|
7 August 2006. A sends:
White-Black-Grey Hat Hackers
http://www.wbglinks.net/pages/wbghat/
4 August 2006
|
|
Captions by Associated Press | |
Gary McKinnon, 40, accused of mounting the largest ever hack of United States government computer networks -- including Army, Air Force, Navy and NASA systems -- listens to a reporter's question outside the Bow Magistrates Court in central London Wednesday May 10, 2006. The court has recommended that McKinnon be extradited to the United States to face charges of illegally accessing 97 computers, causing US$700,000 (400,000 pounds; euro 588,000) in damage. British Home Secretary John Reid will make the final decision on extradition but if he approves it, McKinnon will appeal to the High Court, the alleged hacker said. (AP Photo/Lefteris Pitarakis) |
The "Zimmerman Telegram," a coded 1917 message from then German Foreign Minister Arthur Zimmerman to a Mexican official offering to help Mexico regain New Mexico, Texas and Arizona from the United States, is part of the National Archives exhibit "Top Secret." The British intercepted the note, deciphered it and gave it to President Woodrow Wilson. Congress declared war on Germany a month later. (AP Photo/National Archives) |
John Watson, a sophomore from Lake View, Iowa, gets some shut eye, Saturday, Nov. 19, 2005, in the final hours of Iowa State University's Cyber Defense Competition. The event, held at the ISU Research Park in Ames, Iowa, saw teams of four students each try to ward off viruses and attacks from hackers during the 18 hour cyber simulation. The defending teams were hoping to learn at least one lesson - that hackers never sleep. (AP Photo/The Ames Tribune, Andrew Rullestad) |
This photo provided by the U.S Secret Services shows the work area for the Department of Homeland Securty's "Cyber Storm" wargames worldwide simulation challenge in Washington, Thursday, Feb. 9, 2006. The government Friday, Feb. 10, 2006 concluded the wargame challenge, its biggest-ever exercise to test how it would respond to devastating attacks over the Internet from anti-globalization activists, underground hackers and bloggers. (AP Photo/U.S. Secret Service) |
Dan Clements, CEO of Cardcops.com, poses for a photo in Sherman Oaks section of Los Angeles, Thursday, Sept. 1, 2005. CardCops monitors Internet chat rooms and other hacker communications for stolen credit card numbers, then notifies merchants and consumers to block bad purchases. (AP Photo/Jae C. Hong) |
Computer hackers stare at lap tops as they take part in a computer hacking competition Friday Aug 19, 2005 in Singapore. Hackers from Singapore, Malaysia and Brunei gathered to compete for bragging rights in a day-long contest to find the best code-breaker in the tech-savvy city-state . Armed with modems, laptops, spare disk drives and the occasional hunger-relieving sandwich, 24 computer experts began toying with a wireless "Air Raid" on a simulated network at an annual event backed by the government's Infocomm Development Authority. Asia has been the root of some of the worst attacks by hackers in recent years. (AP Photo/Wong Maye-E) |
A security analyst who goes by the name "Zamboni" speaks about attacking Biometric Systems at the Defcon Convention Friday, July, 29, 2005 in Las Vegas. Defcon is where Internet security experts, law enforcement officials and hackers are supposed to share ideas. But it is really a showcase for those savviest at penetrating electronic defenses to flex their hacker muscle.(AP Photo/Joe Cavaretta) |
Unidentified Swiss participants of 'What The Hack' use their laptops in a camouflaged tent on a campground in Liempde, the Netherlands, Thursday, July 28, 2005. About 3,000 hackers, privacy advocates and other cyber-activists gathered for the three-day 'What The Hack,' a self-styled computer-security conference dealing with such issues as digital passports, biometrics and cryptography. (AP Photo/Fred Ernst) |
In this undated photo released by the Haaretz daily newspaper Sunday May 29, 2005, Michael Haephrati, 41, left, is seen in with his wife, Ruth Brier-Haephrati, 28, right. The two have been arrested in Britain last week and are both wanted in Israel on suspicion of computer hacking offenses involving the use of a so-called Trojan horse software program, which sits in the victim's computer and gives the hacker full access to the machine over the Internet. (AP Photo/Haaretz Daily) |
