1. Kevin Mitnick Kevin Mitnick
Mitnick mungkin identik dengan Hacker
. The Department of Justice still refers to him as "the most wanted computer criminal in United States history." Departemen Kehakiman masih merujuk kepadanya sebagai "komputer kriminal paling dicari dalam sejarah Amerika Serikat." His accomplishments were memorialized into two Hollywood movies: Takedown and Freedom Downtime. prestasi Nya dimonumenkan menjadi dua film Hollywood: Takedown dan "Freedom Downtime.
Mitnick got his start by exploiting the Los Angeles bus punch card system and getting free rides. Mitnick mendapat mulai nya dengan memanfaatkan Los Angeles bus sistem kartu punch dan mendapatkan rides gratis. Then similar to Steve Wozniak, of Apple, Mitnick tried Phone Phreaking. Lalu mirip dengan Steve Wozniak, Apple, Mitnick mencoba Telepon Phreaking. Mitnick was first convicted for hacking into the Digital Equipment Corporation's computer network and stealing software. Mitnick pertama kali dihukum-hack ke jaringan komputer Digital Equipment Corporation dan mencuri software.
Mitnick then embarked on a two and a half year coast to coast hacking spree. Mitnick kemudian memulai dua setengah tahun pantai ke pantai hacking foya. He has stated that he hacked into computers, scrambled phone networks, stole corporate secrets and hacked into the national defense warning system. Dia telah menyatakan bahwa ia meng-hack ke komputer, orak-arik jaringan telepon, mencuri rahasia perusahaan dan menyusup ke sistem peringatan pertahanan nasional. His fall came when he hacked into fellow computer expert and hacker Tsutomu Shimomura's home computer. jatuh Nya datang ketika ia menyusup ke ahli komputer dan komputer di rumah rekan-rekan hacker Tsutomu Shimomura's.
Mitnick is now a productive member of society. Mitnick sekarang menjadi anggota masyarakat yang produktif. After serving 5 years and 8 months in solitary confinement, he is now a computer security author, consultant and speaker. Setelah menjalani 5 tahun 8 bulan di pengasingan, ia sekarang menjadi keamanan komputer penulis, konsultan dan pembicara.
2. 2. Adrian Lamo Adrian Lamo
Lamo hit major organizations hard, hacking into Microsoft and The New York Times.Lamo hit organisasi besar keras, hacking ke Microsoft dan The New York Times. Lamo would use Internet connections at coffee shops, Kinko's and libraries to achieve his feats earning him the nickname "The Homeless Hacker". Lamo akan menggunakan koneksi internet di warung kopi, Kinko dan perpustakaan untuk mencapai prestasi itu produktif dia julukan "The Homeless Hacker". Lamo frequently found security flaws and exploited them. Lamo sering ditemukan kelemahan keamanan dan dimanfaatkan mereka. He would often inform the companies of the flaw. Dia sering akan menginformasikan perusahaan dari cacat.
Lamo's hit list includes Yahoo!, Citigroup, Bank of America and Cingular. daftar sasaran Lamo ini meliputi Yahoo!, Citigroup, Bank of America dan Cingular. Of course White Hat Hackers do this legally because they are hired by the company to such, Lamo however was breaking the law. Tentu saja White Hat Hacker melakukan ini secara hukum karena mereka dipekerjakan oleh perusahaan untuk tersebut, namun Lamo adalah melanggar hukum.
Lamo's intrusion into The New York Times intranet placed him squarely into the eyes of the top cyber crime offenders. Lamo intrusi ke dalam The New York Times intranet menempatkannya tepat ke mata para pelaku kejahatan cyber atas. For this crime, Lamo was ordered to pay $65,000 in restitution. Untuk kejahatan ini, Lamo diperintahkan untuk membayar $ 65.000 pada restitusi. Additionally, he was sentenced to six months home confinement and 2 years probation. Selain itu, ia dijatuhi hukuman enam bulan kurungan rumah dan 2 tahun masa percobaan.Probation expired January of 2007. Percobaan berakhir Januari 2007. Lamo now is a notable public speaker and award winning journalist. Lamo sekarang menjadi pembicara publik terkemuka dan jurnalis berprestasi.
3. Jonathan James : Jonathan James:
At 16 years old, James gained enormous notoriety when he was the first minor to be sent to prison for hacking. Pada 16 tahun, James menjadi terkenal besar ketika ia adalah yang pertama kecil untuk dikirim ke penjara untuk hacking. He later admitted that he was just having fun and looking around and enjoyed the challenge. Dia kemudian mengakui bahwa ia hanya bersenang-senang dan melihat sekeliling dan menikmati tantangan.
