Monday, November 14, 2011

A history of hacking

A history of hacking

Hacking has been about for added than a century. In the 1870s, several teenagers were flung off the country's cast new buzz arrangement by affronted authorities. Here's a blink at how active hackers accept been in the accomplished 35 years. 

Early 1960s
University accessories with huge mainframe computers, like MIT's bogus intelligence lab, become staging breadth for hackers. At first, "hacker" was a absolute appellation for a getting with a ability of computers who could advance programs above what they were advised to do. 


Early 1970s
John Draper makes a long-distance alarm for chargeless by alarming a absolute accent into a blast that tells the buzz arrangement to accessible a line. Draper apparent the blare as a give-away in a box of children's cereal. Draper, who afterwards earns the handle "Captain Crunch," is arrested afresh for buzz analytical throughout the 1970s. 

Yippie amusing movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) annual to advice buzz hackers (called "phreaks") accomplish chargeless long-distance calls.
Two associates of California's Homebrew Computer Club activate authoritative "blue boxes," accessories acclimated to drudge into the buzz system. The members, who accept handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), afterwards go on to begin Apple Computer. 

Early 1980s
Author William Gibson bill the appellation "cyberspace" in a science fiction atypical alleged Neuromancer. 

In one of the aboriginal arrests of hackers, the FBI busts the Milwaukee-based 414s (named afterwards the bounded breadth code) afterwards associates are accused of 60 computer break-ins alignment from Memorial Sloan-Kettering Cancer Center to Los Alamos Civic Laboratory. 

The Hacker Quarterly awning Comprehensive Abomination Control Act gives Secret Account administration over acclaim agenda and computer fraud.
Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany. 

2600: The Hacker Quarterly is founded to allotment tips on buzz and computer hacking. 

Late 1980s
The Computer Artifice and Abuse Act gives added ascendancy to federal authorities.
Computer Emergency Response Aggregation is formed by U.S. aegis agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing aggregate of attacks on computer networks. 

At 25, adept hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment aegis officials. He is bedevilled of damaging computers and burglary software and is bedevilled to one year in prison. 

First Civic Bank of Chicago is the victim of a $70-million computer heist.
An Indiana hacker accepted as "Fry Guy" -- so alleged for hacking McDonald's -- is raided by law enforcement. A agnate ambit occurs in Atlanta for Legion of Doom hackers accepted by the handles "Prophet," "Leftist" and "Urvile." 

Early 1990s
After AT&T long-distance account crashes on Martin Luther King Jr. Day, law administration starts a civic crackdown on hackers. The admiral nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception leash "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is best up in Austin, Texas. 

Operation Sundevil, a appropriate aggregation of Secret Account agents and associates of Arizona's organized abomination unit, conducts raids in 12 above cities, including Miami.
A 17-month seek ends in the abduction of hacker Kevin Lee Poulsen ("Dark Dante"), who is accusable for burglary aggressive documents. 

Hackers breach into Griffith Air Force Base, afresh pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British jailbait who curls up in the fetal position if seized.
A Texas A&M assistant receives afterlife threats afterwards a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail letters application his Internet address. 

Kevin Mitnick
In a awful publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., afterwards he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center. 

Late 1990s
Hackers breach into and blemish federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.
Report by the General Accounting Office finds Aegis Department computers abiding 250,000 attacks by hackers in 1995 alone. 

A Canadian hacker accumulation alleged the Brotherhood, affronted at hackers getting falsely accused of electronically stalking a Canadian family, breach into the Canadian Broadcasting Corp. Web website and leave message: "The media are liars." Family's own 15-year-old son eventually is articular as stalking culprit.
Hackers bore aegis in Microsoft's NT operating arrangement to allegorize its weaknesses.
Popular Internet seek engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is appear from prison. "There is no virus," Yahoo! backer Diane Hunt said. 

1998
Anti-hacker ad runs during Super Bowl XXXII. The Arrangement Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen annoying that a computer adjustment to barrage missiles may accept appear from a hacker. They adjudge to draft up the apple anyway.
In January, the federal Bureau of Labor Statistics is inundated for canicule with hundreds of bags of affected advice requests, a hacker advance alleged "spamming."
Hackers breach into United Nation's Children Fund Web site, aggressive a "holocaust" if Kevin Mitnick is not freed. 

Hackers affirmation to accept torn into a Pentagon arrangement and baseborn software for a aggressive digital system. They abuse to advertise the software to terrorists.
The U.S. Justice Department unveils Civic Infrastructure Protection Center, which is accustomed a mission to assure the nation's telecommunications, technology and busline systems from hackers.
Hacker accumulation L0pht, in affidavit afore Congress, warns it could shut down civic admission to the Internet in beneath than 30 minutes. The accumulation urges stronger aegis measures. A history of hacking.

No comments:

Post a Comment