What's new

Closed History Of häçking

Status
Not open for further replies.

The Real One

Forum Expert
Joined
May 8, 2013
Posts
2,009
Reaction
15,462
Points
2,487
Age
32
Anonymous_thumb.jpg


Computer häçking is the most popular form of häçking nowadays, especially in the field of computer security, but häçking exists in many other forms, such as phone häçking, brain häçking, etc. and it’s not limited to either of them.In the computer security context, a häçker is someone who seeks and exploits weaknesses in a computer system or computer network. häçkers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment.

häçking has been around for more than a century. In the 1870s, several teenagers were flung off the country’s brand new phone system by enraged authorities. Here’s a peek at how busy häçkers have been in the past 35 years.

Early 1960s
University facilities with huge mainframe computers, like MIT’s artificial intelligence lab, become staging grounds for häçkers. At first, “häçker” was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

Early 1970s
ohn Draper John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children’s cereal. Draper, who later earns the handle “Captain Crunch,” is arrested repeatedly for phone tampering throughout the 1970s.

Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone häçkers (called “phreaks”) make free long-distance calls.

Two members of California’s Homebrew Computer Club begin making “blue boxes,” devices used to häçk into the phone system. The members, who adopt handles “Berkeley Blue” (Steve Jobs) and “Oak Toebark” (Steve Wozniak), later go on to found Apple Computer.

Early 1980s
Author William Gibson coins the term “cyberspace” in a science fiction novel called Neuromancer.

In one of the first arrests of häçkers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.

Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.

Two häçker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.

2600: The häçker Quarterly is founded to share tips on phone and computer häçking.

Late 1980s
The Computer Fraud and Abuse Act gives more clout to federal authorities.

Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.

At 25, veteran häçker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging & häçking computers and s†éáling software and is sentenced to one year in prison.

First National Bank of Chicago is the victim of a $70-million computer heist.

An Indiana häçker known as “Fry Guy” — so named for häçking McDonald’s — is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom häçkers known by the handles “Prophet,” “Leftist” and “Urvile.”

data_records_IBM_report_2014.jpg


Early 1990s

After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national *****down on häçkers. The feds nab St. Louis’ “Knight Lightning” and in New York grab Masters of Deception trio “Phiber Optik,” ” Acid Phreak” and “Scorpion.” Fellow häçker “Eric Bloodaxe” is picked up in Austin, Texas.

Operation Sundevil, a special team of Secret Service agents and members of Arizona’s organized crime unit, conducts raids in 12 major cities, including Miami.

A 17-month search ends in the capture of häçker Kevin Lee Poulsen (“Dark Dante”), who is indicted for s†éáling military documents.

häçkers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs “Data Stream,” a 16-year-old British teenager who curls up in the fetal position when seized.

A Texas A&M professor receives death threats after a häçker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.

Kevin Mitnick [photo / AP ]In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.

Late 1990s

häçkers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.

Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by häçkers in 1995 alone.

A Canadian häçker group called the Brotherhood, angry at häçkers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: “The media are liars.” Family’s own 15-year-old son eventually is identified as stalking culprit.

häçkers pierce security in Microsoft’s NT operating system to illustrate its weaknesses.

Popular Internet search engine Yahoo! is hit by häçkers claiming a “logic bomb” will go off in the PCs of Yahoo!’s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. “There is no virus,” Yahoo! spokeswoman Diane Hunt said.

1998

Anti-häçker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a häçker. They decide to blow up the world anyway.

In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a häçker attack called “spamming.”

häçkers break into United Nation’s Children Fund Web site, threatening a “holocaust” if Kevin Mitnick is not freed.

häçkers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.

The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation’s telecommunications, technology and transportation systems from häçkers.

häçker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

1999

Software security goes mainstream In the wake of Microsoft’s Windows 98 release, 1999 becomes a banner year for security (and häçking). Hundreds of advisories and patches are released in response to newfound (and widely publicized) bugs in Windows and other commercial software products. A host of security software vendors release anti – häçking products for use on home computers.

The Electronic Civil Disobedience project, an online political performance-art group, attacks the Pentagon calling it conceptual art and claiming it to be a protest against the U.S. support of the suppression of rebels in southern Mexico by the Mexican government. ECD uses the FloodNet software to bombard its opponents with access requests.

U.S. President Bill Clinton announces a $1.46 billion initiative to improve government computer security. The plan would establish a network of intrusion detection monitors for certain federal agencies and encourage the private sector to do the same.

January 7: an international coalition of häçkers (including CULT OF THE DEAD COW, 2600 ‘s staff, Phrack’s staff, L0pht, and the Chaos Computer Club) issued a joint statement condemning the LoU’s declaration of war. The LoU responded by wí†hdráwing its declaration.

A häçker interviewed by Hilly Rose during the Art Bell Coast-to-Coast Radio Show exposes a plot by Al-Qaida to derail Amtrak trains. This results in ALL trains being forcibly stopped over Y2K as a safety measure.

March: The Melissa worm is released and quickly becomes the most costly malware outbreak to date.

July: CULT OF THE DEAD COW releases Back Orifice 2000 at DEF CON

August: Kevin Mitnick, “the most wanted man in cyberspace”,[who?] sentenced to 5 years, of which over 4 years had already been spent pre-trial including 8 months solitary confinement.

September: Level Seven Crew häçks The US Embassy in China’s Website and places racist, anti-government slogans on embassy site in regards to 1998 U.S. embassy bombings.

September 16: The United States Department of Justice sentences the “Phone Masters”..

October: American Express introduces the “Blue” smart card, the industry’s first chip-based credit card in the US.

Next Post 2000’s & 2010’s häçking History
 
Status
Not open for further replies.

Similar threads

Back
Top