Incidents

Kevin Poulsen1990-01-19 00:00:00 UTC

Indicted on charges of invading a classified military computer, stealing the unlisted telephone numbers of the Soviet Consulate in San Francisco, and routinely breaching Pacific Bells security.

Mark Lottor1990-01-19 00:00:00 UTC

The Government says Mr. Lottor and Mr. Poulsen were able to eavesdrop on telephone users including two Pacific Bell security investigators who were trying to investigate them. Under the new indictment, a third hacker who was charged in the initial indictment, Robert E. Gilligan, is named as an unindicted co-conspirator. Document Storage Questioned The indictment raises a question about how Mr. Poulsen obtained the classified documents, because Federal regulations require that classified material stored on computer systems not be easily accessible over standard telephone lines. It is possible that Mr. Poulsen obtained the military document in February 1988, when he was an employee of Sun Microsystems, a Mountain View, Calif., computer company, according to an Air Force document that is part of the court record. Sun had a contract to develop a battlefield computer system to be used at Fort Bragg.

Robert Gilligan1990-01-19 00:00:00 UTC

accused of attacks with kevin Poulsen

Craig Neidorf1990-01-18 00:00:00 UTC

Neidorf was facing 31 years in jail after being arrested and charged with receiving a document stolen from Bell South, and with publicly distributing it online. Charges were essentially dropped as the document in question was more of a memorandum and not actual source code.

unknown 1990-01-01 00:00:00 UTC

Member of legion of doom

Peter Salzman1990-01-01 00:00:00 UTC

Member of legion of doom

Adam Grant1990-01-01 00:00:00 UTC

Member of legion of doom

Kevin Mitnick1990-01-01 00:00:00 UTC

After he finished his jail time and his halfway-house counseling sentence for the 1989 Digital Equipment conviction Mitnick moved to Las Vegas and took a low-level computer programming position for a mailing list company. His mother had moved there, as had a woman who called herself Susan Thunder who had been part of Mitnicks phone phreak gang in the early 1980s, and with whom he now became reacquainted. It was during this period that he tried to "social engineer" me over the phone. In early 1992 Mitnick moved back to the San Fernando Valley area after his half-brother died of an apparent heroin overdose. He briefly worked for his father in construction, but then took a job he found through a friend of his fathers at the Tel Tec Detective Agency . Soon after he began, someone was discovered illegally using a commercial database system on the agencys behalf, and Kevin was once again the subject of an FBI investigation. In September the Bureau searched his apartment, as well as the home and workplace of another member of the original phone phreak gang. Two months later a federal judge issued a warrant for Mitnicks arrest for having violated the terms of his 1989 probation. There were two charges: illegally accessing a phone company computer, and associating with one of the people with whom hed originally been arrested in 1981. His friends claimed Mitnick had been set up by the detective firm; whatever the truth, when the FBI came to arrest him, Kevin Mitnick had vanished.

Ross Pearlstone1990-01-01 00:00:00 UTC

Ex-employee made unauthorised use of his former employers Mercury telephone account to make "free" calls.

Mark Abene1989-11-09 00:00:00 UTC

Accused member of masters of deception, 1 of 5 who was indicted in 1992 for a range of breaches on private and government based systems.

Franklen Darden1989-09-01 00:00:00 UTC

Member of legion of doom

Terry Cole1989-05-12 00:00:00 UTC

Charged with 17 counts of computer hacking and conspiracy in the theft of information from WTVT-TV through computer phone lines.

Michael Shapiro1989-05-12 00:00:00 UTC

Charged with 17 counts of computer hacking and conspiracy in the theft of information from WTVT-TV through computer phone lines.

Markus Hess1989-03-02 00:00:00 UTC

His activities began in Hanover and expanded out of the University of Bremen or through the German DATEX-P Network via satellite link or transatlantic cable to the Tymnet International Gateway. From there, he branched out to the Jet Propulsion Laboratories in Pasadena, California and to the Tymnet Switching System. It is from Tymnet that he accessed the LBL computers. His primary use of LBL was to "piggyback" onto ARPANET and MILNET. ARPANET was a civilian wide area network created by the Department of Defense. MILNET was its military counterpart. ARPANET ultimately became the internet that we know today. Through MILNET, Hess was able to attack approximately four-hundred U.S. military computers.

Karl Koch1989-03-02 00:00:00 UTC

Alleged for computer intrusions and selling secrets to west Germany KGB. Sadly he passed away in an alledge sucide in 1989

Hans Hübner1989-03-02 00:00:00 UTC

Alledged for computer intrusions and selling secrets to west Germany KGB.

Dirk Brezinski1989-03-02 00:00:00 UTC

Alledged for computer intrusions and selling secrets to west Germany KGB.

Peter Carl1989-03-02 00:00:00 UTC

Alledged for computer intrusions and selling secrets to west Germany KGB.

Robert Morris1989-01-01 00:00:00 UTC

Creator of and first person convicted of making computer worm. Morris worm was developed in 1988, while he was a graduate student at Cornell University. He said it was designed to gauge the size of the Internet. He released the worm from MIT, rather than from Cornell. The worm exploited several vulnerabilities to gain entry to targeted systems.

Edward Singh1988-10-01 00:00:00 UTC

Accused of hacking into 250 Prime and Vax computers world-wide from Surrey University and elsewhere during the previous eight years, using a sophisticated form of password grabber operating at the dial-up node. Although questioned by UK police and the US Secret Service, in the absence of CMA90 he was not prosecuted

Nicholas Whiteley1988-01-01 00:00:00 UTC

Accused of declaring war on computers from his bedroom. ended up being called the mad hacker by the media.

Kevin Mitnick1988-01-01 00:00:00 UTC

Mitnick first gained unauthorized access to a computer network in 1979, at 16, when a friend gave him the phone number for the Ark, the computer system Digital Equipment Corporation DEC used for developing their RSTS/E operating system software. He broke into DECs computer network and copied their software

James Kosta1988-01-01 00:00:00 UTC

Accused of hacking the sites of big business and military, including the systems of major banks, General Electric and IBM.

Donald Burleson1987-09-01 00:00:00 UTC

A programmer at the Fort Worth-based insurance company, USPA, was fired for allegedly being quarrelsome and difficult to work with. Two days later, approximately 168,000 vital records erased themselves from the companys computers. Burleson was caught after investigators went back through several years worth of system files and found that, two years before he was fired, Burleson had planted a logic bomb that lay dormant until he triggered it on the day of his dismissal.

Dave Buchwald1987-09-01 00:00:00 UTC

Member of legion of doom

Kevin Mitnick1987-01-01 00:00:00 UTC

By 1987, Mitnick seemed to be making an effort to pull his life together, and he began living with a woman who was taking a computer class with him at a local vocational school. After a while, however, his obsession drew him back, and this time his use of illegal telephone credit card numbers led police investigators to the apartment he was sharing with his girlfriend in Thousand Oaks, California.

Unknown 1986-03-06 00:00:00 UTC

accused member of one of the earlist collectives.

Unknown 1986-03-06 00:00:00 UTC

accused member of one of the earlist collectives.

Unknown 1986-03-06 00:00:00 UTC

accused member of one of the earlist collectives.

Unknown 1986-03-06 00:00:00 UTC

accused member of one of the earlist collectives.