Pierre Kroma waehrend einem erfolgreichen Hacker-Angriff beim Live-Hacking auf der der CeBIT in Hannover am Eroeffnungstag am Donnerstag, 10. Maerz 2005. Rund 6.000 Aussteller werden bis zum 16. Maerz 2005 ihre neuesten Produkte praesentieren. (AP Photo/ Jan Bauer) --- IT security consultant Pierre Kroma looks on as he hacked succesful a web server during a live hacking show during the opening day at the world's largest computer fair CeBIT in Hanover on Thursday March 10, 2005. Some 6,200 exhibitors from 70 nations present their latest news and products at the world's largest computer and information technology fair CeBIT which runs from March 10 until March 26, 2005. (AP Photo/ Jan Bauer) |
Sarah Palin is shown in Anchorage, Alaska, Aug. 8, 2002. Palin never thought of herself as an investigator. Yet there she was, hacking uncomfortably into Randy Ruedrich's computer, looking for evidence that the state Republican Party boss had broken the state ethics law while a member of the Alaska Oil & Gas Conservation Commission. (AP Photo/Al Grillo) |
A Romanian law enforcement agent uses a laptop computer at the Romanian police headquarters in Bucharest Thursday October 9 2003. Documents obtained by The Associated Press portray a loosely organized but increasingly aggressive network of young Romanians conspiring with accomplices in Europe and the United States to steal millions of dollars each year from consumers and companies.Their specialties: defrauding consumers through bogus Internet purchases, extorting cash from companies after hacking into their systems, and designing and releasing computer-crippling worms and viruses. (AP Photo/Avram Iancu) |
Robert Lipka, shown at a York, Pa, off track betting parlor in this March 21, 1995 file photo, was arrested by the FBI Friday, Feb. 23, 1996 on charges of spying for the former Soviet Union in the 1960s in return for cash. Lipka, who worked for the super secret National Security Agency from1964 to 1967, was arrested by agents at his home in Millersville, Pa. (AP Photo/Marty Heisey-Lancaster New Era) |
PROFILING HACKERS -- Shambhu Upadhyaya, chief researcher, who directs the Center of Excellence in Information Systems Assurance Research and Education at the State University of New York at Buffalo, over looks one of the computer labs in Buffalo, N.Y., Thursday, Jan. 9, 2003. The Buffalo school is one of 36 research and teaching centers designated by the National Security Agency since 1998 to help safeguard America's information technology systems. (AP Photo/David Duprey) |
Lance Spitzner, founder of the Honeynet Project, poses Thursday, July 19, 2001, with some of the eight computers that are running in a spare bedroom of his suburban Chicago home that he uses to study how computer hackers attack networks. Now 30-people strong, the Honeynet Project has become one of the leading efforts to monitor the so-called blackhat hacker community. (AP Photo/Ted S. Warren) |
Georgia Tech student and computer hacker Billy Hoffman poses with his campus debit card Thursday, July 3, 2003. Hoffman got into trouble when he hacked into the system using a knife and a laptop. The debit card system is used at Tech and 223 other colleges to handle purchases of everything from textbooks to 10 minutes on dorm dryers. (AP Photo/John Bazemore) |
Norwegian teenager Jon Lech Johansen,19, appears in court in Oslo Friday, Dec. 13, 2002. Johansen, who became a hero to computer hackers and was deemed a villain by Hollywood, is on trial for writing and distributing a program called DeCSS, software which makes it possible to copy protected DVD films. Prosecutors have asked to have his computers confiscated and called for him to pay $1,400 in court costs. (AP Photo/Bjoern Sigurdsoen/SCANPIX) |
Reflected in a mirror, Richard Eaton, president of WinWhatWhere, listens to a reporter's question during a visit to Seattle on Friday, Feb. 8, 2002. His company's snooping software helped the FBI snag some suspected hackers and he's come out with a new version, this one aimed at businesses and suspecting spouses as well. The software surreptitiously tracks a person's keystrokes and e-mail correspondence, and can even secretly monitor your employee or significant other by Webcam. (AP Photo/Cheryl Hatch) |
Dmitry Sklyarov, 27, is shown during a news conference Wednesday, Dec. 19, 2001, in Redwood City, Calif. Sklyarov had faced federal charges in the first criminal prosecution under the 1998 Digital Millennium Copyright Act. The Russian computer programmer who was charged with violating copyrights, says he is relieved his case is near settlement and plans to return home soon. He and his employer, ElComSoft Co. Ltd. of Moscow, were charged with releasing a program that disables copyright restriction on Adobe Systems Inc. (AP Photo/Paul Sakuma) |
