List of computer criminals
   HOME

TheInfoList



OR:

Convicted computer criminals are people who are caught and
convicted In law, a conviction is the verdict reached by a court of law finding a defendant guilty of a crime. The opposite of a conviction is an acquittal (that is, "not guilty"). In Scotland, there can also be a verdict of " not proven", which is co ...
of
computer crime A cybercrime is a crime that involves a computer or a computer network.Moore, R. (2005) "Cyber crime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. The computer may have been used in committing the ...
s such as breaking into
computers A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations (computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These prog ...
or
computer networks A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections are m ...
. Computer crime can be broadly defined as criminal activity involving information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (or
identity theft Identity theft occurs when someone uses another person's personal identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes. The term ''identity theft'' was c ...
) and electronic fraud. In the infancy of the
hacker A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term ''hacker'' has become associated in popu ...
subculture and the
computer A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations ( computation) automatically. Modern digital electronic computers can perform generic sets of operations known as programs. These prog ...
underground, criminal convictions were rare because there was an informal code of ethics that was followed by white hat hackers. Proponents of hacking claim to be motivated by artistic and political ends, but are often unconcerned about the use of criminal means to achieve them. White hat hackers break past computer security for non-malicious reasons and do no damage, akin to breaking into a house and looking around. They enjoy learning and working with computer systems, and by this experience gain a deeper understanding of electronic security. As the computer industry matured, individuals with malicious intentions ( black hats) would emerge to exploit computer systems for their own personal profit. Convictions of computer crimes, or hacking, began as early as 1984 with the case of The 414s from the 414 area code in
Milwaukee Milwaukee ( ), officially the City of Milwaukee, is both the most populous and most densely populated city in the U.S. state of Wisconsin and the county seat of Milwaukee County. With a population of 577,222 at the 2020 census, Milwaukee i ...
. In that case, six teenagers broke into a number of high-profile computer systems, including
Los Alamos National Laboratory Los Alamos National Laboratory (often shortened as Los Alamos and LANL) is one of the sixteen research and development laboratories of the United States Department of Energy (DOE), located a short distance northwest of Santa Fe, New Mexico, ...
, Sloan-Kettering Cancer Center and Security Pacific Bank. On May 1, 1984, one of the 414s, Gerald Wondra, was sentenced to two years of probation. In May, 1986, the first computer trespass conviction to result in a jail sentence was handed down to Michael Princeton Wilkerson, who received two weeks in jail for his infiltration of
Microsoft Microsoft Corporation is an American multinational technology corporation producing computer software, consumer electronics, personal computers, and related services headquartered at the Microsoft Redmond campus located in Redmond, Washi ...
, Sundstrand Corp., Kenworth Truck Co. and Resources Conservation Co. In 2006, a prison term of nearly five years was handed down to Jeanson James Ancheta, who created hundreds of zombie computers to do his bidding via giant bot networks or
botnet A botnet is a group of Internet-connected devices, each of which runs one or more bots. Botnets can be used to perform Distributed Denial-of-Service (DDoS) attacks, steal data, send spam, and allow the attacker to access the device and its conn ...
s.pg 26— He then sold the botnets to the highest bidder who in turn used them for Denial-of-service (DoS) attacks. , the longest sentence for computer crimes is that of Albert Gonzalez for 20 years. The next longest sentences are those of 13 years for Max Butler, 108 months for Brian Salcedo in 2004 and upheld in 2006 by the U.S. 4th Circuit Court of Appeals, and 68 months for
Kevin Mitnick Kevin David Mitnick (born August 6, 1963) is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crim ...
in 1999.


Computer criminals


See also

* Timeline of computer security hacker history


References


External links

* * {{DEFAULTSORT:Computer Criminals, List Of * Convicted computer criminals Hacking (computer security) Lists of criminals