: 251: 161: 3860: 3446: 1375:
Spreading data into a computer network with the intention of causing damage as the creator of the
4071: 4043: 2537:"Russian Cyber-Criminal Sentenced to 27 Years in Prison for Hacking and Credit Card Fraud Scheme" 2167: 1727: 1208: 1191: 1002: 773:
Conspiring to commit computer fraud, computer fraud, and two counts of aggravated identity theft
3673: 3666: 1812:
and 2 counts of computer fraud and three counts of interstate transportation of stolen property
3382: 2351: 4113: 3897: 3677: 3641: 3637: 3607: 3180: 2220: 2020: 1991: 1987: 1751: 1621: 1246: 889: 623:. In that case, six teenagers broke into a number of high-profile computer systems, including 552: 421: 384: 351: 3774: 3740: 3233: 926:. It is estimated that with nine other people Svechinskaya had skimmed $ 3 million in total. 3799: 3387: 3271: 3017: 3010:""Botherder" Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code" 2356: 2303: 2275: 2270: 1505: 1298:
20 months in federal prison, US$ 5,000 fine and 100 hours of community service upon release
875: 832: 605: 601: 401: 102: 3794: 3584: 3555: 2510:"Texas Man Sentenced to 57 Months in Prison for Hacking Major Tech Firm | SecurityWeek.Com" 1904:
Two weeks jail sentence, 200 hours community service, two years probation, fined US$ 2,000
3144: 2830: 1805: 1324:
of all time," although McKinnon himself states that he was merely looking for evidence of
1100: 1092:
Restitution of US$ 15,000 to the U.S. federal government for infecting military computers
976: 919: 674: 659: 181: 72: 41: 2140: 3708: 1932:
in New York and a Los Angeles bank and two counts of "making harassing telephone calls"
22:
and may never be able to satisfy particular standards for completeness. You can help by
3494: 2216: 1976: 1541: 1449: 1343: 1178: 915: 787: 716: 556: 544: 490: 321: 274: 204: 85: 62: 4150: 3827: 3630: 3523: 3229: 2485:"Texas Man Sentenced to 57 Months for Computer Hacking and Aggravated Identity Theft" 2248: 2244: 2102: 1776:
Trespassing on the University of Texas computer network and theft of the ZARDOZ file
1632: 1572: 1524: 1392: 1306: 864: 682: 616: 575: 571: 326: 221: 118: 3831: 3672:(November 2003 ed.). Checkmark Books, an imprint of Facts on File Inc. p.  2982: 611:
Convictions of computer crimes, or hacking, began as early as 1984 with the case of
562: 3955: 3929: 3078: 2732: 2663: 2657: 1420: 944: 745: 414: 281: 234: 89: 3951: 2738: 2581:(Press release). Washington, D.C.: U.S. Department of Justice. November 30, 2017 1851: 1350: 1346: 1163: 1030: 567: 484: 371: 108: 3767:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3733:
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier
3177:
Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications
3238: 1688: 1624:
2,100 to ANU (to be paid in 3 months time) and a A$ 5,000 good-behaviour bond
1520: 1186: 1115: 1045: 678: 585: 540: 341: 336: 113: 2906:"Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data" 2329: 1044:
Pleaded guilty to violating California Penal Code 502(c)(8) for creating the
731:
crimes, breaching a Sexual Harm Prevention Order, conspiracy to commit fraud
3925: 3560: 3264:"Creator of Melissa Computer Virus Sentenced to 20 Months in Federal Prison" 2782:"US court frees "world's sexiest computer hacker" prosecuted for bank fraud" 2016: 1883: 1182: 666:. He then sold the botnets to the highest bidder, who in turn used them for 640: 620: 548: 361: 211: 191: 96: 57: 2041: 1090:
57 months in prison, forfeit a 1993 BMW and more than US$ 58,000 in profit
994:
Extradited from Romania and sentenced to 144 months in U.S. federal prison
936:
and was released under $ 25,000 bail. Ordered to pay $ 35,000 in damages.
918:
to attack thousands of bank accounts and opened at least five accounts in
608:) would emerge to exploit computer systems for their own personal profit. 2707: 2383: 1920: 1912: 1891: 1329: 1048: 962: 923: 648: 636: 612: 597: 455: 186: 134: 3518: 3516: 827:
Two months jail sentence before they let him go due to lack of evidence
581: 3865: 1809: 1052: 443: 331: 306: 299: 171: 4020:
Hopkins, Jack (7 May 1986). "Computer intruder gets 2 weeks in jail".
2460:"Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft" 3201:"Female virus-writer, Gigabyte, arrested in Belgium, Sophos comments" 3109: 1895: 1238:
Released within 24 hours on bail due to being a minor (17 years old)
1229: 849: 663: 497: 346: 286: 124: 4098:"Hacker High: 10 Stories of Teenage Hackers Getting into the System" 3967:
Under the plea agreements, ... Rose ... will serve a year in prison.
1713:
One count of computer trespass and one count of computer conspiracy
1342:
On 16 October 2012, after a series of legal proceedings in Britain,
1118:
Group that exposed personal records of more than 300,000 consumers
677:
for 20 years. The next longest sentences are those of 13 years for
2734:Россиянку, подозреваемую в США в мошенничестве, отпустят под залог 1702:
Misdemeanor theft-of-service for a free-call scam to a 900 number
1564:
Six-month prison sentence and probation until the age of eighteen
1533:
Fined $ 5,000 (USD) and sentenced to six months in federal prison
1224:
Wrote the Coconut-A, Sahay-A, and Sharp-A (first virus written in
580: 561: 3983: 1652:
51 months in prison and ordered to pay US$ 56,000 in restitution
1336:
activity and other technologies potentially useful to the public
1497:
Nine months in jail and US$ 5,000 in restitution to each victim
1260:
Admitted the hacking and pleaded guilty to two felonies in 2004
673:
As of 2012, the longest sentence for computer crimes is that of
4005:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2659:
Algerijnse hacker star van amerikanen en schonk aan palestijnen
2599:
Julie, Emery (7 May 1986). "Light jail term for young hacker".
2190:
Emery, Julie (7 May 1986). "Light jail term for young hacker".
2058:
roles – computer hackers, phone phreaks, and software pirates."
1320:
Accused in 2002 of perpetrating the "biggest military computer
1266:
Sentenced to time served after spending seven months in prison
654:
In 2006, a prison term of nearly five years was handed down to
3407: 3405: 2635:"Hamza Bendelladj: Is the Algerian hacker a hero? | News" 2431:"TalkTalk hacker Elliott Gunton jailed in cryptocurrency scam" 1333: 3901:. Business; PART-D; Financial Desk. p. 2. Archived from 2406:"Three Norwich schools probed for weakness by teenage hacker" 1620:
A recorded conviction on all counts, a reparation payment of
1288:
Pleaded guilty to knowingly spreading a computer virus, the
3824:"Q&A: Mark Abene, from 'Phiber Optik' to security guru" 2843:"Feds Arrest 'Kurupt' Carding Kingpin? – Krebs on Security" 2808:
Is Department of Defense (DoD), Pentagon, NASA, NSA secure?
