5 Most Dangerous Hackers On Earth Ever

In today’s advanced digital age, nobody knows how to store data on a piece of paper. Every aspect of our lives, important or not so important, is saved on a computer. This computer, in turn, is connected with every other computer on the planet through a complex web of networks. Security of our data on the computer is always been a raging debate with many a people trying to steal data by hacking into systems.


Hackers have existed for as long as computers themselves, whose core fundamental is to find a loophole in the computer system and exploit it to their benefit. The ultimate loser is us, the user, where our hard-earned money, passwords or personal data is extremely vulnerable. Not all hackers are bad though, some are good and try to protect us where as some are not so kind.

Most Dangerous Hackers

This list, lists down the top 10 hackers of all time who have caused the maximum amount of damage to our personal data and have raised big question marks with regards to internet and computer security.
1. Jonathan James

jonathan James has been credited with being the first juvenile to be incarcerated for cybercime in the United States. He was aged 16, when charged with hacking into the computer systems of the Defense Threat Reduction Agency, a division of the Department of Defense. He installed a backdoor into the DTRA server that allowed him access to all forms of communication in and out of the computer system and numerous usernames and passwords. He also hacked in the NASA systems and stole softwares that controlled essential life sustaining equipment on-board space ships.
James was later traced and arrested but since he was a minor, faced six months of house arrest, probation till he turned 18, made to apologise to all the departments that he hacked into and was banned from using a computer for recreational use.
In 2007, when the departmental store, TJX reported a hack into their computer system and a compromise of  sensitive customer information, the Secret Service include Jonthan’s name in the list of those believed to be a part of the act. Although no evidence was found against Jonathan, he was still not dropped from the list of suspects which led him to ultimately kill himself in 2008. His suicide is believed to be caused due to tall the mental pressure he was being made to undertake for a crime he believed he was never involved in.
2. Kevin ‘Dark Dante’ Poulsen


Kevin Poulsen has two attributes that make him stand out from the rest of the hackers. He was the first American who was made to serve an internet and computer ban after being released from prison and was had gained a specialty in hacking only through telephone lines. He first gained attention when he hacked into an L.A. radio network so that he could be the 102nd caller and would win a new Porsche. He had also reactivated all old Yellow Page escort service phone numbers so that his friend could operate a virtual escort service. When his name once came up in a TV show called Unsolved Mysteries, the 1-800 numbers of the TV station mysteriously crashed.
After being released from Prison, Kevin decided to put away his past and instead became a journalist. He is currently the senior editor for Wired News and his most notable article is where he managed to obtain a list of sex offenders from MySpace. His article led to one arrest.
3. Nashon Even-Chaim

Also known as Phoenix, Nashon Even-Chaim is known to be one of the most skilled and arrogant hackers within a group of hackers called ‘The Realm’ which was based out of Melbourne, Australia. Nashon’s investigation was centered around undercover police investigation and informants due to an undeveloped cybercrime wing within Australia in the 1980’s. His arrest was the first in the world where remote data intercept was used in order to gain evidence for a computer crime prosecution.
Nashon’s prime targets during his active years was the Commonwealth Scientific and Industrial Research Organisation, University of California, Berkley, NASA, Execucom, Lawrence Livermore National Laboratory, University of Wisconsin-Madison and Purdue University. After release, Nashon is now chasing a career of music and declines to interact with the press and media.
4. Adrian Lamo

Adrian Lamo
Many hackers do what they do to earn money and fame and are hence known as ‘Black Hat’ hackers where as those who do it to improve internet security and to prevent the Black Hats from entering are called ‘White Hat’ hackers. Adrian Lamo, on the other hand, has been known as a ‘Grey Hat’ hacker since he has done work for either side.
He first gained attention when he managed to hack into the systems of many high-profile companies such as Yahoo, Microsoft, The New York Times and many others. When Lamo was arrested for breaking into their systems unauthorized, he claimed that he has done these companies a favor by highlighting the loopholes in their system and has actually saved them a lot of money. Lamo serving a 6-month detention term and was made to paid $65,000 in fine for his acts.
In 2009, Lamo once again came in the news for his alleged role in Wikileaks and his role in helping donate sensitive material to the website. Lamo later uncovered the role of a U.S. Soldier PFC Bradley Manning who has been misusing his role to collect classified data and selling it to Wikileaks. Adrian has claimed he has done so because many lives were in danger since Manning was active on-duty when he did this. Lamo has ever since been keeping a low profile and fears for his life after the Manning episode.
5. Kevin Mitnick

We often watch movies showing hackers doing insane things on their computers, law enforcement agencies chasing them down and the news media covering every bit of it. Kevin Mitnick’s story is quite similar to any Hollywood Hacking Movie. At the time of his arrest, he was the most wanted person in relation to computer crimes.
His first brush with hacking came about when he learnt the concept of social engineering and learnt of a system to bypass the punch card system on the L.A. bus. At the age of 16, he hacked into various computer systems and copying softwars, an allegation for which he was charged 9 years later in 1988. Having made to serve twelve months in prison and three years of supervised release, Mitnick continued to hack into various systems for which fresh charges were framed against him. Mitnick fled and was on the run for more than two and a half years using cloned cell phones to hide his location. Mitnick was finally arrested in 1995 and sent to prison for 4 years in 1999.
Mitnick’s conviction gained a lot of media coverage and controversies. His prison term was in solitary confinement after the judge was convinced that Mitnick can start a nuclear war simply by whistling into a telephone system to activate NORAD’s codes. His conviction has also been blamed by over-exaggeration by the media on his capabilities and misinformation of what computers are capable of doing.
After release, Mitnick now runs an IT security company called Mitnick Security Consulting LLC that helps companies prevent hackers from infiltrating their system. He is also an advisory member and on the board for many IT and security companies.

Comments

Popular posts from this blog

सभी सुपर स्टारों ने क्या कहा श्रीदेवी की मौत पे।

हमारे शारीर में इनका क्या काम होता है।

क्या होगा अगर 1 रूपए 1$ डॉलर के बराबर हो जाये तो हिंदी में