1969 – The first computer hackers emerge at MIT. They borrow their name form a term to describe members of a model train group at the school who “hack” the electric trains, tracks, and switches to make them perform faster and differently. A few of the members transfer their curiosity and rigging skills to the new mainframe computing systems being studied and development on campus.
1971 – First e-mail program written by Ray Tomlinson and used on ARPANET which now has 64 nodes. Tomlinson of Bolt Beranek and Newman, contracted by the Advanced Research projects Agency to create the ARPANET selects the @ symbol to separate use name in e-mail as the first e-mail messages are sent between computers.
1972 – John Draper arrested for phone phreaking and sentenced to four months in California’s Lompoc prison.
1978 – Kevin David Mitnick meets phone phreak Lewis De Payne of Roscoe gang while harassing a HAM Radio operator on the air in Southern California.
1979 – The C Programming Language by Brain W. Kernighan and Dennix M. Ritchie is published.
1980 – Usenet is born, networking UNIX machines over slow phone lines. Usenet eventually overruns ARPANET as the virtual bulletin board of choice for the emerging hacker nation.
1981 – Kenji Urada becomes the first reported death caused by a robot. A self-propelled robotic cart crushed him as he was trying to repair it in a Japanese factory.
1981 – Ian Murphy was the first hacker to be tried and convicted as a felon. Murphy broke into AT&T’s computers and changed the internal clocks that metered billing rates. People were getting late-night discount rates when they called at midday.
1981 – Kevin Mitnick is arrested for stealing computer manuals from pacific Bell’s switching center in Los Angeles, California. He will be prosecuted as a juvenile and sentenced to probation.
1982 – Kevin Mitnick cracks Pacific Telephone system and TRW; destroys data.
1982 – 414 Gang phreakers raided. “414 Private” BBS was where the “414 Gang” would exchange information while breaking into systems of Sloan-Kettering Cancer Center and Los Alamox Military Computers.
1983 – Kevin Poulsen and Ron Austin are arrested for breaking into the ARPANET. At the age of 17 Poulsen is not prosecuted and Austin receives 3 year probation.
1984 – Bill Landreth is convicted of breaking into some of the most secure computer system in the United States, Including GTE Telamail’s electronic mail network, where he peeped at NASA Department of Defense Computer Correspondence. In 1987 Bill Violated his Probation and was back in jail finishing his sentence. Bill alsi authored an interesting read tilted “Out of the Inner Cirle”.
1986 – The german hacker group, Choas Computer Club, hacked information about the german Nuclear Power Program from government Computers during the Chernobyl crisis.
1986 – Legion of Doom/H member Loyd Blankenship is arrested around this time. He publishes a now-famous treatise that comes to be known as the Hacker’s Manifesto.
1986 – The Phoenix Fortrees BBS issues warrants for the arrest and confiscation of the equipment of 7 local users in Fremont, CA. The sysop turns out to be a local law enforcement agent and the Phoenix Fortrees created to catch hackers and software pirates.
1987 – Its disclosed publicly that young german computer hackers calling themselves the Data Travelers, managed to Break into NASA network computers and other world-wide top secret computer installations.
1987 – Chaos Computer Club hacks NASA’s SPAN Network.
1987 – Kevin Mitnick invades system at Santa Cruz Operation. Mitnick sentenced to probation for stealing software from SCO, after he cooperates by telling SCO engineers how he got into their systems.
1989 – A task force in Chicago raids and arrests an alleged computer hacker known as Kyrie.
1989 – An underground group of hackers known as the NuPrometheus League distributes proprietary software illegally obtained from Apple Computers.
1990 – Chicago task force raids an alleged computer hacker Craig Neidorf in St. Louis.
1990 – US Secret Service raid an alleged computer hacker Len Rose in Maryland. Len somehow got his hands on system V 3.2 AT&T UNIX Source Code, Including the source login.c.
1990 – Chicago Task force raids the home of Robert izenberg, an alleged computer hacker in Austin.
1990 – A 24 year-old Denven Man, Richard G. Wittman Jr., has admitted breaking into a NASA computer system. In a plea bargain, Wittman plead guilty to a single count of altering information – a password inside a federal computer.
