List_of_computer_criminals

List of cybercriminals

List of cybercriminals

Add article description


Convicted computer criminals are people who are caught and convicted of computer crimes such as breaking into computers or computer networks.[1] Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or identity theft) and electronic fraud.[2]

Three dark-haired men wearing dark clothing. The man on the left is wearing a checkered shirt with a rain jacket. The man in the middle is wearing a printed tee with a rain jacket. The man on the right is wearing a black sweater.
Hacker Adrian Lamo (left) with Kevin Mitnick and Kevin Poulsen
Dark-haired man with unkempt hair. He is wearing a red shirt. A silver chain around his neck and an earring in his left ear can be seen.
Mark Abene, who was convicted of computer charges

In the infancy of the hacker subculture and the computer underground,[3] criminal convictions were rare because there was an informal code of ethics that was followed by white hat hackers.[4] Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them.[5] White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around.[6] They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security.[6] As the computer industry matured, individuals with malicious intentions (black hats) would emerge to exploit computer systems for their own personal profit.[6]

Convictions of computer crimes, or hacking, began as early as 1984 with the case of The 414s from the 414 area code in Milwaukee. In that case, six teenagers broke into a number of high-profile computer systems, including Los Alamos National Laboratory, Sloan-Kettering Cancer Center and Security Pacific Bank. On May 1, 1984, one of the 414s, Gerald Wondra, was sentenced to two years of probation.[7] In May, 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of Microsoft, Sundstrand Corp., Kenworth Truck Co. and Resources Conservation Co.[8]

In 2006, a prison term of nearly five years was handed down to Jeanson James Ancheta, who created hundreds of zombie computers to do his bidding via giant bot networks or botnets.[9] He then sold the botnets to the highest bidder who in turn used them for Denial-of-service (DoS) attacks.[10]

As of 2012, the longest sentence for computer crimes is that of Albert Gonzalez for 20 years.[11] The next longest sentences are those of 13 years for Max Butler,[12] 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals,[13][14] and 68 months for Kevin Mitnick in 1999.[15]

Computer criminals

More information Name, Handle ...

