Music, IT & Human Rights since 2005

Computers, NJN

Five famous hackers !

Robert Morris, hacker # 1

Robert Morris, hacker # 1

Robert Morris, hacker # 1

Famous computer bad boys, many now rich

By ABC News

Robert T. Morris

In 1988, Robert T. Morris, a graduate student at Cornell, unleashed the first widely known computer “worm” — a virus that spread over the Internet. Morris said the whole thing was a benign experiment that got out of control, but prosecutors said he had caused hundreds — if not tens of thousands — of dollars in lost productivity for each computer affected. He was sentenced to three years’ probation, community service, and a fine of $10,000 plus legal costs.But like many of his ne’er-do-well brethren, he was a bright guy. In 1995 he co-founded a startup company that made software for online stores. In 1998 the firm was bought out, for about $45 million, by another online startup called Yahoo.

Morris is now a professor in the Computer Science and Artificial Intelligence Laboratory at M.I.T.

Kevin Poulson

Kevin Poulson, hacker # 2

Kevin Poulson, hacker # 2

Kevin Poulsen had good taste in cars. In 1990 a Los Angeles radio station (102.7 on the FM dial) promised a free Porsche to the 102nd caller of the day. He’d already hacked into their phone lines, and mysteriously became caller number 102.

The government was already after him. Having first been caught in his teens — and rewarded, after punishment, with a computer-security job at a high-tech lab — he broke into computers run by the FBI and the Defense Department.

After 17 months on the run, he was arrested in 1991 and held without bail. The sentence he finally served — 51 months — was the longest for computer crimes at the time.

He does not run a computer security firm. Instead, he writes about it. His blog at Wired News is called “Threat Level.”

Shawn Fanning

Shawn Fanning, Mr. Napster - do we love him!

Shawn Fanning, Mr. Napster - do we love him!

Shawn Fanning, by most people’s definition, is hardly a hacker, but he did more to change the way computers are used than most hackers, for good or evil, can ever hope.

Does his name ring a bell? Perhaps you’ll remember his nickname: Napster. Friends at college called him that because of his short, kinky hair; he went on to use it as the name of a Web site for sharing his favorite music with friends.

Napster soon had a lot of friends — a lot — and music has never been the same since. People found that music, saved digitally in the MP3 format, sounded just about as good as the music recorded on Compact Discs — and even better if the CD cost $15 while the MP3 download was free.

Kevin Mitnick

Kevin Mitnick, my personal favourite - such a maverick

Kevin Mitnick, my personal favourite - such a maverick

It takes some diligence to get the Justice Department to call you “the most wanted computer criminal in United States history.” Kevin Mitnick was diligent.

He was first arrested when he was 17, and spent time in and out of jail. He broke into computer systems at Novell, Motorola, Sun, Fujitsu and other firms, stealing their software and crashing their machines. He was caught, for the last time, in 1995.

He did time — four years of it — before he was convicted and sentenced to 46 months in prison with credit for time already served.

When he was released, and finished a period when he was under orders to stay away from computers, he wrote two books — with hacker-ish titles like “The Art of Intrusion.” (If you ever saw a movie called “Takedown,” it’s about Mitnick.) He now runs a computer security firm.

Fred Cohen

In 1983, Fred Cohen, then a Ph.D. student at the University of Southern California, wrote a short program, as an experiment, that could “infect” computers, make copies of itself, and spread from one machine to another. It was benign. It was hidden inside a larger, legitimate program, which was loaded into a computer on a floppy disk — something few computers sold today can accommodate anymore.

Other computer scientists had warned that computer viruses were possible, but Cohen’s was the first to be documented. A professor of his suggested the name “virus.” Cohen now runs a computer security firm.

“You could write defenses ’til the cows come home,” he told ABC News back in 1988, “and it’s guaranteed that eventually that some virus will be able to get past those defenses.”

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.