539:
Convicted computer criminals are people who are caught and
4131: 3298:"Kournikova virus kiddie gets 150 hours community service" 2555:"Russian Hacker Sentenced to 27 Years in Credit Card Case" 1882:
Four counts of Illegal Computer Trespass to computers at:
1754:
1,000 good-behaviour bond and 500 hours community service
3291: 3289: 3008:
Debra Wong Chang - United States Attorney (May 8, 2006).
1592:
46 months in federal prison and US$ 4,125 in restitution
1124:
11 months in a Massachusetts juvenile detention facility
3701:"Kevin Mitnick sentenced to nearly four years in prison" 3179:. Hershey, PA: Business Science Reference. p. 146. 2380:"Kevin Mitnick Sentenced to Nearly Four Years in Prison" 3224: 3222: 1155:
18 months in prison and 100 hours of community service
3668:
The Encyclopedia of High-Tech Crime and Crime-Fighting
2042:"The electronic discourse of the computer underground" 3893:"Hacker Enters Guilty Plea in Theft of Computer Data" 3234:"Court Okays Counter-Hack of eBay Hacker's Computer" 2205: 2203: 2201: 892:
plus forty years, without the possibility of parole
2328:. cybercrime.gov. December 15, 2004. Archived from 1406:Pleaded guilty to 56 charges of "mischief to data" 3665: 3629: 3133: 3131: 2679:В деле о хакерах таблоиды США нашли вторую Чэпман 4118:: CS1 maint: bot: original URL status unknown ( 2822:Man jailed for attempting to compromise websites 2548: 2546: 2382:. cybercrime.gov. August 9, 1999. Archived from 4033: 4031: 3886: 3884: 3556:"Hacker sentenced, must program jail computers" 3175:Holt, Thomas J.; Schell, Bernadette H. (2011). 2961:"MySpace speaks about Samy Kamkar's sentencing" 2704:"Kristina Svechinskaya: Accused Russian Hacker" 2615:"Hacker Hamza Bendelladj sentenced to 15 years" 2299:"Record 13-Year Sentence for Hacker Max Vision" 1527:who had stopped co-operating with his requests 3528:"Solar Sunrise hacker 'Analyzer' escapes jail" 2098:"FBI'S web site socked as hackers target feds" 520: 8: 4100:. Archived from the original on 1 March 2016 2825:, Kent Police, United Kingdom, 16 May 2013. 2238: 2236: 1984:—Law and Disorder on the Electronic Frontier 1951:Timeline of computer security hacker history 1894:Truck Co. and Resources Conservation Co. (a 662:to do his bidding via giant bot networks or 3789: 3787: 3550: 3548: 3324:"Anna Kournikova virus author stands trial" 3037: 3035: 2573: 2571: 2531: 2529: 1971: 1969: 1967: 1965: 959:"unauthorised access to computer material". 3984:"Judgment in U.S. v. Robert Tappan Morris" 3074:"Teen Pleds Guilty in Blaster Worm Attack" 2124: 2122: 2120: 1674:Writing and distributing computer viruses 692: 527: 513: 32: 3855: 3853: 3851: 3849: 3140:"Hacker Lamo Sentenced To Home Detention" 3795:"Phiber Optik Goes to Prison—Issue 2.04" 3695: 3693: 3258: 3256: 1928:Unauthorized access to computers at the 3977: 3975: 3926:"Legion of Doom's "Terminus" sentenced" 3659: 3657: 2955: 2953: 2933:"iPad Hack Statement Of Responsibility" 1961: 737:3½ years of imprisonment (most recent) 710: 704: 588:, who was convicted of computer charges 40: 4111: 3982:Ronald B. Standler (August 14, 2002). 3350:"Kournikova Virus Writer Found Guilty" 1013:United States (at time of sentencing) 882:, and conspiracy to traffic narcotics 734:November 2016; August 2019; July 2024 3583:Scoblionkov, Deborah (5 April 2001). 3383:"February 7, 2000: Mafiaboy's Moment" 3296:Robert Blincoe (September 27, 2001). 2013:Hackers: Crime in the Digital Sublime 1804:Illicit use of proprietary software ( 7: 3564:. Associated Press. February 6, 2002 2297:Poulsen, Kevin (February 12, 2010). 2271:"TJX Hacker Gets 20 Years in Prison" 1868:One to two years suspended sentence 3705:United States Department of Justice 3495:"Teen hacker escapes jail sentence" 3268:United States Department of Justice 3014:United States Department of Justice 2983:"American owns up to hijacking PCs" 2352:"Crazy-Long Hacker Sentence Upheld" 869:altoid/frosty/Dread Pirate Roberts 635:. On May 1, 1984, one of the 414s, 247:forensics-focused operating systems 3891:Henry Weinstein (March 23, 1991). 3604:"Who Was Educating Your Children?" 3470:"'Bill Gates' hacker escapes jail" 3348:Joris Evers (September 28, 2001). 3322:John Leyden (September 14, 2001). 3112:. January 28, 2005. Archived from 2763:(in Russian). Information Security 2553:Perlroth, Nicole (21 April 2017). 2243:Robert Vamosi (January 27, 2006). 1292:, with the intent to cause damage 14: 4128:"CUSSE List of Convicted Hackers" 3950:Rodney Hoffman (March 31, 1991). 3924:Rodney Hoffman (March 27, 1991). 3138:George V. Hulme (July 15, 2004). 3082:. August 12, 2004. Archived from 3042:Brian Krebs (February 27, 2007). 2904:Zetter, Kim (November 20, 2012). 2245:"Cybercrime does pay; here's how" 651:. and Resources Conservation Co. 3773:. pp. 48–49. Archived from 3739:. pp. 48–49. Archived from 3707:. August 9, 1999. Archived from 2931:Zetter, Kim (January 23, 2013). 2096:Brian Blomquist (May 29, 1999). 