A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | NAME | HACKING INTENT | MEDIA ARTICLES | LEGAL CASE DOCUMENTS | CONTACT INFORMATION | SOURCES | Reason for Inclusion | ||||||||||||||||||||
2 | Example | Hacking to learn | Link to articles | Link to any legal case documents or references to them | email and/or phone as available | Any additional sources | |||||||||||||||||||||
3 | |||||||||||||||||||||||||||
4 | Kevin Mitnick | Hacking for fun, thrills, and excitement. | https://www.theguardian.com/theguardian/1999/aug/10/features11.g22 | http://law.jrank.org/pages/3791/Kevin-Mitnick-Case-1999.html http://gbppr.dyndns.org/~gbpprorg/2600/mitnick_is_guilty/072699defapp.html | Attorneys: Donald Randolph Santa Monica, CA 800-726-3657 (310) 395-7900 Gregory Vinson No contact info available | https://www.thenationaltriallawyers.org/profile-view/Donald/Randolph/13079/ http://gbppr.dyndns.org/~gbpprorg/2600/mitnick_is_guilty/072699defapp.html | |||||||||||||||||||||
5 | Jonathan James | As the first hacked prosecuted as a juvenile, he bragged about his activities to his friends and the press. | http://www.miaminewtimes.com/news/hack-pack-6379188 http://www.nytimes.com/2000/09/23/us/youth-sentenced-in-government-hacking-case.html | N/A, possibly because he was tried as a juvenile | Attorney: Ted Klein, Miami, FL (Deceased 2006) | http://justicebuilding.blogspot.com/2006/09/ted-klein-has-passed-away.html | |||||||||||||||||||||
6 | Max Ray Butler | Motivated by money: hacked banks & merchants to steal credit card numbers, which he then sold. | https://www.wired.com/2009/06/butler-court/ https://www.cnet.com/news/iceman-pleads-guilty-in-credit-card-theft-case/ | https://www.justice.gov/archive/criminal/cybercrime/press-releases/2007/butlerIndict.htm | Attorney: Public Defender Michael Novara Currently First Assistant Federal Public Defender for the Western District of PA (Trial Division) Phone: 412-644-6565 | https://paw.fd.org/staff.htm | |||||||||||||||||||||
7 | Albert Gonzalez | Motivated by money and the lavish lifestyle that came with it, he hacked into business computer networks in order to steal credit and debit card account information. Coincidentally, he was once an informant for the U.S. Secret Service. | http://abcnews.go.com/Technology/story?id=8374399 | N/A | Attorney: Rene Palomino, Jr. Miami, FL (305) 496-5017 | http://www.legaldirectories.com/Palomino-Rene-Jr-798249-Atty.aspx | |||||||||||||||||||||
8 | Kevin Poulsen | Spying interests, as his hacking resulted in the first instance of Federal espionage charges filed against a computer hacker. These charges stemmed from theft of a classified military document. | http://www.nytimes.com/1992/12/08/us/hacker-indicted-on-spy-charges.html | N/A | Attorney: Paul Meltzer Santa Cruz, CA (866) 276-0370 or (866) 469-5578 | http://www.nolo.com/lawyers/profile/law-offices-paul-b-meltzer-a-professional-corporation https://www.lawyers.com/santa-cruz/california/paul-b-meltzer-263490-a/ | |||||||||||||||||||||
9 | Adrian Lamo | Wanted to exploit security weaknesses in systems such as the New York Times, Yahoo, Blogger, and other companies. | https://nypost.com/2003/09/13/court-unplugs-times-hacker/ https://www.securityfocus.com/news/7771 | N/A | Attorney: Former Federal Public Defender Sean Hecker who is currently a partner at Debevoise & Plimpton, New York (212) 909-6052 | https://www.debevoise.com/seanhecker?tab=biography | |||||||||||||||||||||
10 | Vladimir Leonidovich Levin | Motivated by money, Levin and his associates transferred $10 million to bank accounts worldwide by breaching Citibank's computer systems. He is a Russian national with accomplices in other countries. | http://www.nytimes.com/1995/08/19/business/citibank-fraud-case-raises-computer-security-questions.html | N/A | Attorney information not available | N/A | |||||||||||||||||||||
