SlideShare una empresa de Scribd logo
1 de 8
Master of Deception
      (MOD)
 One of the legendary hacking
  cases of the 20th century
WHAT IS THIS CASE ABOUT?
      A New York-based group of hackers, most
widely known in media for their exploits of
telephone company infrastructure and later
prosecution, as well as being the subject of the
book Masters of Deception: The Gang That Ruled
Cyberspace. MOD's initial membership grew from
meetings on Loop-Around Test Lines that led to
legendary collaborations to hack RBOC phone
switches and the various minicomputers and
mainframes used to administer the telephone
network. They successfully remained underground
using alternative handles to hide even their true
hacker identities.

                                       Master of Deception
Acid Phreak founded the Masters of
Deception with Scorpion and HAC. The name
itself was, among other things, a mockery of
LoD, as 'M' is one letter up in the alphabet from
'L', although the name originally was a flexible
acronym that could be used to identify
membership in situations where anonymity
would be the best course of action. It could
stand for "Millions of Dollars" just as easily as
"Masters of Deception."


                                       Master of Deception
It is claimed that the mockery of the LOD name
was a statement to the underground that LOD had
lost its direction. Several LOD members were close
friends of MOD who had been raided and indicted by
the government, causing the majority of those who
remained to drop out of the underground for safety
reasons. In their absence, LOD largely fell into disarray
causing the disagreement and disillusionment that
led Phiber Optik to align himself with MOD in an
effort to restore the direction of the spirit of
underground hacking.
       The conflict between the (MOD), Masters of
Deception and (LOD), and Legion of Doom was
marked as the Great Hacker War during the year
1990-1992.
                                             Master of Deception
WHO ARE THE PARTIES INVOLVED?
Original Masters of Deception:
      Mark Abene ("Phiber Optik")
      Paul Stira ("Scorpion")
      Eli Ladopoulos ("Acid Phreak"), HAC
      John Lee("Corrupt" a.k.a. "Netw1z")
      Julio Fernandez ("Outlaw")
Additional members whose real names are
unknown       include:    Supernigger    (also of
DPAK), Wing, Nynex Phreak, Billy_The_Kid, Crazy
Eddie, The Plague, ZOD, Seeker, Red Knight (who
was also a member of Cult of the Dead Cow), Lord
Micro, n00gie and peaboy (aka, MCI Sprinter).
                                       Master of Deception
DID ANY PROSECUTION RESULT?
      Yes, it did.
IF SO, WHAT WERE THE OUTCOME?
      As a result of a major nationwide
investigation by a joint FBI/Secret Service task
force, five of MOD’s members were indicted in
1992 in federal court. Within the next six
months (in 1993), all five pleaded guilty and
were sentenced to either probation or prison.


                                       Master of Deception
WHAT ETHICAL ISSUES ARE RAISED BY THIS
CASE?
      The ethical issues in this case involves
every issue in hacking. You cannot deny that you
are the hacker. And you cannot avoid the war
between the two groups of hacker. Although The
Hacker Manifesto states that, “The only crime a
hacker commits is the crime of curiosity.”
Hacking is a serious crime, It is more the
“unauthorized access and modification of the
data there in” which is regulated by laws rather
than the act of ‘hacking’ which in short , means
“writing the code in an unauthorized way”.
                                       Master of Deception
Master of Deception

Más contenido relacionado

Destacado

Canadian Healthcare Codes and Terminology Standards
Canadian Healthcare Codes and Terminology StandardsCanadian Healthcare Codes and Terminology Standards
Canadian Healthcare Codes and Terminology Standards Intelliware Development Inc.
 
Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?Antoine Vigneron
 
Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...
Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...
Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...Larry Ajuwon
 
Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...
Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...
Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...Intelliware Development Inc.
 
Add 2009 10
Add 2009 10Add 2009 10
Add 2009 10RUAULT
 
Coding is the new literacy to make a difference in the world
Coding is the new literacy to make a difference in the worldCoding is the new literacy to make a difference in the world
Coding is the new literacy to make a difference in the worldmcd_boulanger
 
5 mythes de la marche au ralenti
5 mythes de la marche au ralenti5 mythes de la marche au ralenti
5 mythes de la marche au ralentiellipsos inc.
 
