SlideShare una empresa de Scribd logo
1 de 6
History’s most notorious
                     hackers
From phone phreaking with cereal box
whistles to make free long distance phone
calls to stealing credit card numbers and
making millions in fraudulent purchases,
hacking has certainly come a long way –
both in technology and in motive.

This week we look at some of history’s
most notorious hackers, and the fate they
met when the law caught up with their
illegal activities.

              By Jeff Jedras                Image courtesy of chanpipat at FreeDigitalPhotos.net
Kevin Poulsen
Born in California in 1965, Poulsen’s
most well-known hack is his takeover
of the phone lines of a Los Angeles
radio station, ensuring he would win
the contest prize – a Porsche 944 S2
– as the 102nd caller.

Similarly, when he was sought by the
FBI and featured on the television
program Unsolved Mysteries, the
show’s tip line mysteriously crashed.

After his release from prison he
became a journalist, and is now an
editor for Wired News.
Robert Tappan Morris
      Born in 1965, Morris, a computer
      scientist, has the distinction of creating
      the first computer worm on the Internet
      in 1988. The Morris Worm also led to him
      being the first person convicted under the
      Computer Fraud and Abuse Act.

      After turning white hat, he would co-
      found online store Viaweb and co-found
      funding firm Y-Combinator.

      He’s now a professor of electrical
      engineering and computer science at the
      Massachusetts Institute of Technology.
John Draper
Born in 1943 as the son of a US Air
Force engineer, Draper is a former
phone phreak whose aliases included
Captain Crunch.

He helped design the first
multifrequency tone generator (known
as a blue box) that allowed the user to
make free calls from payphones – the
tone was the same as that emitted by
a whistle given away in Captain Crunch
cereal – hence, the nickname.

After serving his time, he briefly
worked for Apple, and he now writes
security software and is a developer
for a VoIP client.
Jonathan James
 Born in 1983, James was the first
 juvenile incarcerated for a cybercrime in
 the US when, at age 15, he hacked into a
 number of systems, including his local
 school and a division of the Defence
 Department.

 He was investigated in connection to the
 2007 TJX hacking, but no evidence was
 found to linking him to the crime.

 He would later commit suicide, citing
 fear of being prosecuted for a crime he
 didn’t commit.
Albert Gonzalez
Born in 1981, Gonzalez was
accused of being behind the largest
case of credit and debit card theft
in history, using a SQL injection to
deploy backdoors on corporate
systems to launch packet sniffers
and steal corporate data.

He was indicted in three cases –
Dave & Busters, TJ Maxx and
Heartland Payment – and he was
sentenced to 20 years in federal
prison in 2010.

Más contenido relacionado

La actualidad más candente

Smartphones and mobile phone technology
Smartphones and mobile phone technologySmartphones and mobile phone technology
Smartphones and mobile phone technologyPaul singh
 
History of the Telephone
History of the TelephoneHistory of the Telephone
History of the TelephoneNYanisse
 
500 howard
500 howard500 howard
500 howardaxiant
 
Erika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell PhoneErika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell Phonemerlyna
 
Obscenity and indecency
Obscenity and indecencyObscenity and indecency
Obscenity and indecencyLevi Keil
 
Obscenity regulation (feb. 7 9, 2011)
Obscenity regulation (feb. 7 9, 2011)Obscenity regulation (feb. 7 9, 2011)
Obscenity regulation (feb. 7 9, 2011)mpopescu
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and futureblogzilla
 

La actualidad más candente (11)

Sikai He 5946
Sikai He 5946Sikai He 5946
Sikai He 5946
 
Smartphones and mobile phone technology
Smartphones and mobile phone technologySmartphones and mobile phone technology
Smartphones and mobile phone technology
 
History of the Telephone
History of the TelephoneHistory of the Telephone
History of the Telephone
 