2046:Florida International University 3606:. Antonnews.com. Archived from 3443:Federal Bureau of Investigation 2666:, édition du 22 septembre 2015. 2129:Andrew Brandt (April 2, 2001). 1491:Misdemeanor charges of hacking 804:August 2016 and September 2017 759:20 years of supervised release 668:denial-of-service (DoS) attacks 68:Hacking of consumer electronics 4022:The Seattle Post Intelligencer 3822:Elinor Mills (June 23, 2009). 3381:Tony Long (February 7, 2007). 2811:, TheHackerNews, May 14, 2011. 2437:. 26 July 2024. Archived from 2269:Zetter, Kim (March 25, 2010). 1708:35 hours of community service 625:Los Alamos National Laboratory 1: 3413:"Mafiaboy given eight months" 3270:. May 1, 2002. Archived from 2015:(November 3, 1999 ed.). 1930:Sloan-Kettering Cancer Center 1750:One-year suspended sentence: 629:Sloan-Kettering Cancer Center 3468:John Leyden (July 6, 2001). 3445:. April 2003. Archived from 2963:. TechSpot. January 31, 2007 2215:(August 23, 2005 ed.). 2071:"Interview with Chris Davis" 1873:Michael Princeton Wilkerson 1855: 1384:150 hours community service 1170: 907: 766: 167:Chaos Communication Congress 4167:Hacking (computer security) 3439:"FBI Facts and Figure 2003" 3044:"They'll Always Have Paris" 2829:September 25, 2013, at the 2075:Public Broadcasting Service 1353:order to the United States 988:aggravated identity theft. 4188: 3764:Dreyfus, Suelette (1997). 3730:Dreyfus, Suelette (1997). 3628:McWilliams, Brian (2004). 3591:. Philadelphia City Paper. 3150:United Business Media, Inc 2019:; 1 edition. p. 200. 1862:Found guilty of espionage 934:personal recognizance bond 658:, who created hundreds of 479:2600: The Hacker Quarterly 217:List of computer criminals 17: 4039:"Computer User Sentenced" 3952:"Correction Re: Terminus" 3869:. Melbourne. May 25, 2003 2163:"Computer User Sentenced" 1986:(January 1994 ed.). 1698: 1695: 1684: 812:Pascal van den Essenburg 779:57 months federal prison 707: 701: 695: 2759: 2733: 2678: 2564:– via NYTimes.com. 742:Conor Brian Fitzpatrick 698: 397:Cloud computing security 4162:Computing-related lists 3664:Michael Newton (2004). 2211:Richard Gissel (2005). 1818:One-year jail sentence 1719:One-year jail sentence 1326:free energy suppression 1055:social networking site 1051:that spread across the 971:Two years imprisonment 878:, conspiracy to commit 859:15 years jail sentence 559:) and electronic fraud. 177:Hackers on Planet Earth 2676:Козловский, Владимир. 2040:Steve Mizrach (2009). 845:He is a co-creator of 592:In the infancy of the 589: 578: 547:such as breaking into 432:Homebrew Computer Club 3711:on September 26, 2009 3585:"Who's Laughing Now?" 1377:Anna Kournikova virus 1148:Blaster computer worm 1070:Jeanson James Ancheta 901:Kristina Svechinskaya 656:Jeanson James Ancheta 633:Security Pacific Bank 584: 565: 3861:"Hack to the future" 3419:. September 13, 2001 2514:www.securityweek.com 2386:on December 19, 2011 2332:on November 30, 2011 2011:Paul Taylor (1999). 1982:The Hacker Crackdown 1938:Two years probation 1827:Robert Tappan Morris 1680:18 months in prison 1557:juvenile delinquency 450:Masters of Deception 392:Application security 24:adding missing items 3905:on October 20, 2012 3362:on January 31, 2013 3156:on January 22, 2009 3048:The Washington Post 2684:BBC Russian Service 2435:Eastern Daily Press 2410:Eastern Daily Press 1601:Julian Paul Assange 729:Computer Misuse Act 708:Sentencing date(s) 596:subculture and the 427:Chaos Computer Club 162:Black Hat Briefings 36:Part of a series on 4172:Lists of criminals 4072:The New York Times 4044:The New York Times 3274:on August 20, 2006 3207:. 16 February 2004 3116:on August 19, 2009 2989:. January 24, 2006 2213:Digital Underworld 2168:The New York Times 1728:Nahshon Even-Chaim 1561:21 September 2000 1409:12 September 2001 1381:27 September 2001 1209:Kimberley Vanvaeck 1192:The New York Times 1133:Jeffrey Lee Parson 1121:13 September 2005 1003:Andrew Auernheimer 727:Money laundering, 689:Computer criminals 590: 579: 257:Social engineering 4007:The Seattle Times 3898:Los Angeles Times 3834:on August 5, 2009 3647:978-0-596-00732-4 3526:(June 15, 2001). 3449:on March 26, 2007 3232:(April 6, 2007). 2601:The Seattle Times 2192:The Seattle Times 1988:Project Gutenberg 1942: 1941: 1865:15 February 1990 1247:Jerome Heckenkamp 1235:16 February 2004 1046:"Samy is my hero" 1019:20 November 2012 916:Zeus Trojan horse 914:Accused of using 890:life imprisonment 649:Kenworth Truck Co 602:white hat hackers 553:computer networks 537: 536: 385:Computer security 352:Keystroke logging 4179: 4143: 4141: 4139: 4130:. Archived from 4123: 4117: 4109: 4107: 4105: 4085: 4084: 4082: 4080: 4075:. March 17, 1984 4063: 4057: 4056: 4054: 4052: 4035: 4026: 4025: 4017: 4011: 4010: 4002: 3996: 3995: 3993: 3991: 3979: 3970: 3969: 3964: 3962: 3947: 3941: 3940: 3938: 3936: 3921: 3915: 3914: 3912: 3910: 3888: 3879: 3878: 3876: 3874: 3857: 3844: 3843: 3841: 3839: 3830:. Archived from 3819: 3813: 3812: 3810: 3808: 3791: 3782: 3781: 3779: 3772: 3761: 3755: 3754: 3752: 