See also


References

  1. Bruce Sterling (1993). The Hacker Crackdown—Law and Disorder on the Electronic Frontier (January 1994 ed.). Project Gutenberg. p. 336. ISBN 0-553-56370-X.
  2. Paul Taylor (1999). Hackers: Crime in the Digital Sublime (November 3, 1999 ed.). Routledge; 1 edition. p. 200. ISBN 0-415-18072-4.
  3. Steve Mizrach (2009). "The electronic discourse of the computer underground". Florida International University. Retrieved May 10, 2009. Gordon Meyer, a sociologist who has since left academia but continues to be involved in the computer industry (and to publish the Computer Underground Digest), wrote in his seminal paper The Social Organization of the Computer Underground that the "computer underground consists of actors in three roles – computer hackers, phone phreaks, and software pirates."
  4. Brian Blomquist (May 29, 1999). "FBI'S web site socked as hackers target feds". New York Post. Retrieved May 8, 2009.[permanent dead link]
  5. Andrew Brandt (April 2, 2001). "Hacker Speak". PC World. Archived from the original on May 1, 2009. Retrieved May 10, 2009.
  6. "Computer User Sentenced". The New York Times. May 1, 1984. Retrieved September 11, 2008.
  7. Emery, Julie (7 May 1986). "Light jail term for young hacker". The Seattle Times.
  8. pg 26—Richard Gissel (2005). Digital Underworld (August 23, 2005 ed.). Lulu. p. 222. ISBN 1-4116-4423-9.
  9. Robert Vamosi (January 27, 2006). "Cybercrime does pay; here's how". CNET Reviews. Retrieved September 11, 2008.
  10. Zetter, Kim (March 25, 2010). "TJX Hacker Gets 20 Years in Prison". Wired. Retrieved January 22, 2012.
  11. Poulsen, Kevin (February 12, 2010). "Record 13-Year Sentence for Hacker Max Vision". Wired. Retrieved January 22, 2012.
  12. "Hacker Sentenced to Prison for Breaking into Lowe's Companies' Computers with Intent to Steal Credit Card Information". cybercrime.gov. December 15, 2004. Archived from the original on November 30, 2011. Retrieved January 22, 2012.
  13. "Crazy-Long Hacker Sentence Upheld". Wired. July 11, 2006. Retrieved January 22, 2012.
  14. "Kevin Mitnick Sentenced to Nearly Four Years in Prison". cybercrime.gov. August 9, 1999. Archived from the original on December 19, 2011. Retrieved January 22, 2012.
  15. Julie, Emery (7 May 1986). "Light jail term for young hacker". The Seattle Times.
  16. Hopkins, Jack (7 May 1986). "Computer intruder gets 2 weeks in jail". The Seattle Post Intelligencer.
  17. "Phiber Optik Goes to Prison—Issue 2.04". Wired. April 1994. Retrieved August 23, 2008.
  18. Elinor Mills (June 23, 2009). "Q&A: Mark Abene, from 'Phiber Optik' to security guru". CNET Networks. Archived from the original on August 5, 2009. Retrieved June 28, 2009.
  19. "American owns up to hijacking PCs". BBC News. January 24, 2006. Retrieved June 22, 2009.
  20. Debra Wong Chang - United States Attorney (May 8, 2006). ""Botherder" Dealt Record Prison Sentence for Selling and Spreading Malicious Computer Code". United States Department of Justice. Archived from the original on May 31, 2009. Retrieved June 22, 2009.
  21. Dreyfus, Suelette (1997). Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier (PDF). pp. 48–49. Archived from the original (PDF) on 2011-05-21. Retrieved 2011-09-13.
  22. Dreyfus, Suelette (1997). Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier (PDF). pp. 48–49. Archived from the original (PDF) on 2012-08-21.
  23. Zetter, Kim (November 20, 2012). "Hacker Found Guilty of Breaching AT&T Site to Obtain iPad Customer Data". Threat Level. Wired. Retrieved February 15, 2018.
  24. Zetter, Kim (January 23, 2013). "iPad Hack Statement Of Responsibility". Wired. Retrieved February 15, 2018.
  25. Kevin Poulsen (2009). "Michigan Wi-Fi hacker jailed for nine years". The Register. Retrieved June 22, 2009.
  26. "Judgement in a Criminal Case, 5:03CR53-02, Western District of North Carolina" (PDF). timmins. December 16, 2004. Retrieved August 23, 2008.
  27. Tony Long (February 7, 2007). "February 7, 2000: Mafiaboy's Moment". Wired. Retrieved May 23, 2009.
  28. "Mafiaboy given eight months". The Register. September 13, 2001. Retrieved May 23, 2009.
  29. "FBI Facts and Figure 2003". Federal Bureau of Investigation. April 2003. Archived from the original on March 26, 2007. Retrieved March 27, 2007.
  30. Scoblionkov, Deborah (5 April 2001). "Who's Laughing Now?". mycitypaper.com. Philadelphia City Paper.
  31. Rizza, Joe. "Who Was Educating Your Children?". Antonnews.com. Archived from the original on 2013-08-08. Retrieved 2013-05-02.
  32. "Hack to the future". The Age. Melbourne. May 25, 2003. Retrieved August 23, 2008.
  33. John Leyden (July 6, 2001). "'Bill Gates' hacker escapes jail". The Register. Retrieved September 11, 2008.
  34. "Teen hacker escapes jail sentence". BBC News. July 6, 2001. Retrieved September 11, 2008.
  35. Michael Newton (2004). The Encyclopedia of High-Tech Crime and Crime-Fighting (November 2003 ed.). Checkmark Books, an imprint of Facts on File Inc. p. 416. ISBN 0-8160-4978-5.
  36. "MySpace speaks about Samy Kamkar's sentencing". TechSpot. January 31, 2007. Retrieved December 27, 2010.
  37. Brian Krebs (February 27, 2007). "They'll Always Have Paris". The Washington Post. Retrieved May 9, 2009.
  38. George V. Hulme (July 15, 2004). "Hacker Lamo Sentenced To Home Detention". Information Week. United Business Media, Inc. Archived from the original on January 22, 2009. Retrieved August 23, 2008.
  39. Man jailed for attempting to compromise websites, Kent Police, United Kingdom, 16 May 2013. Archived September 25, 2013, at the Wayback Machine
  40. "Kevin Mitnick sentenced to nearly four years in prison". United States Department of Justice. August 9, 1999. Archived from the original on September 26, 2009. Retrieved August 23, 2008.
  41. "Hacker sentenced, must program jail computers". USA Today. Associated Press. February 6, 2002. Retrieved August 23, 2008.
  42. Ronald B. Standler (August 14, 2002). "Judgment in U.S. v. Robert Tappan Morris". rbs2. Retrieved August 23, 2008.
  43. "Teen Pleds Guilty in Blaster Worm Attack". CRN Magazine. August 12, 2004. Archived from the original on 2011-06-06. Retrieved May 11, 2009.
  44. Henry Weinstein (March 23, 1991). "Hacker Enters Guilty Plea in Theft of Computer Data". Los Angeles Times. Business; PART-D; Financial Desk. p. 2. Archived from the original on October 20, 2012. Retrieved May 9, 2009.
  45. Rodney Hoffman (March 27, 1991). "Legion of Doom's "Terminus" sentenced". RISKS Digest. Retrieved May 9, 2009.
  46. Rodney Hoffman (March 31, 1991). "Correction Re: Terminus". RISKS Digest. Retrieved May 9, 2009. Under the plea agreements, ... Rose ... will serve a year in prison.
  47. Perlroth, Nicole (21 April 2017). "Russian Hacker Sentenced to 27 Years in Credit Card Case". Retrieved 21 May 2017 via NYTimes.com.
  48. Козловский, Владимир. В деле о хакерах таблоиды США нашли вторую Чэпман (in Russian). BBC Russian Service. Retrieved 2010-11-02.
  49. Kevin Poulsen (June 15, 2001). "Solar Sunrise hacker 'Analyzer' escapes jail". The Register. Retrieved September 11, 2008.
  50. Holt, Thomas J.; Schell, Bernadette H. (2011). Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications. Hershey, PA: Business Science Reference. p. 146. ISBN 9781616928056.
  51. "Female virus-writer, Gigabyte, arrested in Belgium, Sophos comments". Sophos. 16 February 2004. Retrieved 9 August 2017.
  52. Robert Blincoe (September 27, 2001). "Kournikova virus kiddie gets 150 hours community service". The Register. Retrieved May 10, 2009.
  53. John Leyden (September 14, 2001). "Anna Kournikova virus author stands trial". The Register. Retrieved June 22, 2009.
  54. Joris Evers (September 28, 2001). "Kournikova Virus Writer Found Guilty". PC World. Archived from the original on January 31, 2013. Retrieved May 23, 2009.
  55. "Computer User Sentenced". The New York Times. May 1, 1983. Retrieved September 11, 2008.
  56. "Jury Convicts Texas Man of Computer Fraud, Aggravated Identity Theft". www.justice.gov. 2019-11-12. Retrieved 2022-04-30.

Share this article:

This article uses material from the Wikipedia article List_of_computer_criminals, and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.