1991 – Kevin Poulsen Arrested for breaking into Pacific Bell phone systems.
1991 – Justin Petersen arrested for breaking into TRW, stealing credit cards.
1991 – Linus Torvalds publicly releases Linux version 0.01. White a computer science student at the University of Helsinki Linus created Linux operation. Linus originally named his operating system freax.
1992 – Morty Rosenfeld convicted after hacking into TRW, stealing credit card numbers and selling credit report.
1992 – Kevin Mitnick cracks into California Department of Motor Vehicles.
1993 – Justin Petersen arrested for stealing computer access equipment.
1993 – Randal Schwartz uses Crack at Intel to crack passwords, later found quilty under an Oregon Computer crime law, and sentenced.
1994 – Vladimir Levin 23 years old, led a Russian hacker group in the first publicly revealed international band robbery over a network. Stealing around 10 Million dollars from Citibank, which claims to have recovered all but $400,000 of the money. Levin was later caught and sentenced to 3 years in prison.
1994 – Justin Petersen electronically steals $150 from Heller Financial.
1994 – Kevin Mitnick cracks into Tsutomu Shimomura’s Computers. Mitnick was first suspected of hacking into Tsutomu’s computers in 1994 but an unknown Israeli hacker was later suspected. The Israeli hacker was thought to be looking for the Oki cell phone disassembler written by Shimomura and wanted by Mitnick.
1995 – Kevin Mitnick cracks into the Well; puts Shimomura’s files and Netcom credit card numbers there.
1995 – Kevin Mitnick arrested and charged with obtaining unauthorized access to computer belonging to numerous computer software and computer operator system manufactures, cellular telephone manufactures, Internet Service Providers, and educational Institutional and stealing copying and misappropriate computer software from Motorola, Fujitsu, Nokia, Sun, Novell, and NEC. Mitnick was also in possession of 20,000 credit card numbers.
1995 – French student Damien Doligez cracks 40-bit encryption. The challenge presented the encrypted data of a Netscape session, using the default exportable mode, 40-bit RC4 encryption. Doligez broke the code in eight days using 112 workstations.
1995 – 22 year old Golle Cushing arrested for selling credit card and cell phone info.
1995 – Ian Goldberg and David Wagner broke the pseudo-random number generator of Netscape Navigator 1.1. They get the session key in a few hours on a single workstation.
1995 – Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Pile, who called himself the “Black Baron”, was sentenced to 18 Months in Jail.
1996 – Hackers break into the NYPD’s phone system and change the taped message that greeted callers. The new messages said “Officers are too busy eating doughnuts and drinking coffee to answer the phones.” It directed callers to dial 119 in an emergency.
1996 – DOS attack against Panix.com, a New York-based ISP. An attacker used a single computer to send thousands of copies of a simple message that Computers use to stat a two-way dialog. The panix machines receiving the message had to allocate so much computer capacity to handle the dialogs that they used up their resources and were disabled.
1996 – Kevin Mitnick indicted for damaging computers and USC. Mitnick was charged with 14 counts of wire fraud, arising from his alleged theft of proprietary software from manufactures. The charges also accuse him of damaging USC’s Computer and “stealing and compiling” numerous electronic files containing passwords.
1997 – Hacker named “Jester” has the first federal charges brought against a juvenile for a computer crime. Jester’s cuts off the FAA tower at Worcester Airport and sentenced to paying restitution to the telephone company and complete 250 hours of community service.
1997 – Julio Ardita a 21 years old Argentinean was sentenced to a three-year probation for hacking into computer systems belonging to Harvard, NASA, Los Alamos National Laboratory and the Naval Command, Control and Ocean Surveillance Center.
1997 – www.yahoo.com is defaced by “Pantz” and h4gis”.
1998 – Two hackers, Hao Jinglong and Hao Jingwen are sentenced to death by a court in China for breaking into a bank computer network and stealing $87,000. The Yangzhou intermediate people’s court in eastern Jiangsu province of china rejected an appeal of Hao Jingwen and upholding a death sentence against him. Jingwen and his brother, Hao Jinglong, hacked into the Industrial and Commercial Bank of China computers and shifted $87, 0000 into Accounts they had set up under phoney names. In September of 1998, they withdraw $31,000 of those funds. Hao Jinglong’s original sentence to death was suspended in return for his testimony.