3751: 3745: 3738: 3727: 3721: 3720: 3718: 3716: 3697: 3688: 3687: 3671: 3661: 3652: 3651: 3635: 3625: 3619: 3618: 3616: 3615: 3599: 3593: 3592: 3580: 3574: 3573: 3571: 3569: 3552: 3543: 3542: 3540: 3538: 3520: 3511: 3510: 3508: 3506: 3491: 3485: 3484: 3482: 3480: 3465: 3459: 3458: 3456: 3454: 3435: 3429: 3428: 3426: 3424: 3409: 3400: 3399: 3397: 3395: 3378: 3372: 3371: 3369: 3367: 3358:. Archived from 3345: 3339: 3338: 3336: 3334: 3319: 3313: 3312: 3310: 3308: 3293: 3284: 3283: 3281: 3279: 3260: 3251: 3250: 3248: 3246: 3226: 3217: 3216: 3214: 3212: 3197: 3191: 3190: 3172: 3166: 3165: 3163: 3161: 3152:. Archived from 3145:Information Week 3135: 3126: 3125: 3123: 3121: 3102: 3096: 3095: 3093: 3091: 3070: 3064: 3063: 3061: 3059: 3050:. Archived from 3039: 3030: 3029: 3027: 3025: 3016:. Archived from 3005: 2999: 2998: 2996: 2994: 2979: 2973: 2972: 2970: 2968: 2957: 2948: 2947: 2945: 2943: 2928: 2922: 2921: 2919: 2917: 2901: 2895: 2894: 2892: 2891: 2876: 2870: 2869: 2867: 2859: 2853: 2852: 2850: 2849: 2839: 2833: 2818: 2812: 2804: 2798: 2797: 2795: 2793: 2778: 2772: 2771: 2769: 2768: 2755: 2749: 2748: 2746: 2745: 2729: 2723: 2722: 2720: 2719: 2714:on July 24, 2012 2710:. Archived from 2700: 2694: 2693: 2691: 2690: 2673: 2667: 2655: 2649: 2648: 2646: 2645: 2631: 2625: 2624: 2622: 2621: 2611: 2605: 2604: 2596: 2590: 2589: 2587: 2586: 2575: 2566: 2565: 2563: 2561: 2550: 2541: 2540: 2533: 2524: 2523: 2521: 2520: 2506: 2500: 2499: 2497: 2496: 2481: 2475: 2474: 2472: 2471: 2456: 2450: 2449: 2447: 2446: 2427: 2421: 2420: 2418: 2417: 2402: 2396: 2395: 2393: 2391: 2376: 2370: 2369: 2367: 2365: 2348: 2342: 2341: 2339: 2337: 2322: 2316: 2315: 2313: 2311: 2294: 2288: 2287: 2285: 2283: 2266: 2260: 2259: 2257: 2255: 2240: 2231: 2230: 2207: 2196: 2195: 2187: 2181: 2180: 2178: 2176: 2159: 2153: 2152: 2150: 2148: 2139:. Archived from 2126: 2115: 2114: 2112: 2110: 2093: 2087: 2086: 2084: 2082: 2067: 2061: 2060: 2054: 2052: 2037: 2031: 2030: 2008: 2002: 2001: 1973: 1917: 1916: 1915: 1831: 1830: 1829: 1795: 1794: 1793: 1767: 1766: 1765: 1732: 1731: 1730: 1693: 1692: 1691: 1668:The Black Baron 1665: 1664: 1663: 1637: 1636: 1635: 1617:5 December 1996 1605: 1604: 1603: 1577: 1576: 1575: 1546: 1545: 1544: 1519:Found guilty of 1510: 1509: 1508: 1482: 1481: 1480: 1454: 1453: 1452: 1425: 1424: 1423: 1397: 1396: 1395: 1366: 1365: 1364: 1311: 1310: 1309: 1279: 1278: 1277: 1251: 1250: 1249: 1213: 1212: 1211: 1168: 1167: 1166: 1152:28 January 2005 1137: 1136: 1135: 1105: 1104: 1103: 1074: 1073: 1072: 1035: 1034: 1033: 1007: 1006: 1005: 991:1 February 2013 949: 948: 947: 905: 904: 903: 880:computer hacking 876:money laundering 833:Hamza Bendelladj 792: 791: 790: 693: 660:zombie computers 645:Sundstrand Corp. 529: 522: 515: 402:Network security 103:Hacker Manifesto 42:Computer hacking 33: 28:reliable sources 4187: 4186: 4182: 4181: 4180: 4178: 4177: 4176: 4147: 4146: 4137: 4135: 4126: 4110: 4103: 4101: 4096: 4093: 4088: 4078: 4076: 4065: 4064: 4060: 4050: 4048: 4037: 4036: 4029: 4019: 4018: 4014: 4004: 4003: 3999: 3989: 3987: 3981: 3980: 3973: 3960: 3958: 3949: 3948: 3944: 3934: 3932: 3923: 3922: 3918: 3908: 3906: 3890: 3889: 3882: 3872: 3870: 3859: 3858: 3847: 3837: 3835: 3821: 3820: 3816: 3806: 3804: 3793: 3792: 3785: 3777: 3770: 3763: 3762: 3758: 3749: 3747: 3743: 3736: 3729: 3728: 3724: 3714: 3712: 3699: 3698: 3691: 3684: 3663: 3662: 3655: 3648: 3627: 3626: 3622: 3613: 3611: 3601: 3600: 3596: 3589:mycitypaper.com 3582: 3581: 3577: 3567: 3565: 3554: 3553: 3546: 3536: 3534: 3522: 3521: 3514: 3504: 3502: 3493: 3492: 3488: 3478: 3476: 3467: 3466: 3462: 3452: 3450: 3437: 3436: 3432: 3422: 3420: 3411: 3410: 3403: 3393: 3391: 3380: 3379: 3375: 3365: 3363: 3347: 3346: 3342: 3332: 3330: 3321: 3320: 3316: 3306: 3304: 3295: 3294: 3287: 3277: 3275: 3262: 3261: 3254: 3244: 3242: 3228: 3227: 3220: 3210: 3208: 3199: 3198: 3194: 3187: 3174: 3173: 3169: 3159: 3157: 3137: 3136: 3129: 3119: 3117: 3104: 3103: 3099: 3089: 3087: 3072: 3071: 3067: 3057: 3055: 3054:on May 16, 2011 3041: 3040: 3033: 3023: 3021: 3020:on May 31, 2009 3007: 3006: 3002: 2992: 2990: 2981: 2980: 2976: 2966: 2964: 2959: 2958: 2951: 2941: 2939: 2930: 2929: 2925: 2915: 2913: 2903: 2902: 2898: 2889: 2887: 2884:www.justice.gov 2878: 2877: 2873: 2865: 2861: 2860: 2856: 2847: 2845: 2841: 2840: 2836: 2831:Wayback Machine 2819: 2815: 2805: 2801: 2791: 2789: 2780: 2779: 2775: 2766: 2764: 2761: 2757: 2756: 2752: 2743: 2741: 2735: 2731: 2730: 2726: 2717: 2715: 2702: 2701: 2697: 2688: 2686: 2680: 2675: 2674: 2670: 2656: 2652: 2643: 2641: 2633: 2632: 2628: 2619: 2617: 2613: 2612: 2608: 2598: 2597: 2593: 2584: 2582: 2577: 2576: 2569: 2559: 2557: 2552: 2551: 2544: 2535: 2534: 2527: 2518: 2516: 2508: 2507: 2503: 2494: 2492: 2489:www.justice.gov 2483: 2482: 2478: 2469: 2467: 2464:www.justice.gov 2458: 2457: 2453: 2444: 2442: 2441:on 26 July 2024 2429: 2428: 2424: 2415: 2413: 2404: 2403: 2399: 2389: 2387: 2378: 2377: 2373: 2363: 2361: 2360:. July 11, 2006 2350: 2349: 2345: 2335: 2333: 2324: 2323: 2319: 2309: 2307: 2296: 2295: 2291: 2281: 2279: 2268: 2267: 2263: 2253: 2251: 2242: 2241: 2234: 2227: 2219:. p. 222. 