500 howard
500 howard500 howard
500 howard
 
Dm stem
Dm stemDm stem
Dm stem
 
Erika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell PhoneErika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell Phone
 
Business Card_Front
Business Card_FrontBusiness Card_Front
Business Card_Front
 
Obscenity and indecency
Obscenity and indecencyObscenity and indecency
Obscenity and indecency
 
Obscenity regulation (feb. 7 9, 2011)
Obscenity regulation (feb. 7 9, 2011)Obscenity regulation (feb. 7 9, 2011)
Obscenity regulation (feb. 7 9, 2011)
 
Obscenity
ObscenityObscenity
Obscenity
 
Internet surveillance: past, present and future
Internet surveillance: past, present and futureInternet surveillance: past, present and future
Internet surveillance: past, present and future
 

Similar a History's most notorious hackers

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackersMohsinHusenManasiya
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)Felipe Prado
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
The hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundThe hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundrmvvr143
 
Hacked Revealed: Penetration Profession
Hacked Revealed: Penetration ProfessionHacked Revealed: Penetration Profession
Hacked Revealed: Penetration ProfessionHaris Tahir
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Mobile facts
Mobile factsMobile facts
Mobile factsE_than
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trollsEJThompson
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)Felipe Prado
 

Similar a History's most notorious hackers (20)

Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Hackers
HackersHackers
Hackers
 
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
The hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital undergroundThe hacker crackdown 2 the digital underground
The hacker crackdown 2 the digital underground
 
Hacked Revealed: Penetration Profession
Hacked Revealed: Penetration ProfessionHacked Revealed: Penetration Profession
Hacked Revealed: Penetration Profession
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
I gangs hi tech gang communication-handout
I gangs hi tech gang communication-handoutI gangs hi tech gang communication-handout
I gangs hi tech gang communication-handout
 
Is hacking good or bad
Is hacking good or badIs hacking good or bad
Is hacking good or bad
 
Mobile facts
Mobile factsMobile facts
Mobile facts
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
H A C K I N Gjk,K
H A C K I N Gjk,KH A C K I N Gjk,K
H A C K I N Gjk,K
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)
 

Más de JeffJedras

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallJeffJedras
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google GlassJeffJedras
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading listJeffJedras
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoidJeffJedras
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travelsJeffJedras
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device theftsJeffJedras
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environmentsJeffJedras
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phonesJeffJedras
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripJeffJedras
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)JeffJedras
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PCJeffJedras
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?JeffJedras
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013JeffJedras
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxesJeffJedras
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designsJeffJedras
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computersJeffJedras
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012JeffJedras
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twistJeffJedras
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product namesJeffJedras
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographicsJeffJedras
 

Más de JeffJedras (20)

Five sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fallFive sci-fi and tech movies to watch this fall
Five sci-fi and tech movies to watch this fall
 
Five alternatives to Google Glass
Five alternatives to Google GlassFive alternatives to Google Glass
Five alternatives to Google Glass
 
The techie’s summer reading list
The techie’s summer reading listThe techie’s summer reading list
The techie’s summer reading list
 
Social media screw-ups you *must* avoid
Social media screw-ups you *must* avoidSocial media screw-ups you *must* avoid
Social media screw-ups you *must* avoid
 
Five must-have apps for your summer travels
Five must-have apps for your summer travelsFive must-have apps for your summer travels
Five must-have apps for your summer travels
 
Five embarrassing mobile device thefts
Five embarrassing mobile device theftsFive embarrassing mobile device thefts
Five embarrassing mobile device thefts
 
Five far-out tech office environments
Five far-out tech office environmentsFive far-out tech office environments
Five far-out tech office environments
 
Five outrageously expensive mobile phones
Five outrageously expensive mobile phonesFive outrageously expensive mobile phones
Five outrageously expensive mobile phones
 
Five cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road tripFive cool in-car technologies for your summer road trip
Five cool in-car technologies for your summer road trip
 
Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)Six browsers that changed the world (wide web)
Six browsers that changed the world (wide web)
 
The long, slow, fictional death of the PC
The long, slow, fictional death of the PCThe long, slow, fictional death of the PC
The long, slow, fictional death of the PC
 
Did you know they were Canadian?
Did you know they were Canadian?Did you know they were Canadian?
Did you know they were Canadian?
 