U.S. Economic Sanctions Update
U.S. Economic Sanctions UpdateU.S. Economic Sanctions Update
U.S. Economic Sanctions UpdateJon Yormick
 
Offsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - ConsiderationsOffsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - ConsiderationsBrenda Swick
 

Destacado (17)

City of deception
City of deceptionCity of deception
City of deception
 
Agile Testing
Agile Testing  Agile Testing
Agile Testing
 
Canadian Healthcare Codes and Terminology Standards
Canadian Healthcare Codes and Terminology StandardsCanadian Healthcare Codes and Terminology Standards
Canadian Healthcare Codes and Terminology Standards
 
Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?Quelle gouvernance pour le numérique?
Quelle gouvernance pour le numérique?
 
Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...
Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...
Clinical development, contract & outsourcing in mena & asia pac webinar-l aju...
 
Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...
Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...
Enterprise Wearables: Wearing Our Parts On Our Sleeves - How Wearable Technol...
 
Add 2009 10
Add 2009 10Add 2009 10
Add 2009 10
 
Coding is the new literacy to make a difference in the world
Coding is the new literacy to make a difference in the worldCoding is the new literacy to make a difference in the world
Coding is the new literacy to make a difference in the world
 
Proyecto de Protección Ambiental de Bosawas, NIcaragua
Proyecto de Protección Ambiental de Bosawas, NIcaraguaProyecto de Protección Ambiental de Bosawas, NIcaragua
Proyecto de Protección Ambiental de Bosawas, NIcaragua
 
5 mythes de la marche au ralenti
5 mythes de la marche au ralenti5 mythes de la marche au ralenti
5 mythes de la marche au ralenti
 
U.S. Economic Sanctions Update
U.S. Economic Sanctions UpdateU.S. Economic Sanctions Update
U.S. Economic Sanctions Update
 
Agile Story Writing
Agile Story WritingAgile Story Writing
Agile Story Writing
 
Agile Release & Iteration Planning
Agile Release & Iteration Planning   Agile Release & Iteration Planning
Agile Release & Iteration Planning
 
Afrika Tikkun Annual Review
Afrika Tikkun Annual ReviewAfrika Tikkun Annual Review
Afrika Tikkun Annual Review
 
Session 3: Ivan Ho Pfizer / Counterfeit Medicines Threat to Patient Health an...
Session 3: Ivan Ho Pfizer / Counterfeit Medicines Threat to Patient Health an...Session 3: Ivan Ho Pfizer / Counterfeit Medicines Threat to Patient Health an...
Session 3: Ivan Ho Pfizer / Counterfeit Medicines Threat to Patient Health an...
 
Offsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - ConsiderationsOffsets in Defence Procurement in Canada - Considerations
Offsets in Defence Procurement in Canada - Considerations
 
Bioterrorism
BioterrorismBioterrorism
Bioterrorism
 

Similar a Master of deception (mod)

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
The hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansThe hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansrmvvr143
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleFelipe Prado
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lectureRob Jewitt
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lectureRob Jewitt
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackersMohsinHusenManasiya
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trollsEJThompson
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hackeryanizaki
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyaniyanizaki
 
BERNARD "BERNIE" MADOFF - Synopsis
BERNARD "BERNIE" MADOFF - SynopsisBERNARD "BERNIE" MADOFF - Synopsis
BERNARD "BERNIE" MADOFF - SynopsisVogelDenise
 

Similar a Master of deception (mod) (17)

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
The hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertariansThe hacker crackdown 4 the civil libertarians
The hacker crackdown 4 the civil libertarians
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
 
Med122 hackers lecture
Med122 hackers lectureMed122 hackers lecture
Med122 hackers lecture
 
Mac129 med102 hackers lecture
Mac129 med102 hackers lectureMac129 med102 hackers lecture
Mac129 med102 hackers lecture
 
