Hackers Who are they? What do they do? A hacker is a person who accesses someone else’s computer without authorization. 2 The Beginning of a Hacking Era 1960- The MIT (Massachusetts Institute Technology) was the first institution to offer a course in computer programming and computer science. This was also the place where hacking first started. The MIT students called themselves hackers because they were able to take programs and make them perform actions that it was not programmed to do it was a practical joke to “hack away” all day on the key board 3 Phone Phreaking Phone Phreaking- a term referred to exploration of the phone network without authorization. The first hack was accomplished by John Draper (also known as the whistler and the grandfather of Phreaking) his technique was that he could perfectly whistle into the phone and make a free call. 4 Young Hackers 2010 -Hacker’s can be of any age the youngest hacker was a 9- year old boy . “The boy used a teacher's login to access Blackboard, and then modified class enrollment lists, changed the password login details of teachers, and modified homework assignments” April 21, 2010 Virginia 1991- Mark Abene, 19, was the first hacker to serve time in a Federal prison. He crashed the AT&T phone system leaving 60,000 without a phone line for 9 hours. 1983- FBI busted six teen-age hackers known as the 414’s. They were accused of 60 computer break-ins including the Memorial Sloan- Kettering cancer center and Los Alamos national Laboratory. 5 War Games “War games: is a movie that introduced hacking to the public and the legend hackers as “Cyber heroes”. In the movie, the main character, Matthew Broderick, attempts to hack into a videogame but instead he hacks into the military’s nuclear combat stimulator computer. 6 Hacker Attitudes White hat-A white hat hacker breaks security for non-malicious reasons, for instance testing their own security system Black Hat-Sometimes called "cracker", is someone who breaks computer security without authorization or uses technology (usually a computer, phone system or network) for vandalism, credit card fraud, identity theft, piracy, or other types of illegal activity. Grey Hat- A gray hat hacker is a combination of a Black Hat Hacker and a White Hat Hacker. A Grey Hat Hacker will surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked. Then they will offer to repair their system for a small fee 7 Hacker Attitudes Continued Blue Hat-A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Elite -Elite is a term used to describe the most advanced hackers who are said to be on “The cutting edge" of computing and network technology. Script Kiddie-A script kiddie is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others. Neophyte-A neophyte or “Newbie" is a term used to describe someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking Hacktivist -a hacker who utilizes technology to announce a social, ideological, religious, or political message.. 8 Famous Hackers Kevin Mitnick- “The most famous hacker, he made a name for himself in 1981 at the age of 17 by getting into a phone exchange, which allowed him to redirect subscriber calls in any way he wanted.” 1983- he achieved his first major coup - and also his first arrest , when he accessed a Pentagon computer. He was sentenced to five years in prison in the 1990s Today he is a Security consultant and owns his own company: Mitnick Security. 9 Kevin Poulsen He is the current editor in chief of Wired. In 1983 he made his first unlawful entry into different networks. He was arrested in April 1991 and in 1994 he was sentenced to 4 years in prison. 10 Famous Hackers Black hat hackers White hat hackers Jonathan James Stephen Wozniak: Adrian Lamo Tim Berners-Lee Kevin Mitnick Linus Torvalds Kevin Poulsen Richard Stallman Robert Tappan Morris Tsutomu Shimomura 11 Sources http://www.focus.com/fyi/itsecurity/history-hacking/ http://www.tomshardware.com /reviews/fifteen-greatesthacking-exploits,1790-2.html http://www.francesfarmersreve nge.com/stuff/misc/hack/index .htm http://www.itsecurity.com/fe atures/top-10-famoushackers-042407/ 12