2210: 2208: 2199: 2189: 2188: 2184: 2174: 2172: 2161: 2160: 2156: 2146: 2144: 2128: 2127: 2118: 2108: 2106: 2095: 2094: 2090: 2080: 2078: 2069: 2068: 2064: 2050: 2048: 2039: 2038: 2034: 2027: 2010: 2009: 2005: 1998: 1990:. p. 336. 1975: 1974: 1963: 1959: 1947: 1911: 1910: 1909: 1825: 1824: 1823: 1808:code) owned by 1789: 1788: 1787: 1761: 1760: 1759: 1726: 1725: 1724: 1687: 1686: 1685: 1671:United Kingdom 1659: 1658: 1657: 1631: 1630: 1629: 1599: 1598: 1597: 1571: 1570: 1569: 1540: 1539: 1538: 1525:tickling videos 1504: 1503: 1502: 1476: 1475: 1474: 1448: 1447: 1446: 1431:United Kingdom 1419: 1418: 1417: 1391: 1390: 1389: 1360: 1359: 1358: 1317:United Kingdom 1305: 1304: 1303: 1273: 1272: 1271: 1245: 1244: 1243: 1207: 1206: 1205: 1179:computer crimes 1162: 1161: 1160: 1131: 1130: 1129: 1101:Cameron Lacroix 1099: 1098: 1097: 1091: 1068: 1067: 1066: 1029: 1028: 1027: 1001: 1000: 999: 981:Fortezza/Xakep 977:David Schrooten 960: 955:United Kingdom 943: 942: 941: 920:Bank of America 899: 898: 897: 786: 785: 784: 724:United Kingdom 691: 675:Albert Gonzalez 545:computer crimes 533: 504: 503: 473: 465: 464: 417: 407: 406: 387: 377: 376: 302: 292: 291: 277: 267: 266: 237: 227: 226: 207: 197: 196: 182:Security BSides 157: 147: 146: 92: 78: 77: 73:List of hackers 53: 31: 12: 11: 5: 4185: 4183: 4175: 4174: 4169: 4164: 4159: 4157:Cybercriminals 4149: 4148: 4145: 4144: 4134:on 30 May 2013 4124: 4092: 4091:External links 4089: 4087: 4086: 4058: 4027: 4012: 3997: 3971: 3942: 3916: 3880: 3845: 3814: 3783: 3780:on 2012-08-21. 3756: 3722: 3689: 3682: 3653: 3646: 3620: 3594: 3575: 3544: 3512: 3501:. July 6, 2001 3486: 3460: 3430: 3401: 3373: 3340: 3314: 3285: 3252: 3230:Poulsen, Kevin 3218: 3192: 3185: 3167: 3127: 3097: 3065: 3031: 3000: 2974: 2949: 2923: 2896: 2871: 2854: 2834: 2813: 2799: 2788:. 24 June 2013 2773: 2750: 2737:(in Russian). 2724: 2695: 2682:(in Russian). 2668: 2650: 2626: 2606: 2591: 2567: 2542: 2525: 2501: 2476: 2451: 2422: 2412:. 5 April 2019 2397: 2371: 2343: 2317: 2289: 2261: 2232: 2225: 2197: 2182: 2154: 2143:on May 1, 2009 2131:"Hacker Speak" 2116: 2088: 2062: 2032: 2025: 2003: 1996: 1977:Bruce Sterling 1960: 1958: 1955: 1954: 1953: 1946: 1943: 1940: 1939: 1936: 1933: 1926: 1925:United States 1923: 1918: 1906: 1905: 1902: 1899: 1890:Data Control, 1880: 1879:United States 1877: 1874: 1870: 1869: 1866: 1863: 1860: 1857: 1854: 1848: 1847: 1844: 1841: 1838: 1837:United States 1835: 1832: 1820: 1819: 1816: 1813: 1802: 1801:United States 1799: 1796: 1784: 1783: 1780: 1777: 1774: 1771: 1768: 1756: 1755: 1748: 1745: 1739: 1736: 1733: 1721: 1720: 1717: 1714: 1710: 1709: 1706: 1703: 1700: 1699:United States 1697: 1694: 1682: 1681: 1678: 1675: 1672: 1669: 1666: 1654: 1653: 1650: 1649:10 April 1995 1647: 1644: 1643:United States 1641: 1638: 1626: 1625: 1618: 1615: 1612: 1609: 1608:Mendax/profff 1606: 1594: 1593: 1590: 1589:9 August 1999 1587: 1584: 1583:United States 1581: 1578: 1566: 1565: 1562: 1559: 1555:Two counts of 1553: 1552:United States 1550: 1547: 1542:Jonathan James 1535: 1534: 1531: 1528: 1521:email bombings 1517: 1516:United States 1514: 1513:Terri DiSisto 1511: 1499: 1498: 1495: 1492: 1489: 1488:United States 1486: 1483: 1471: 1470: 1467: 1464: 1461: 1458: 1455: 1450:Ehud Tenenbaum 1443: 1442: 1439: 1436: 1432: 1429: 1426: 1414: 1413: 1410: 1407: 1404: 1401: 1398: 1386: 1385: 1382: 1379: 1373: 1370: 1367: 1355: 1354: 1344:Home Secretary 1340: 1337: 1318: 1315: 1312: 1300: 1299: 1296: 1293: 1286: 1285:United States 1283: 1280: 1275:David L. Smith 1268: 1267: 1264: 1261: 1258: 1257:United States 1255: 1252: 1240: 1239: 1236: 1233: 1222: 1219: 1214: 1202: 1201: 1198: 1195: 1175: 1174:United States 1172: 1169: 1157: 1156: 1153: 1150: 1144: 1143:United States 1141: 1138: 1126: 1125: 1122: 1119: 1112: 1111:United States 1109: 1106: 1094: 1093: 1088: 1085: 1081: 1080:United States 1078: 1075: 1063: 1062: 1059: 1056: 1042: 1041:United States 1039: 1036: 1024: 1023: 1020: 1017: 1014: 1011: 1008: 996: 995: 992: 989: 985: 982: 979: 973: 972: 969: 966: 956: 953: 950: 938: 937: 930: 927: 912: 909: 906: 894: 893: 886: 883: 873: 872:United States 870: 867: 861: 860: 857: 856:23 April 2016 854: 841: 838: 835: 829: 828: 825: 822: 819: 816: 813: 809: 808: 805: 802: 799: 796: 793: 788:Roman Seleznev 781: 780: 777: 774: 771: 770:United States 768: 765: 761: 760: 757: 754: 751: 750:United States 748: 743: 739: 738: 735: 732: 725: 722: 719: 717:Elliott Gunton 713: 712: 709: 706: 705:Conviction(s) 703: 700: 697: 690: 687: 557:identity theft 535: 534: 532: 531: 524: 517: 509: 506: 505: 502: 501: 494: 491:Nuts and Volts 487: 482: 474: 471: 470: 467: 466: 463: 462: 453: 447: 441: 438:Legion of Doom 435: 429: 424: 418: 413: 412: 409: 408: 405: 404: 399: 394: 388: 383: 382: 379: 378: 375: 374: 369: 364: 359: 354: 349: 344: 339: 334: 329: 324: 319: 314: 309: 303: 298: 