1998 – A Criminal hacker used to sheer size of AOL’s technical support 6,000 people to social engineer his way into the ACLU’s website. The attacker repeadtedly phoned AOL until he found a support technician foolish enough to grant access to the targeted website, which was wiped out as a result of the attack.
1998 – Hackers deface The New York Times (www.nytimes.com) website, renaming it HFG (Hacking for Girls). The hackers express anger at the arrest and imprisonment of Kevin Mitnick, the subject of the book “Takedown” Co-authored by Times reporter John Markoff. In early November two members of HFG told Forbes magazine that they initiated the attack because they were bored and couldn’t agree on a video to watch.
1999 – 15 year old from Vienna hacks into Clemson University’s system and tries breaking into NASA.
1999 – Jay satiro an 18 years old high school dropout was charged with computer tampering after hacking into the internal computer of America Online and altering some programs. Jay pled quilt and was sentenced to one year in jail and five year without a home PC.
1999 – Melissa virus affects 100,000 email users and caused $80 million in damages; written by David Smith a 29 year old New jersey computer programmer. The virus known as Melissa, was named after Florida Stripper.
1999 – CIH virus released by Chen Ing-Hou, the creator of the CIH virus that takes his initials. This was the first known virus to target the flash BIOS.
2000 – 19 year old Rapheal Gray steals over 23,000 Credit card numbers from 8 small companies. Rapheal styled himself as a “saint of e-commerce”, as he hacked into US. British and Canadian companies during a “Crusade” to expose holes in Internet Security and who used computer billionaire Bill Gates’ Credit Card details to send him Vaigra.
2000 – 16 year old Canadian hacker nicknamed “Mafiaboy”, carried out his distributed denial pf service “DDos” spree using a tool that let him launch a remotely coordinated blitz of 1 GB/Sec flood of IP packed requests from “Zombie” servers which knocked Yahoo off-line for over 3 hours. After pleding quilty “Mafiaboy” was sentenced on Sep 12 2001 to eight months in a youth detention center.
2000 – DDos attack continued, this time hitting eBay, Amazon, Buy.com, ZDNET, CNN, eTrade and MSN.
2000 – Love Bug Virus sent from Philippines; AMA Computer College. Micheal Buen & Onel de Guzman is suspected of writing the Virus.
2000 – After 9 million hack attempts security web site AntiOnline is defaced by Australian hacker ‘ron1n’ AntiOnline was deemed ‘unhackable’ by sites owner, John Vranessevich led to the hack.
2000 – A 19 year old Dutch hacker named ‘Dimitri’ broke in to Microsoft’s internal web servers with intentions to show the company it’s vulnerability due to not installing their own patches.
2001 – Anna Kournikova Virus released by 20 years old Dutchman Jan de Wit who was later arrested and sentenced to 150 hours of community service.
2001 – FBI reports that 40 e-commerce sites located 20 US states were cracked by eastern Europe hackers, have stolen more than one million credit card numbers from US e-commerce and banking websites.
2001 – Hackers attack University of Washington and put file sharing program on its computers.
2001 – Hackers access Playboy.com’s credit card data. The hacking group ‘ingreslock 1524’ claim responsibility.
2001 – 25 church web sites hacked by Hacking for Satan Group.
2002 – Hackers broke into USA Today’s website and replaced several of the newspaper’s legitimate news stories with phony articles. Israeli hackers were suspected.
2003 – Computer hacker Kevin Mitnick is goes Online for the first time in nearly a decade. He was captured in a raid and sent to jail for almost five almost five years for computer crimes against companies including SUN MICROSYSTEMS and Motorola. The prison term was followed by another three and half years of restrictions regarding Mitnick’s access to Computer and the Internet.
2003 – It’s Reported that a Hacker ‘unauthorized intruder’ gained access to some 8 million credit card account numbers including Visa, MasterCard and American Express by breaking the Security of a Company that Process transaction for merchants, the card companies said.