Programmers and internet freedom activists march to the Phillip Burton Federal Building to protest the arrest of Russian computer programmer Dmitry Sklyarov Monday, July 30, 2001, in San Francisco. Sklyarov was jailed after developing software that allows the user to circumvent the copyright protections in Adobe Systems eBook reader program. (AP Photo/Ben Margot) |
The computer hacker known as "Mafiaboy," who crippled several major Internet sites including CNN, arrives in court Thursday, Jan. 18, 2001 in Montreal, Canada. He pleaded guilty on Thursday to 55 charges of mischief. The trial of the 16-year-old Montrealer, who can not be identified under Canadian law, was set to begin Thursday on 66 charges relating to attacks last year on several major Web sites, as well as security breaches of other sites at institutions such as Yale and Harvard. (AP Photo/Canadian Press, Andre Forget) |
Teen computer hacker Dennis Moran of Wolfeboro, N.H. is escorted out of the courthouse by Wes Scolaro of the Carroll County Sheriffs office in North Conway N.H., Friday, March 9, 2001, after being sentenced to nine months in jail. He was also ordered to help jail officials with their computer programs while behind bars. Moran, known on the Web as "Coolio," pleaded guilty to hacking into national computer sites last year belonging to the Army, the Air Force and the anti-drug Dare.com. (AP Photo/Jim Cole) |
Jerome Heckenkamp, 21, leaves the Federal Building in Albuquerque, N.M., after appearing before a U.S. magistrate Thursday, Jan. 11, 2001. Heckenkamp, a Los Alamos National Laboratory employee charged with hacking into six company Web sites prior to his employment at the lab, was ordered to appear in two district courts in California on computer-tampering charges. (AP Photo/Jake Schoellkopf) |
In this photo released by the Macomb County Sheriffs Department, James S. Green II, 35, of Macomb County's Washington Township is shown in a booking photo in Mount Clemens, Mich., Tuesday, March 14, 2006. Green, a former security guard at General Motors Corp.'s Warren, Mich., technical center, is accused of taking employee Social Security numbers and using them to hack into the company's employee vehicle database. Green was arraigned Monday on eight counts of obtaining, possessing or transferring personal identity information, one count of using a computer to commit a crime and one count of stalking that was unrelated to the GM cases. (AP Photo/Macomb County Sheriffs Department) |
Jonathan James, 16, walks outside the federal courthouse in Miami Thursday, Sept. 21, 2000. James was sentenced to six months in a detention facility for hacking into computers at the Pentagon and NASA. The youth, known as "cOmrade" on the Internet, pleaded guilty to intercepting 3,300 email messages at one of the Defense Department's most sensitive operations and stealing data from 13 NASA computers, including some devoted to the new International Space Station. (AP Photo/NBC-6, via The Miami Herald) |
FBI Deputy Director Tom Pickard, left, listens to Attorney General Janet Reno at a news conferece in Washington Wednesday Feb. 9, 2000 to address the computer hacking problem. Reno promised that federal law enforcement authorities will do all in their power to combat a wave of Internet vandalism. (AP/Photo) |
Convicted computer hacker Kevin Mitnick, right, declines to answer any questions from the media, after reading a statement in an improvised news conference early Friday, Jan. 21, 2000, after being released from the Federal Correction Institute in Lompoc, Calif. One of the nation's most known computer hackers wants to go to college and study computer technology. His ambition may be tough under a judge's order that he keep his hands off computers for three years following his release from prison Friday. Man with red hair is an unidentified supporter of Mitnick. (AP Photo/Damian Dovarganes) |
The bright lights of the media are reflected in the glasses of Onel A. de Guzman, a Filipino computer student, as he answers questions from the media Thursday, May 11, 2000 in Manila. De Guzman, who had been missing for several days, said Thursday that he may have accidentally released the "Love Bug" virus that crippled computer e-mail systems worldwide. (AP Photo/Ed Wray) |