297: 294: 293: 290: 289: 284: 278: 275:Practice sites 273: 272: 269: 268: 265: 264: 259: 254: 249: 244: 238: 233: 232: 229: 228: 225: 224: 219: 214: 208: 205:Computer crime 203: 202: 199: 198: 195: 194: 189: 184: 179: 174: 169: 164: 158: 153: 152: 149: 148: 145: 144: 143: 142: 137: 132: 121: 116: 111: 106: 99: 93: 86:Hacker culture 84: 83: 80: 79: 76: 75: 70: 65: 63:Cryptovirology 60: 54: 49: 48: 45: 44: 38: 37: 13: 10: 9: 6: 4: 3: 2: 4184: 4173: 4170: 4168: 4165: 4163: 4160: 4158: 4155: 4154: 4152: 4133: 4129: 4125: 4121: 4115: 4099: 4095: 4094: 4090: 4074: 4073: 4068: 4062: 4059: 4051:September 11, 4047:. May 1, 1983 4046: 4045: 4040: 4034: 4032: 4028: 4023: 4016: 4013: 4008: 4001: 3998: 3985: 3978: 3976: 3972: 3968: 3957: 3953: 3946: 3943: 3931: 3927: 3920: 3917: 3904: 3900: 3899: 3894: 3887: 3885: 3881: 3868: 3867: 3862: 3856: 3854: 3852: 3850: 3846: 3833: 3829: 3828:CNET Networks 3825: 3818: 3815: 3802: 3801: 3796: 3790: 3788: 3784: 3776: 3769: 3768: 3760: 3757: 3746:on 2011-05-21 3742: 3735: 3734: 3726: 3723: 3710: 3706: 3702: 3696: 3694: 3690: 3685: 3683:0-8160-4978-5 3679: 3675: 3670: 3669: 3660: 3658: 3654: 3649: 3643: 3639: 3634: 3633: 3624: 3621: 3610:on 2013-08-08 3609: 3605: 3598: 3595: 3590: 3586: 3579: 3576: 3563: 3562: 3557: 3551: 3549: 3545: 3537:September 11, 3533: 3529: 3525: 3524:Kevin Poulsen 3519: 3517: 3513: 3505:September 11, 3500: 3496: 3490: 3487: 3479:September 11, 3475: 3471: 3464: 3461: 3448: 3444: 3440: 3434: 3431: 3418: 3414: 3408: 3406: 3402: 3390: 3389: 3384: 3377: 3374: 3361: 3357: 3356: 3351: 3344: 3341: 3329: 3325: 3318: 3315: 3303: 3299: 3292: 3290: 3286: 3273: 3269: 3265: 3259: 3257: 3253: 3241: 3240: 3235: 3231: 3225: 3223: 3219: 3206: 3202: 3196: 3193: 3188: 3186:9781616928056 3182: 3178: 3171: 3168: 3155: 3151: 3147: 3146: 3141: 3134: 3132: 3128: 3115: 3111: 3107: 3101: 3098: 3086:on 2011-06-06 3085: 3081: 3080: 3075: 3069: 3066: 3053: 3049: 3045: 3038: 3036: 3032: 3019: 3015: 3011: 3004: 3001: 2988: 2984: 2978: 2975: 2962: 2956: 2954: 2950: 2938: 2934: 2927: 2924: 2911: 2907: 2900: 2897: 2885: 2881: 2875: 2872: 2864: 2858: 2855: 2844: 2838: 2835: 2832: 2828: 2824: 2823: 2817: 2814: 2810: 2809: 2803: 2800: 2787: 2783: 2777: 2774: 2762: 2754: 2751: 2740: 2736: 2728: 2725: 2713: 2709: 2705: 2699: 2696: 2685: 2681: 2672: 2669: 2665: 2661: 2660: 2654: 2651: 2640: 2636: 2630: 2627: 2616: 2610: 2607: 2602: 2595: 2592: 2580: 2574: 2572: 2568: 2556: 2549: 2547: 2543: 2538: 2532: 2530: 2526: 2515: 2511: 2505: 2502: 2490: 2486: 2480: 2477: 2465: 2461: 2455: 2452: 2440: 2436: 2432: 2426: 2423: 2411: 2407: 2401: 2398: 2385: 2381: 2375: 2372: 2359: 2358: 2353: 2347: 2344: 2331: 2327: 2321: 2318: 2306: 2305: 2300: 2293: 2290: 2278: 2277: 2272: 2265: 2262: 2254:September 11, 2250: 2246: 2239: 2237: 2233: 2228: 2226:1-4116-4423-9 2222: 2218: 2214: 2206: 2204: 2202: 2198: 2193: 2186: 2183: 2175:September 11, 2171:. May 1, 1984 2170: 2169: 2164: 2158: 2155: 2142: 2138: 2137: 2132: 2125: 2123: 2121: 2117: 2105: 2104: 2103:New York Post 2099: 2092: 2089: 2076: 2072: 2066: 2063: 2059: 2047: 2043: 2036: 2033: 2028: 2026:0-415-18072-4 2022: 2018: 2014: 2007: 2004: 1999: 1997:0-553-56370-X 1993: 1989: 1985: 1983: 1978: 1972: 1970: 1968: 1966: 1962: 1956: 1952: 1949: 1948: 1944: 1937: 1934: 1931: 1927: 1924: 1922: 1919: 1914: 1913:Gerald Wondra 1908: 1907: 1903: 1900: 1897: 1893: 1889: 1885: 1881: 1878: 1876:The Sprinter 1875: 1872: 1871: 1867: 1864: 1861: 1858: 1853: 1850: 1849: 1845: 1843:7 March 1991 1842: 1839: 1836: 1833: 1828: 1822: 1821: 1817: 1815:12 June 1991 1814: 1811: 1807: 1803: 1800: 1797: 1792: 1786: 1785: 1781: 1778: 1775: 1772: 1769: 1764: 1763:Richard Jones 1758: 1757: 1753: 1749: 1746: 1744: 1740: 1737: 1734: 1729: 1723: 1722: 1718: 1715: 1712: 1711: 1707: 1704: 1701: 1696:Phiber Optik 1690: 1683: 1679: 1676: 1673: 1670: 1667: 1662: 1656: 1655: 1651: 1648: 1645: 1642: 1639: 1634: 1633:Kevin Poulsen 1628: 1627: 1623: 1619: 1616: 1613: 1610: 1607: 1602: 1596: 1595: 1591: 1588: 1585: 1582: 1579: 1574: 1573:Kevin Mitnick 1568: 1567: 1563: 1560: 1558: 1554: 1551: 1548: 1543: 1537: 1536: 1532: 1529: 1526: 1522: 1518: 1515: 1512: 1507: 1506:David D'Amato 1501: 1500: 1496: 1494:9 March 2001 1493: 1490: 1487: 1484: 1479: 1473: 1472: 1468: 1466:15 June 2001 1465: 1462: 1459: 1456: 1451: 1445: 1444: 1440: 1437: 1433: 1430: 1427: 1422: 1416: 1415: 1411: 1408: 1405: 1402: 1399: 1394: 1393:Michael Calce 1388: 1387: 1383: 1380: 1378: 1374: 1371: 1368: 1363: 1357: 1356: 1352: 1349:withdrew her 1348: 1345: 1341: 1338: 1335: 1331: 1327: 1323: 1319: 1316: 1313: 1308: 1307:Gary McKinnon 1302: 1301: 1297: 1294: 1291: 1290:Melissa virus 1287: 1284: 1281: 1276: 1270: 1269: 1265: 1262: 1259: 1256: 1253: 1248: 1242: 1241: 1237: 1234: 1231: 1227: 1223: 1220: 1218: 1215: 1210: 1204: 1203: 1199: 1197:15 July 2004 1196: 1194: 1193: 1188: 1184: 1180: 1177:One-count of 1176: 1173: 1165: 1159: 1158: 1154: 1151: 1149: 1145: 1142: 1139: 1134: 1128: 1127: 1123: 1120: 1117: 1113: 