1971 – First e-mail program written by Ray Tomlinson and used on ARPANET which now has 64 nodes. Tomlinson of Bolt Beranek and Newman, contracted by the Advanced Research projects Agency to create the ARPANET selects the @ symbol to separate use name in e-mail as the first e-mail messages are sent between computers.
1972 – John Draper arrested for phone phreaking and sentenced to four months in California’s Lompoc prison.
1978 – Kevin David Mitnick meets phone phreak Lewis De Payne of Roscoe gang while harassing a HAM Radio operator on the air in Southern California.
1979 – The C Programming Language by Brain W. Kernighan and Dennix M. Ritchie is published.
1980 – Usenet is born, networking UNIX machines over slow phone lines. Usenet eventually overruns ARPANET as the virtual bulletin board of choice for the emerging hacker nation.
1981 – Kenji Urada becomes the first reported death caused by a robot. A self-propelled robotic cart crushed him as he was trying to repair it in a Japanese factory.
1981 – Ian Murphy was the first hacker to be tried and convicted as a felon. Murphy broke into AT&T’s computers and changed the internal clocks that metered billing rates. People were getting late-night discount rates when they called at midday.
1981 – Kevin Mitnick is arrested for stealing computer manuals from pacific Bell’s switching center in Los Angeles, California. He will be prosecuted as a juvenile and sentenced to probation.
1982 – Kevin Mitnick cracks Pacific Telephone system and TRW; destroys data.
1982 – 414 Gang phreakers raided. “414 Private” BBS was where the “414 Gang” would exchange information while breaking into systems of Sloan-Kettering Cancer Center and Los Alamox Military Computers.
1983 – Kevin Poulsen and Ron Austin are arrested for breaking into the ARPANET. At the age of 17 Poulsen is not prosecuted and Austin receives 3 year probation.
1984 – Bill Landreth is convicted of breaking into some of the most secure computer system in the United States, Including GTE Telamail’s electronic mail network, where he peeped at NASA Department of Defense Computer Correspondence. In 1987 Bill Violated his Probation and was back in jail finishing his sentence. Bill alsi authored an interesting read tilted “Out of the Inner Cirle”.
1986 – The german hacker group, Choas Computer Club, hacked information about the german Nuclear Power Program from government Computers during the Chernobyl crisis.
1986 – Legion of Doom/H member Loyd Blankenship is arrested around this time. He publishes a now-famous treatise that comes to be known as the Hacker’s Manifesto.
1986 – The Phoenix Fortrees BBS issues warrants for the arrest and confiscation of the equipment of 7 local users in Fremont, CA. The sysop turns out to be a local law enforcement agent and the Phoenix Fortrees created to catch hackers and software pirates.
1987 – Its disclosed publicly that young german computer hackers calling themselves the Data Travelers, managed to Break into NASA network computers and other world-wide top secret computer installations.
1987 – Chaos Computer Club hacks NASA’s SPAN Network.
1987 – Kevin Mitnick invades system at Santa Cruz Operation. Mitnick sentenced to probation for stealing software from SCO, after he cooperates by telling SCO engineers how he got into their systems.
1989 – A task force in Chicago raids and arrests an alleged computer hacker known as Kyrie.
1989 – An underground group of hackers known as the NuPrometheus League distributes proprietary software illegally obtained from Apple Computers.
1990 – Chicago task force raids an alleged computer hacker Craig Neidorf in St. Louis.
1990 – US Secret Service raid an alleged computer hacker Len Rose in Maryland. Len somehow got his hands on system V 3.2 AT&T UNIX Source Code, Including the source login.c.
1990 – Chicago Task force raids the home of Robert izenberg, an alleged computer hacker in Austin.
1990 – A 24 year-old Denven Man, Richard G. Wittman Jr., has admitted breaking into a NASA computer system. In a plea bargain, Wittman plead guilty to a single count of altering information – a password inside a federal computer.
1991 – Kevin Poulsen Arrested for breaking into Pacific Bell phone systems.
1991 – Justin Petersen arrested for breaking into TRW, stealing credit cards.