Deborah Frincke, Professor of Computer Science at the University of Idaho in Lewiston, Idaho, works in her office in Lewiston in this October 1999 photo. Frincke and her colleagues are in the process of developing and monitoring software for the US department of defense that would repel computer hackers. (AP Photo/University of Idaho). |
An unidentified Taiwanese man accesses a Chinese government website on his computer via the internet showing a "hacked" page Monday, Aug. 9, 1999, in Taipei, Taiwan. A cyberwar has erupted between Taiwanese and Chinese computer hackers lending support to their governments battle for sovereignty over Taiwan. A Taiwanese hacked into a Chinese high-tech Internet site on Monday, planting on its webpage a red and blue Taiwanese national flag as well as an anti-Communist slogan:"Reconquer, Reconquer, Reconquer the Mainland." (AP Photo/Wally Santana) |
Under questioning by an unidentified police officer, Chen Ing-hau, foregound, who allegedly created the Chernobyl computer virus, provides an antivirus program during an interrogation at a police station in Taipei,Taiwan, Friday, April 30, 1999. According to a police statement, Chen admitted he didn't expect the virus he allegedly authored to cause the computer meltdowns that it did in many countries. (AP Photo/Heng Ta-peng) |
This is a handout photo of David L. Smith, 30, of Aberdeen, N.J. distributed at a news conference in Trenton, N.J., Friday, April 2, 1999. Smith was arrested and charged with originating the e-mail virus known as Melissa, which swamped computers around the world, spreading like a malicious chain letter. (AP Photo/HO, State Attorney General) |
DEFCON convention attendees from left, Bitstream, right, Wicked, center, and Icecold, left, who would only give their user names, play the hacking game, Capture the Flag, during the annual hackers convention being held at the Alexis Park Resort in Las Vegas, Saturday, July 10, 1999. (AP Photo/Clint Karlsen) |
Carl Shapiro, Marko Bukvic and Anatole Shaw, organizers of this weekend's hackers' conference, work on building a computer Wednesday, Aug. 6 ,1997 in New York. Hackers, the cyberspace rebels who break into computer systems, have gotten a bad rap. Organizers of the conference called HOPE (Hackers on Planet Earth), starting Friday in Manhattan, want it to help return some respectability to the hacker moniker. (AP Photo/Todd Plitt) |
"Mudge," a computer hacker, testifies on Capitol Hill Tuesday May 19, 1998 before the Senate Governmental Affairs Committee hearing on computer hacking. "Mudge" along with fellow hackers told the committee that computer security is so lax, they could disable the entire Internet in a half-hour. (AP Photo/William Philpott) |
Ehud Tenebaum, 18, sits in his fathers car outside a police station near Tel Aviv, Thursday March 19, 1998. Tenebaum, who calls himself ``The Analyzer,'' was placed under house arrest in Israel on Wednesday and questioned Thursday by a special police anti-hacker unit. Tenebaum and two more Israeli teen-agers have been placed under house arrest and two California juveniles could face criminal charges in the most organized hacker attack ever on the Pentagon's computer system, the FBI said Thursday.(AP PHOTO/Nati Harnik) |
This is a view of the NetDex website hacked by "Analyzer," a mysterious Israeli allegedly behind cyber attacks on Pentagon and university computers. This photo was taken from the World Wide Web Friday, March 6, 1998. Deputy Defense Secretary John Hamre said last month that although the intrusion appeared to have been aimed at systems that contained unclassified personnel and payroll records, it was "the most organized and systematic attack the Pentagon has seen to date." (AP Photo/HO/AntiOnline) |
John Vranesevich, in this Nov. 1997 photo, used his World Wide Web site to interview computer hackers who claim they broke into a Pentagon network and stole software for a military satellite system. It was also last month that Vranesevich, a 19-year-old self-taught computer security expert, decided that he didn't really need an undergraduate degree and parted ways with the University of Pittsburgh. These days, he is parked in front of a computer at his parents' house in Beaver, PA., surrounded by programming textbooks. He said he has had several job offers. (AP Photo/Pittsburgh Post Gazette, John Beale) |