1110: 1107: 1102: 1096: 1095: 1089: 1086: 1082: 1079: 1076: 1071: 1065: 1064: 1060: 1057: 1054: 1050: 1047: 1043: 1040: 1037: 1032: 1026: 1025: 1021: 1018: 1015: 1012: 1009: 1004: 998: 997: 993: 990: 986: 983: 980: 978: 975: 974: 970: 967: 964: 957: 954: 951: 946: 940: 939: 935: 931: 929:24 June 2013 928: 925: 921: 917: 913: 910: 902: 896: 895: 891: 887: 884: 881: 877: 874: 871: 868: 866: 865:Ross Ulbricht 863: 862: 858: 855: 853: 851: 848: 842: 839: 836: 834: 831: 830: 826: 823: 820: 817: 814: 811: 810: 806: 803: 800: 797: 794: 789: 783: 782: 778: 775: 772: 769: 763: 762: 758: 756:January 2024 755: 752: 749: 747: 744: 741: 740: 736: 733: 730: 726: 723: 721:Glubz/planet 720: 718: 715: 714: 694: 688: 686: 684: 683:Kevin Mitnick 680: 676: 671: 669: 665: 661: 657: 652: 650: 646: 642: 638: 637:Gerald Wondra 634: 630: 626: 622: 618: 617:414 area code 614: 609: 607: 603: 599: 595: 587: 583: 577: 576:Kevin Poulsen 573: 572:Kevin Mitnick 569: 564: 560: 558: 554: 550: 546: 542: 530: 525: 523: 518: 516: 511: 510: 508: 507: 500: 499: 495: 493: 492: 488: 486: 483: 481: 480: 476: 475: 469: 468: 461: 457: 454: 451: 448: 445: 442: 439: 436: 433: 430: 428: 425: 423: 420: 419: 416: 411: 410: 403: 400: 398: 395: 393: 390: 389: 386: 381: 380: 373: 370: 368: 365: 363: 360: 358: 355: 353: 350: 348: 345: 343: 340: 338: 335: 333: 330: 328: 325: 323: 320: 318: 315: 313: 310: 308: 305: 304: 301: 296: 295: 288: 285: 283: 280: 279: 276: 271: 270: 263: 262:Vulnerability 260: 258: 255: 253: 250: 248: 245: 243: 240: 239: 236: 235:Hacking tools 231: 230: 223: 222:Script kiddie 220: 218: 215: 213: 210: 209: 206: 201: 200: 193: 190: 188: 185: 183: 180: 178: 175: 173: 170: 168: 165: 163: 160: 159: 156: 151: 150: 141: 138: 136: 133: 131: 128: 127: 126: 122: 120: 119:Maker culture 117: 115: 112: 110: 107: 105: 104: 100: 98: 95: 94: 91: 87: 82: 81: 74: 71: 69: 66: 64: 61: 59: 56: 55: 52: 47: 46: 43: 39: 35: 34: 29: 25: 21: 16: 4136:. Retrieved 4132:the original 4104:11 September 4102:. Retrieved 4077:. Retrieved 4070: 4061: 4049:. Retrieved 4042: 4021: 4015: 4006: 4000: 3988:. Retrieved 3966: 3959:. Retrieved 3956:RISKS Digest 3945: 3933:. Retrieved 3930:RISKS Digest 3919: 3907:. Retrieved 3903:the original 3896: 3871:. Retrieved 3864: 3836:. Retrieved 3832:the original 3817: 3805:. Retrieved 3803:. April 1994 3798: 3775:the original 3766: 3759: 3748:. Retrieved 3741:the original 3732: 3725: 3713:. Retrieved 3709:the original 3667: 3631: 3623: 3612:. Retrieved 3608:the original 3602:Rizza, Joe. 3597: 3588: 3578: 3566:. Retrieved 3559: 3535:. Retrieved 3532:The Register 3531: 3503:. Retrieved 3498: 3489: 3477:. Retrieved 3474:The Register 3473: 3463: 3451:. Retrieved 3447:the original 3433: 3421:. Retrieved 3417:The Register 3416: 3392:. Retrieved 3386: 3376: 3364:. Retrieved 3360:the original 3353: 3343: 3331:. Retrieved 3328:The Register 3327: 3317: 3305:. Retrieved 3302:The Register 3301: 3276:. Retrieved 3272:the original 3243:. Retrieved 3237: 3209:. Retrieved 3204: 3195: 3176: 3170: 3158:. Retrieved 3154:the original 3143: 3118:. Retrieved 3114:the original 3100: 3088:. Retrieved 3084:the original 3079:CRN Magazine 3077: 3068: 3056:. Retrieved 3052:the original 3047: 3022:. Retrieved 3018:the original 3003: 2991:. Retrieved 2986: 2977: 2967:December 27, 2965:. Retrieved 2942:February 15, 2940:. Retrieved 2936: 2926: 2916:February 15, 2914:. Retrieved 2910:Threat Level 2909: 2899: 2888:. Retrieved 2886:. 2015-03-09 2883: 2874: 2857: 2846:. Retrieved 2837: 2820: 2816: 2806: 2802: 2790:. Retrieved 2785: 2776: 2765:. Retrieved 2753: 2742:. Retrieved 2727: 2716:. Retrieved 2712:the original 2698: 2687:. Retrieved 2671: 2664:De Standaard 2658: 2653: 2642:. Retrieved 2638: 2629: 2618:. Retrieved 2609: 2600: 2594: 2583:. Retrieved 2558:. Retrieved 2517:. Retrieved 2513: 2504: 2493:. Retrieved 2491:. 2020-08-13 2488: 2479: 2468:. Retrieved 2466:. 2019-11-12 2463: 2454: 2443:. Retrieved 2439:the original 2425: 2414:. Retrieved 2400: 2388:. Retrieved 2384:the original 2374: 2362:. Retrieved 2355: 2346: 2334:. Retrieved 2330:the original 2320: 2308:. Retrieved 2302: 2292: 2280:. Retrieved 2274: 2264: 2252:. Retrieved 2249:CNET Reviews 2212: 2191: 2185: 2173:. Retrieved 2166: 2157: 2145:. Retrieved 2141:the original 2134: 2107:. Retrieved 2101: 2091: 2079:. Retrieved 2065: 2056: 2049:. Retrieved 2035: 2012: 2006: 1980: 1898:subsidiary) 1791:Leonard Rose 1478:Dennis Moran 1438:6 July 2001 1421:Raphael Gray 1372:Netherlands 1190: 984:Netherlands 968:16 May 2013 945:Lewys Martin 885:29 May 2015 847:Trojan horse 844: 818:Netherlands 702:Nationality 672: 653: 610: 591: 570:(left) with 538: 496: 489: 477: 472:Publications 317:Trojan horse 282:HackThisSite 101: 20:dynamic list 15: 2739:RIA Novosti 2390:January 22, 2364:January 22, 2336:January 22, 2310:January 22, 2282:January 22, 1935:1 May 1983 1901:7 May 1986 1852:Markus Hess 1743:ZARDOZ file 1640:Dark Dante 1351:extradition 1347:Theresa May 1295:1 May 2002 1164:Adrian Lamo 