1991 – Linus Torvalds publicly releases Linux version 0.01. White a computer science student at the University of Helsinki Linus created Linux operation. Linus originally named his operating system freax.
1992 – Morty Rosenfeld convicted after hacking into TRW, stealing credit card numbers and selling credit report.
1992 – Kevin Mitnick cracks into California Department of Motor Vehicles.
1993 – Justin Petersen arrested for stealing computer access equipment.
1993 – Randal Schwartz uses Crack at Intel to crack passwords, later found quilty under an Oregon Computer crime law, and sentenced.
1994 – Vladimir Levin 23 years old, led a Russian hacker group in the first publicly revealed international band robbery over a network. Stealing around 10 Million dollars from Citibank, which claims to have recovered all but $400,000 of the money. Levin was later caught and sentenced to 3 years in prison.
1994 – Justin Petersen electronically steals $150 from Heller Financial.
1994 – Kevin Mitnick cracks into Tsutomu Shimomura’s Computers. Mitnick was first suspected of hacking into Tsutomu’s computers in 1994 but an unknown Israeli hacker was later suspected. The Israeli hacker was thought to be looking for the Oki cell phone disassembler written by Shimomura and wanted by Mitnick.
1995 – Kevin Mitnick cracks into the Well; puts Shimomura’s files and Netcom credit card numbers there.
1995 – Kevin Mitnick arrested and charged with obtaining unauthorized access to computer belonging to numerous computer software and computer operator system manufactures, cellular telephone manufactures, Internet Service Providers, and educational Institutional and stealing copying and misappropriate computer software from Motorola, Fujitsu, Nokia, Sun, Novell, and NEC. Mitnick was also in possession of 20,000 credit card numbers.
1995 – French student Damien Doligez cracks 40-bit encryption. The challenge presented the encrypted data of a Netscape session, using the default exportable mode, 40-bit RC4 encryption. Doligez broke the code in eight days using 112 workstations.
1995 – 22 year old Golle Cushing arrested for selling credit card and cell phone info.
1995 – Ian Goldberg and David Wagner broke the pseudo-random number generator of Netscape Navigator 1.1. They get the session key in a few hours on a single workstation.
1995 – Christopher Pile becomes the first person to be jailed for writing and distributing a computer virus. Pile, who called himself the “Black Baron”, was sentenced to 18 Months in Jail.
1996 – Hackers break into the NYPD’s phone system and change the taped message that greeted callers. The new messages said “Officers are too busy eating doughnuts and drinking coffee to answer the phones.” It directed callers to dial 119 in an emergency.
1996 – DOS attack against Panix.com, a New York-based ISP. An attacker used a single computer to send thousands of copies of a simple message that Computers use to stat a two-way dialog. The panix machines receiving the message had to allocate so much computer capacity to handle the dialogs that they used up their resources and were disabled.
1996 – Kevin Mitnick indicted for damaging computers and USC. Mitnick was charged with 14 counts of wire fraud, arising from his alleged theft of proprietary software from manufactures. The charges also accuse him of damaging USC’s Computer and “stealing and compiling” numerous electronic files containing passwords.
1997 – Hacker named “Jester” has the first federal charges brought against a juvenile for a computer crime. Jester’s cuts off the FAA tower at Worcester Airport and sentenced to paying restitution to the telephone company and complete 250 hours of community service.
1997 – Julio Ardita a 21 years old Argentinean was sentenced to a three-year probation for hacking into computer systems belonging to Harvard, NASA, Los Alamos National Laboratory and the Naval Command, Control and Ocean Surveillance Center.
1997 – www.yahoo.com is defaced by “Pantz” and h4gis”.
1998 – Two hackers, Hao Jinglong and Hao Jingwen are sentenced to death by a court in China for breaking into a bank computer network and stealing $87,000. The Yangzhou intermediate people’s court in eastern Jiangsu province of china rejected an appeal of Hao Jingwen and upholding a death sentence against him. Jingwen and his brother, Hao Jinglong, hacked into the Industrial and Commercial Bank of China computers and shifted $87, 0000 into Accounts they had set up under phoney names. In September of 1998, they withdraw $31,000 of those funds. Hao Jinglong’s original sentence to death was suspended in return for his testimony.