James hit high profile organizations including the Defense Threat Reduction Agency, which is an agency of the Department of the Defense. James hit organisasi profil tinggi termasuk Pertahanan Threat Reduction Agency, yang merupakan agen dari Departemen Pertahanan. With this hack he was able to capture usernames and passwords and view highly confidential emails. Dengan hack ia mampu menangkap username dan password dan melihat email sangat rahasia.
High on James list, James also hacked in NASA computers and stole software valued at over $1.7 million. Tinggi pada daftar James, James juga berhasil menjebol komputer NASA dan mencuri software dengan harga lebih dari $ 1,7 juta. The Justice Department was quoted as saying: "The software stolen by James supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." Departemen Kehakiman dikutip mengatakan: "software yang dicuri James didukung lingkungan fisik Stasiun Luar Angkasa Internasional, termasuk pengaturan suhu dan kelembaban di dalam ruang hidup." Upon discovering this hack, NASA had to shut dow its entire computer system costing taxpayers $41,000. Setelah menemukan hack ini, NASA harus menutup dow komputer seluruh sistem pembayar pajak seharga $ 41.000. Today James aspires to start a computer security company. Saat ini James bercita-cita untuk memulai sebuah perusahaan keamanan komputer.
4. 4. Robert Tappan Morris : Robert Tappan Morris:
Morris is the son of a former National Security Agency scientist named Robert Morris.Morris merupakan anak dari seorang ilmuwan mantan Security Badan bernama Robert Morris. Robert is the creator of the Morris worm. Robert adalah pencipta worm Morris. This worm was credited as the first computer worm spread through the Internet. Cacing ini dicatat sebagai komputer pertama worm menyebar melalui Internet. Because of his actions, he was the first person to be prosecuted under the 1986 Computer Fraud and Abuse Act. Karena tindakannya, ia adalah orang pertama yang dituntut di bawah 1986 Penipuan dan Penyalahgunaan Komputer Undang-Undang.
Morris created the worm while at Cornell as a student claiming that he intended to use the worm to see how large the Internet was at the time. Morris menciptakan cacing sementara pada Cornell sebagai mahasiswa menyatakan bahwa ia bermaksud untuk menggunakan cacing untuk melihat berapa besar Internet pada waktu itu. The worm, however, reproduced itself uncontrollably, shutting down many computers until they had completely malfunctioned. cacing, bagaimanapun, direproduksi sendiri tak terkendali, mematikan banyak komputer sampai mereka telah benar-benar berfungsi.Experts claim 6,000 machines were destroyed. Para ahli mengklaim 6.000 mesin hancur. Morris was ultimately sentenced to three years' probation, 400 hours of community service and assessed a $10,500 fine. Morris akhirnya dihukum percobaan tiga tahun, 400 jam pelayanan masyarakat dan dinilai denda $ 10.500.
Morris is now a tenured professor at the MIT Computer Science and Artificial Intelligence Laboratory. Morris sekarang menjadi profesor tetap di MIT Computer Science dan Kecerdasan Buatan Laboratorium. His focus is computer network architecture. Fokus Nya adalah arsitektur komputer jaringan.
5. 5. Kevin Poulsen : Kevin Poulsen:
Frequently referred to as Dark Dante, Poulsen gained national recognition for his hack into Los Angeles radio's KIIS-FM phone lines. Sering disebut sebagai Dark Dante, Poulsen mendapat pengakuan nasional untuk nya hack ke garis KIIS-FM Los Angeles radio telepon. These actions earned him a Porsche among many other items. Tindakan ini membuatnya mendapatkan sebuah mobil Porsche antara banyak item lain.
The FBI began to search for Poulson, when he hacked into the FBI database and federal computers for sensitive wiretap information. FBI mulai mencari Poulson, ketika ia menjebol database FBI dan komputer federal untuk informasi penyadapan.Poulsen's specialty was hacking into phone lines and he frequently took over all of a station's phone lines. khusus Poulsen adalah hacking ke saluran telepon dan ia sering mengambil alih semua lini telepon stasiun. Poulson also reactivated old Yellow Page escort telephone numbers for a partner who operated a virtual escort agency. Poulson juga diaktifkan kembali nomor lama mengawal telepon Yellow Page pasangan yang dioperasikan badan pendamping virtual. Poulson was featured on Unsolved Mysteries and then captured in a supermarket. Poulson adalah fitur pada Unsolved Mysteries dan kemudian ditangkap di pasar swalayan. He was assessed a sentence of five years.Dia dinilai hukuman lima tahun.
Since his time in prison, Poulsen has worked as a journalist and was promoted to senior editor for Wired News. Sejak saat di penjara, Poulsen bekerja sebagai seorang jurnalis dan dipromosikan menjadi editor senior Wired News. His most popular article details his work on identifying 744 sex offenders with Myspace profiles. Pasalnya rincian karyanya yang paling populer untuk mengidentifikasi 744 pelecehan seksual di profil Myspace.