Backdoor Dreaming
Backdoor DreamingBackdoor Dreaming
Backdoor Dreaming
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 
5 of the world’s most famous hackers
5 of the world’s most famous hackers5 of the world’s most famous hackers
5 of the world’s most famous hackers
 
Hacking
HackingHacking
Hacking
 
Famous hackers
Famous hackersFamous hackers
Famous hackers
 
Phreaks, hackers & trolls
Phreaks, hackers & trollsPhreaks, hackers & trolls
Phreaks, hackers & trolls
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Power Point Hacker
Power Point HackerPower Point Hacker
Power Point Hacker
 
Hackers Izyani
Hackers IzyaniHackers Izyani
Hackers Izyani
 
Famous hackers group
Famous hackers groupFamous hackers group
Famous hackers group
 
BERNARD "BERNIE" MADOFF - Synopsis
BERNARD "BERNIE" MADOFF - SynopsisBERNARD "BERNIE" MADOFF - Synopsis
BERNARD "BERNIE" MADOFF - Synopsis
 

Master of deception (mod)

  • 1. Master of Deception (MOD) One of the legendary hacking cases of the 20th century
  • 2. WHAT IS THIS CASE ABOUT? A New York-based group of hackers, most widely known in media for their exploits of telephone company infrastructure and later prosecution, as well as being the subject of the book Masters of Deception: The Gang That Ruled Cyberspace. MOD's initial membership grew from meetings on Loop-Around Test Lines that led to legendary collaborations to hack RBOC phone switches and the various minicomputers and mainframes used to administer the telephone network. They successfully remained underground using alternative handles to hide even their true hacker identities. Master of Deception
  • 3. Acid Phreak founded the Masters of Deception with Scorpion and HAC. The name itself was, among other things, a mockery of LoD, as 'M' is one letter up in the alphabet from 'L', although the name originally was a flexible acronym that could be used to identify membership in situations where anonymity would be the best course of action. It could stand for "Millions of Dollars" just as easily as "Masters of Deception." Master of Deception
  • 4. It is claimed that the mockery of the LOD name was a statement to the underground that LOD had lost its direction. Several LOD members were close friends of MOD who had been raided and indicted by the government, causing the majority of those who remained to drop out of the underground for safety reasons. In their absence, LOD largely fell into disarray causing the disagreement and disillusionment that led Phiber Optik to align himself with MOD in an effort to restore the direction of the spirit of underground hacking. The conflict between the (MOD), Masters of Deception and (LOD), and Legion of Doom was marked as the Great Hacker War during the year 1990-1992. Master of Deception
  • 5. WHO ARE THE PARTIES INVOLVED? Original Masters of Deception: Mark Abene ("Phiber Optik") Paul Stira ("Scorpion") Eli Ladopoulos ("Acid Phreak"), HAC John Lee("Corrupt" a.k.a. "Netw1z") Julio Fernandez ("Outlaw") Additional members whose real names are unknown include: Supernigger (also of DPAK), Wing, Nynex Phreak, Billy_The_Kid, Crazy Eddie, The Plague, ZOD, Seeker, Red Knight (who was also a member of Cult of the Dead Cow), Lord Micro, n00gie and peaboy (aka, MCI Sprinter). Master of Deception
  • 6. DID ANY PROSECUTION RESULT? Yes, it did. IF SO, WHAT WERE THE OUTCOME? As a result of a major nationwide investigation by a joint FBI/Secret Service task force, five of MOD’s members were indicted in 1992 in federal court. Within the next six months (in 1993), all five pleaded guilty and were sentenced to either probation or prison. Master of Deception
  • 7. WHAT ETHICAL ISSUES ARE RAISED BY THIS CASE? The ethical issues in this case involves every issue in hacking. You cannot deny that you are the hacker. And you cannot avoid the war between the two groups of hacker. Although The Hacker Manifesto states that, “The only crime a hacker commits is the crime of curiosity.” Hacking is a serious crime, It is more the “unauthorized access and modification of the data there in” which is regulated by laws rather than the act of ‘hacking’ which in short , means “writing the code in an unauthorized way”. Master of Deception