Best Hackers IN THE World: BY Alan S Varghese
Best Hackers IN THE World: BY Alan S Varghese
Best Hackers IN THE World: BY Alan S Varghese
HACKERS
IN THE
WORLD
BY
ALAN S VARGHESE
Kevin Mitnick, who was formerly bestowed with the title of the "MosWanted Computer
Criminal in US History," engaged in unauthorized access to several computer systems, including
those belonging to prominent corporations.
Kevin Mitnick gained unauthorized access to a computer network in 1979, at 16, when a friend gave
Mitnic
him the telephone number for the Ark, the computer system that Digital Equipment Corporation
(DEC) used for developing its RSTS/E operating system software. He broke into DEC's
computer network and copied the company's software, a crime for which he was charged and
k
convicted in 1988.
Once he figured out a way to take over the drive-up windows at a local McDonald's. Sitting in
his car from across the street, Mitnick pretended to be a McDonald's employee, taking
customers' orders.
On February 15, 1995 he was arrested by the FBI on federal offenses related to a two-and-a-
half-year period of computer hacking that included computer and wire fraud. He was found with
cloned cell phones, more than 100 cloned cellular phone codes, and multiple pieces of false
identification.
Mitnick authored several best-selling books providing valuable insights into the world of
hacking and advice on cyber threat protection.
Gary McKinnon is a Scottish systems administrator and hacker who was accused by a US
prosecutor in 2002 of perpetrating the "biggest military computer hack of all time.
Gary
In 2001, McKinnon gained access to American military systems in a quest to find information
Mckinn on UFOs from his apartment in London. He was arrested a year later and, with the support of his
mother Janis Sharp, fought a decade-long battle against extradition. They succeeded in 2012 on
the basis that McKinnon, who has Asperger’s syndrome, could be a risk to his own life.
on He was able to hack into NASA and the Pentagon after realizing they used the Windows
operating system. He left messages for U.S. authorities, including one that said: “Your security
system is crap.”
Now 57, McKinnon lives in Leicester and runs a small search engine optimization company,
according to The Guardian. The People v Gary McKinnon is based on Sharp’s book Saving
Gary McKinnon: A Mother’s Story.
He called himself the Dark Dante, others call him a black hat hacker, to some a criminal and so
on. Kevin gained most popularity for manipulating the phone lines of the Los Angeles radio
kevin station 102.5 KIIS-FM in the early 1990’s to win a Porsche for him and his friend. He was also
distinguished for being the first hacker to ever be charged with espionage due to his discovery
Pouls
of federal phone taps of several consulates in the Los Angeles area including those of China,
Israel, and South Africa. He received even more unwanted attention when Unsolved Mysteries
aired a piece about him and had their phone tip center disconnected on the day of its airing.
en
Known by the moniker “Dark Dante,” Poulsen engaged in the manipulation of telephone lines
as a means to secure victories in radio contests. Following his apprehension, he underwent a
transformation in his abilities and subsequently pursued a career in journalism, currently
holding the position of editor at The Daily Beast.
Jonathan Joseph James was an American hacker who was the first juvenile incarcerated for
Jonath cybercrime in the United States. The South Florida native was 15 years old at the time of the
first offense and 16 years old on the date of his sentencing.
an At the age of 15, James achieved recognition by successfully infiltrating the computer networks
James
of esteemed institutions such as NASA and the Department of Defense. He attained the
distinction of becoming the inaugural minor to be incarcerated for engaging in cybercrime
within the United States.
Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into
various systems, including those of BellSouth and the Miami-Dade school system. What
brought him to the attention of federal authorities, however, was his intrusion into the computers
of the Defense Threat Reduction Agency (DTRA), a division of the United States Department of
Defense, the primary function of which is to analyze potential threats to the United States of
America, both at home and abroad.
Robert Tappan Morris, the name synonymous with both infamy and innovation, stands as a
testament to resilience, innovation, and the beauty of second chances. His life, marked with
Rober significant highs and lows, presents a plethora of lessons for those treading the unpredictable
path of entrepreneurship.
t Born in 1965, Morris was the offspring of intellectual giants; with a father who co-authored the
UNIX operating system, the bar was set high. Yet, as many prodigies do, he showed an innate
Tappe ability to surpass expectations. By his 20s, he was a graduate student at Cornell University,
immersed in the world of computer science.
n He later joined the faculty in the department of Electrical Engineering and Computer Science at
Morris
the Massachusetts Institute of Technology (MIT), where he received tenure in 2006. He was
elected to the National Academy of Engineering in 2019.
THANK YOU