The top tech buzzwords of 2013
The top tech buzzwords of 2013The top tech buzzwords of 2013
The top tech buzzwords of 2013
 
Top social media hoaxes
Top social media hoaxesTop social media hoaxes
Top social media hoaxes
 
Five innovative laptop concept designs
Five innovative laptop concept designsFive innovative laptop concept designs
Five innovative laptop concept designs
 
Five weird wearable computers
Five weird wearable computersFive weird wearable computers
Five weird wearable computers
 
Worst tech blunders of 2012
Worst tech blunders of 2012Worst tech blunders of 2012
Worst tech blunders of 2012
 
Baby names with a tech twist
Baby names with a tech twistBaby names with a tech twist
Baby names with a tech twist
 
Six unfortunate tech product names
Six unfortunate tech product namesSix unfortunate tech product names
Six unfortunate tech product names
 
Five spooky IT infographics
Five spooky IT infographicsFive spooky IT infographics
Five spooky IT infographics
 

Último

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Scott Andery
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
Enhancing User Experience - Exploring the Latest Features of Tallyman Axis Lo...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 

History's most notorious hackers

  • 1. History’s most notorious hackers From phone phreaking with cereal box whistles to make free long distance phone calls to stealing credit card numbers and making millions in fraudulent purchases, hacking has certainly come a long way – both in technology and in motive. This week we look at some of history’s most notorious hackers, and the fate they met when the law caught up with their illegal activities. By Jeff Jedras Image courtesy of chanpipat at FreeDigitalPhotos.net
  • 2. Kevin Poulsen Born in California in 1965, Poulsen’s most well-known hack is his takeover of the phone lines of a Los Angeles radio station, ensuring he would win the contest prize – a Porsche 944 S2 – as the 102nd caller. Similarly, when he was sought by the FBI and featured on the television program Unsolved Mysteries, the show’s tip line mysteriously crashed. After his release from prison he became a journalist, and is now an editor for Wired News.
  • 3. Robert Tappan Morris Born in 1965, Morris, a computer scientist, has the distinction of creating the first computer worm on the Internet in 1988. The Morris Worm also led to him being the first person convicted under the Computer Fraud and Abuse Act. After turning white hat, he would co- found online store Viaweb and co-found funding firm Y-Combinator. He’s now a professor of electrical engineering and computer science at the Massachusetts Institute of Technology.
  • 4. John Draper Born in 1943 as the son of a US Air Force engineer, Draper is a former phone phreak whose aliases included Captain Crunch. He helped design the first multifrequency tone generator (known as a blue box) that allowed the user to make free calls from payphones – the tone was the same as that emitted by a whistle given away in Captain Crunch cereal – hence, the nickname. After serving his time, he briefly worked for Apple, and he now writes security software and is a developer for a VoIP client.
  • 5. Jonathan James Born in 1983, James was the first juvenile incarcerated for a cybercrime in the US when, at age 15, he hacked into a number of systems, including his local school and a division of the Defence Department. He was investigated in connection to the 2007 TJX hacking, but no evidence was found to linking him to the crime. He would later commit suicide, citing fear of being prosecuted for a crime he didn’t commit.
  • 6. Albert Gonzalez Born in 1981, Gonzalez was accused of being behind the largest case of credit and debit card theft in history, using a SQL injection to deploy backdoors on corporate systems to launch packet sniffers and steal corporate data. He was indicted in three cases – Dave & Busters, TJ Maxx and Heartland Payment – and he was sentenced to 20 years in federal prison in 2010.