Staff Sgt. Will Mahle, foreground, and Master Sgt. Steve Bodkins work with computers to investigate 'hits' made across the world to Air Force databases and other armed forces computers in this March 20,1998 photo. The 609th Information Warfare Squadron system, the only unit of its kind within the Defense Department, located at Shaw Air Base in Sumter, S.C., is in operation 24 hours a day. (AP Photo/The State, Linda Stelter) |
Army Pfc. Eric O. Jenott, shown in these undated law enforcement photos, has been charged with espionage for allegedly hacking into military computer systems and giving national defense secrets to the Chinese. (AP Photo). Submit Date 08/21/1996 23:51:00 |
British music student Richard Pryce outside Bow Street Magistrates' Court in London Monday Sept. 11, 1995. The teenager faces 12 charges of unlawfully gaining access to the computer systems of the US Air Force and Lockheed missile systems based in the USA. (AP Photo/Rebecca Naden) |
A computer screen displayes a March 1997 communique from Zapatista rebel leader Subcomandante Marcos at the internet address for Mexico's Treasury Department Wednesday, Feb. 4, 1998. Supporters of the Zapatista movement "hacked" into the Treasury Department's internet page, leaving an information page on the movement early Wednesday morning and a reproduction of a March 1997 communique from Marcos referring to the Zapatistas' backing around the world and supporters' use of the internet to spread their message of Indian rights. (AP Photo/Roberto Velazquez) |
Kevin Mitnick enters the U.S. Courthouse in Raleigh, N.C. Feb. 17, 1995. Mitnick was arrested Feb. 15, 1995 in connection with a daring and mysterious Christmas Day 1994 break-in on the computer of Tsutomu Shimomura, one of the world's top computer security experts. (AP Photo/Raleigh News & Observer-Jim Bounds) |
Tsutomu Shimomura, one of the world's top computer security experts, leaves his hotel at the Research Triangle Park, N.C. Feb. 16, 1995. Shimomura helped Federal officials track down and arrest computer hacker Kevin Mitnickin Raleigh Feb. 15, 1995 in connection with a break-in on Shimomura's computer. (AP Photo/The Raleigh News & Observer, Robert Willett) |
This is a September 8, 1990 police booking photo of Kevin Poulsen, who has been charged by authorities with espionage for hacking into FBI and national security computer systems. (AP Photo) |
Former Cornell University graduate student Robert Tappar Morris Jr. leaves Federal Court in Syracuse, N.Y., on Jan. 8, 1990. Morris is accompanied by his mother, Anne, left, and his father, Robert Sr., at right rear, after a day of jury selection in his trial on charges of infiltrating a nationwide computer network in Nov. 1988. (AP Photo/Michael J. Okoniewski) [Robert Morris, Sr., was a cryptologist for the National Security Agency.] |
FILE--Joe Desch is shown in the backyard of his parent's home in Dayton, Ohio, circa 1935. In 1942 and 1943, Desch headed a top-secret program at Dayton's National Cash Register Co. to develop a high-speed deciphering machine, called a Bombe, to crack the Nazi submarine code. The project was second in priority only to the Manhattan Project that built the Atom Bomb. Now, his daughter and grandson have uncovered the mystery of the codebreaking research that led the United States to crack the Nazi submarine code. (AP Photo/Dayton Daily News, File) |
Robert Morris Jr. leaves Federal Court with an unidentified woman in Syracuse, N.Y., late Monday night on Jan. 22, 1990. Morris was found guilty of federal computer tampering laws in connection with a computer virus he created while a student at Cornell University. (AP Photo/Michael J. Okoniewski) |
Two intelligence analysts work at two Purple code machine analogues at the headquarters of the U.S. Army cryptanalysis service in Arlington, Va. in 1944 during World War II. The analogue machines, devised by American cryptographers, enable Purple-coded Japanese messages to be deciphered. (AP Photo) |
The Duke of Kent, right, is shown the output writer of the 15 feet long World War II code breaking computer known as Colossus in this June 6, 1996 photo in Bletchley, England. The building in which Alan Turing and his team cracked the German Enigma code during the Second World War, Hut 8 at Bletchley Park, Buckinghamshire, England, will be opened to the public for the first time Thursday June 10, 2004. The building is being restored as part of a new exhibition complex at the wartime intelligence center, the first phase of which is being opened by The Duke of Kent. (AP Photo/PA, Peter Jordan).
|