1087:8 May 2006 1031:Samy Kamkar 764:Tyler King 746:Pompompurin 568:Adrian Lamo 485:Hacker News 372:Infostealer 155:Conferences 109:Hackerspace 4151:Categories 4138:2 February 3990:August 23, 3873:August 23, 3807:August 23, 3750:2011-09-13 3715:August 23, 3614:2013-05-02 3568:August 23, 3239:Wired News 3160:August 23, 3110:Sophos Plc 2890:2021-08-01 2848:2021-08-01 2767:2011-11-26 2744:2010-12-04 2718:2010-11-02 2689:2010-11-02 2644:2018-05-24 2639:Al Jazeera 2620:2016-05-23 2585:2018-05-26 2519:2022-04-30 2495:2022-04-30 2470:2022-04-30 2445:2024-09-01 2416:2024-09-01 1957:References 1888:Sundstrand 1773:Australia 1738:Australia 1689:Mark Abene 1661:Chris Pile 1611:Australia 1362:Jan de Wit 1187:LexisNexis 1116:LexisNexis 679:Max Butler 606:black hats 586:Mark Abene 342:Logic bomb 337:Ransomware 114:Hacktivism 18:This is a 3561:USA Today 3453:March 27, 3245:April 21, 2017:Routledge 1884:Microsoft 1798:Terminus 1770:Electron 1457:Analyzer 1400:MafiaBoy 1369:OnTheFly 1183:Microsoft 932:Signed a 685:in 1999. 641:Microsoft 621:Milwaukee 615:from the 549:computers 541:convicted 460:Blue team 452:(defunct) 446:(defunct) 440:(defunct) 434:(defunct) 422:Anonymous 362:Web shell 212:Crimeware 192:Summercon 140:White hat 130:Black hat 123:Types of 97:Hackathon 58:Phreaking 4114:cite web 3838:June 28, 3638:O'Reilly 3499:BBC News 3355:PC World 3333:June 22, 3211:9 August 3024:June 22, 2993:June 22, 2987:BBC News 2827:Archived 2708:CBS News 2136:PC World 1979:(1993). 1945:See also 1921:The 414s 1892:Kenworth 1859:Germany 1810:AT&T 1806:UNIX 3.2 1735:Phoenix 1549:c0mrade 1428:Curador 1330:cover-up 1282:Kwyjibo 1254:MagicFX 1221:Belgium 1217:Gigabyte 1181:against 1049:XSS worm 963:NullCrew 924:Wachovia 840:Algeria 815:Twinkie 798:Russian 711:Penalty 613:The 414s 598:computer 456:Red team 312:Backdoor 187:ShmooCon 135:Grey hat 3866:The Age 3423:May 23, 3394:May 23, 3366:May 23, 3307:May 10, 3278:May 11, 3120:May 11, 3090:May 11, 2912:. Wired 2792:31 July 2147:May 10, 2051:May 10, 1580:Condor 1485:Coolio 1460:Israel 1403:Canada 1140:T33kid 1053:MySpace 911:Russia 888:Double 795:Track2 699:Handle 664:botnets 566:Hacker 444:LulzSec 332:Spyware 307:Rootkit 300:Malware 252:Payload 242:Exploit 172:DEF CON 125:hackers 51:History 4079:May 9, 3986:. rbs2 3961:May 9, 3935:May 9, 3909:May 9, 3680:  3644:  3205:Sophos 3183:  3058:May 9, 2560:21 May 2223:  2209:pg 26— 2109:May 8, 2081:May 9, 2077:. 2001 2023:  1994:  1896:Boeing 1328:and a 1230:Sophos 952:sl1nk 850:SpyEye 594:hacker 498:Phrack 415:Groups 347:Botnet 287:Zone-H 3800:Wired 3778:(PDF) 3771:(PDF) 3744:(PDF) 3737:(PDF) 3388:Wired 2937:Wired 2866:(PDF) 2786:RAPSI 2357:Wired 2304:Wired 2276:Wired 1779:1993 1747:1993 1716:1993 1705:1991 1677:1995 1530:2001 1339:2002 1314:Solo 1263:2004 1108:cam0 1077:Gobo 1058:2007 1038:samy 1010:Weev 824:2017 776:2019 696:Name 322:Virus 90:ethic 26:with 4140:2012 4120:link 4106:2008 4081:2009 4053:2008 3992:2008 3963:2009 3937:2009 3911:2009 3875:2008 3840:2009 3809:2008 3717:2008 3678:ISBN 3642:ISBN 3570:2008 3539:2008 3507:2008 3481:2008 3455:2007 3425:2009 3396:2009 3368:2009 3335:2009 3309:2009 3280:2009 3247:2010 3213:2017 3181:ISBN 3162:2008 3122:2009 3092:2009 3060:2009 3026:2009 2995:2009 2969:2010 2944:2018 2918:2018 2794:2017 2562:2017 2392:2012 2366:2012 2338:2012 2312:2012 2284:2012 2256:2008 2221:ISBN 2217:Lulu 2177:2008 2149:2009 2111:2009 2083:2009 2053:2009 2021:ISBN 1992:ISBN 1834:rtm 1322:hack 1189:and 922:and 837:Bx1 631:and 574:and 357:HIDS 327:Worm 88:and 3674:416 1752:A$ 1622:A$ 1334:UFO 1332:of 619:in 551:or 543:of 367:RCE 4153:: 4116:}} 4112:{{ 4069:. 4041:. 4030:^ 3974:^ 3965:. 3954:. 3928:. 3895:. 3883:^ 3863:. 3848:^ 3826:. 3797:. 3786:^ 3703:. 3692:^ 3676:. 3656:^ 3640:. 3636:. 3587:. 3558:. 3547:^ 3530:. 3515:^ 3497:. 3472:. 3441:. 3415:. 3404:^ 3385:. 3352:. 3326:. 3300:. 3288:^ 3266:. 3255:^ 3236:. 3221:^ 3203:. 3148:. 3142:. 3130:^ 3108:. 3076:. 3046:. 3034:^ 3012:. 2985:. 2952:^ 2935:. 2908:. 2882:. 2784:. 2706:. 2662:, 2637:. 2570:^ 2545:^ 2528:^ 2512:. 2487:. 2462:. 2433:. 2408:. 2354:. 2301:. 2273:. 2247:. 2235:^ 2200:^ 2165:. 2133:. 2119:^ 2100:. 2073:. 2055:. 2044:. 1964:^ 1886:, 1856:— 1232:. 1226:C# 1185:, 1171:— 908:— 767:— 670:. 647:, 643:, 627:, 458:/ 4142:. 4122:) 4108:. 4083:. 4055:. 4024:. 4009:. 3994:. 3939:. 3913:. 3877:. 3842:. 3811:. 3753:. 3719:. 3686:. 3650:. 3617:. 3572:. 3541:. 3509:. 3483:. 3457:. 3427:. 3398:. 3370:. 3337:. 3311:. 3282:. 3249:. 3215:. 3189:. 3164:. 3124:. 3094:. 3062:. 3028:. 2997:. 2971:. 2946:. 2920:. 2893:. 2868:. 2851:. 2796:. 2770:. 2747:. 2721:. 2692:. 2647:. 2623:. 2603:. 2588:. 2539:. 2522:. 2498:. 2473:. 2448:. 2419:. 2394:. 2368:. 2340:. 2314:. 2286:. 2258:. 2229:. 2194:. 2179:. 2151:. 2113:. 2085:. 2029:. 2000:. 528:e 521:t 514:v 30:.

Index

dynamic list
adding missing items
reliable sources
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon
Summercon
Computer crime
Crimeware

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.