1998 – A Criminal hacker used to sheer size of AOL’s technical support 6,000 people to social engineer his way into the ACLU’s website. The attacker repeadtedly phoned AOL until he found a support technician foolish enough to grant access to the targeted website, which was wiped out as a result of the attack.
1998 – Hackers deface The New York Times (www.nytimes.com) website, renaming it HFG (Hacking for Girls). The hackers express anger at the arrest and imprisonment of Kevin Mitnick, the subject of the book “Takedown” Co-authored by Times reporter John Markoff. In early November two members of HFG told Forbes magazine that they initiated the attack because they were bored and couldn’t agree on a video to watch.
1999 – 15 year old from Vienna hacks into Clemson University’s system and tries breaking into NASA.
1999 – Jay satiro an 18 years old high school dropout was charged with computer tampering after hacking into the internal computer of America Online and altering some programs. Jay pled quilt and was sentenced to one year in jail and five year without a home PC.
1999 – Melissa virus affects 100,000 email users and caused $80 million in damages; written by David Smith a 29 year old New jersey computer programmer. The virus known as Melissa, was named after Florida Stripper.
1999 – CIH virus released by Chen Ing-Hou, the creator of the CIH virus that takes his initials. This was the first known virus to target the flash BIOS.
2000 – 19 year old Rapheal Gray steals over 23,000 Credit card numbers from 8 small companies. Rapheal styled himself as a “saint of e-commerce”, as he hacked into US. British and Canadian companies during a “Crusade” to expose holes in Internet Security and who used computer billionaire Bill Gates’ Credit Card details to send him Vaigra.
2000 – 16 year old Canadian hacker nicknamed “Mafiaboy”, carried out his distributed denial pf service “DDos” spree using a tool that let him launch a remotely coordinated blitz of 1 GB/Sec flood of IP packed requests from “Zombie” servers which knocked Yahoo off-line for over 3 hours. After pleding quilty “Mafiaboy” was sentenced on Sep 12 2001 to eight months in a youth detention center.
2000 – DDos attack continued, this time hitting eBay, Amazon, Buy.com, ZDNET, CNN, eTrade and MSN.
2000 – Love Bug Virus sent from Philippines; AMA Computer College. Micheal Buen & Onel de Guzman is suspected of writing the Virus.
2000 – After 9 million hack attempts security web site AntiOnline is defaced by Australian hacker ‘ron1n’ AntiOnline was deemed ‘unhackable’ by sites owner, John Vranessevich led to the hack.
2000 – A 19 year old Dutch hacker named ‘Dimitri’ broke in to Microsoft’s internal web servers with intentions to show the company it’s vulnerability due to not installing their own patches.
2001 – Anna Kournikova Virus released by 20 years old Dutchman Jan de Wit who was later arrested and sentenced to 150 hours of community service.
2001 – FBI reports that 40 e-commerce sites located 20 US states were cracked by eastern Europe hackers, have stolen more than one million credit card numbers from US e-commerce and banking websites.
2001 – Hackers attack University of Washington and put file sharing program on its computers.
2001 – Hackers access Playboy.com’s credit card data. The hacking group ‘ingreslock 1524’ claim responsibility.
2001 – 25 church web sites hacked by Hacking for Satan Group.
2002 – Hackers broke into USA Today’s website and replaced several of the newspaper’s legitimate news stories with phony articles. Israeli hackers were suspected.
2003 – Computer hacker Kevin Mitnick is goes Online for the first time in nearly a decade. He was captured in a raid and sent to jail for almost five almost five years for computer crimes against companies including SUN MICROSYSTEMS and Motorola. The prison term was followed by another three and half years of restrictions regarding Mitnick’s access to Computer and the Internet.
2003 – It’s Reported that a Hacker ‘unauthorized intruder’ gained access to some 8 million credit card account numbers including Visa, MasterCard and American Express by breaking the Security of a Company that Process transaction for merchants, the card companies said.
0 comments:
Post a Comment