11 | Marcel Lazăr Lehel | A Romanian hacker who identified himself as “Guccifer,” Lehel's's goal was identity theft and access to sensitive information (i.e., photos, medical records, correspondence, etc.) belonging to high ranking U.S. officials. Approximately 100 Americans were impacted, with this information later publicly released."His victims included an immediate family member of two former U.S. presidents, a former member of the U.S. Cabinet, a former member of the U.S. Joint Chiefs of Staff and a former presidential advisor". | https://www.justice.gov/usao-edva/pr/romanian-hacker-guccifer-pleads-guilty-computer-hacking-crimes | https://cryptome.org/2016/04/guccifer-arraigned-detained.pdf | Attorney: Shannon Quill Federal Public Defender Alexandria, VA 22314 (703) 600-0800 Email: Shannon_Quill@fd.org | https://cryptome.org/2016/04/guccifer-arraigned-detained.pdf | |||||||||||||||||||||
12 | John Schiefer | The first hacker to use a "bot net" to violate federal wiretapping laws, Schiefer infected more than 250,000 computers with malicious software and spyware used to steal personal data. His interest seems to be financial and experimental in nature. | https://www.computerworld.com/article/2531532/cybercrime-hacking/botnet-ringleader-gets-four-years-in-prison-for-stealing-data-from-pcs.html http://voices.washingtonpost.com/securityfix/2007/11/security_pro_admits_to_hijacki.html | N/A | Arthur Barens Los Angeles, CA (310) 557-0444 | http://articles.latimes.com/2007/nov/10/business/fi-botnet10 https://www.lawyercontact.us/lawyer/los-angeles-law-firm-arthur-h-barens-law-offices/ | |||||||||||||||||||||
13 | Mark Abene | One of the members of the hacker group MOD ("Masters of Disaster"), Abene was charged with electornically accessing computer switching systems at telecommunications companies such as Pacific Bell and US West, as well as systems at credit reporting agencies. He did not receive money for these breaches, and stated that they were a result of his inquisitive nature. | https://www.washingtonpost.com/archive/politics/1993/07/03/computer-hacker-admits-electronic-data-tampering/4d16ff58-86c0-409b-8ea0-8f17535256a7/?utm_term=.6a13e3f5a98f | http://www.textfiles.com/news/modbust.txt | N/A | N/A | |||||||||||||||||||||
14 | |||||||||||||||||||||||||||
15 | |||||||||||||||||||||||||||
16 | |||||||||||||||||||||||||||
17 | |||||||||||||||||||||||||||
18 | |||||||||||||||||||||||||||
19 | |||||||||||||||||||||||||||
20 | |||||||||||||||||||||||||||
21 | |||||||||||||||||||||||||||
22 | |||||||||||||||||||||||||||
23 | |||||||||||||||||||||||||||
24 | |||||||||||||||||||||||||||
25 | |||||||||||||||||||||||||||
26 | |||||||||||||||||||||||||||
27 | |||||||||||||||||||||||||||
28 | |||||||||||||||||||||||||||
29 | |||||||||||||||||||||||||||
30 | |||||||||||||||||||||||||||
31 | |||||||||||||||||||||||||||
32 | |||||||||||||||||||||||||||
33 | |||||||||||||||||||||||||||
34 | |||||||||||||||||||||||||||
35 | |||||||||||||||||||||||||||
36 | |||||||||||||||||||||||||||
37 | |||||||||||||||||||||||||||
38 | |||||||||||||||||||||||||||
39 | |||||||||||||||||||||||||||
40 | |||||||||||||||||||||||||||
41 | |||||||||||||||||||||||||||
42 | |||||||||||||||||||||||||||
43 | |||||||||||||||||||||||||||
44 | |||||||||||||||||||||||||||
45 | |||||||||||||||||||||||||||
46 | |||||||||||||||||||||||||||
47 | |||||||||||||||||||||||||||
48 | |||||||||||||||||||||||||||
49 | |||||||||||||||||||||||||||
50 | |||||||||||||||||||||||||||
51 | |||||||||||||||||||||||||||
52 | |||||||||||||||||||||||||||
53 | |||||||||||||||||||||||||||
54 | |||||||||||||||||||||||||||
55 | |||||||||||||||||||||||||||
56 | |||||||||||||||||||||||||||
57 | |||||||||||||||||||||||||||
58 | |||||||||||||||||||||||||||
59 | |||||||||||||||||||||||||||
60 | |||||||||||||||||||||||||||
61 | |||||||||||||||||||||||||||
62 | |||||||||||||||||||||||||||
63 | |||||||||||||||||||||||||||
64 | |||||||||||||||||||||||||||
65 | |||||||||||||||||||||||||||
66 | |||||||||||||||||||||||||||
67 | |||||||||||||||||||||||||||
68 | |||||||||||||||||||||||||||
69 | |||||||||||||||||||||||||||
70 | |||||||||||||||||||||||||||
71 | |||||||||||||||||||||||||||
72 | |||||||||||||||||||||||||||
73 | |||||||||||||||||||||||||||
74 | |||||||||||||||||||||||||||
75 | |||||||||||||||||||||||||||
76 | |||||||||||||||||||||||||||
77 | |||||||||||||||||||||||||||
78 | |||||||||||||||||||||||||||
79 | |||||||||||||||||||||||||||
80 | |||||||||||||||||||||||||||
81 | |||||||||||||||||||||||||||
82 | |||||||||||||||||||||||||||
83 | |||||||||||||||||||||||||||
84 | |||||||||||||||||||||||||||
85 | |||||||||||||||||||||||||||
86 | |||||||||||||||||||||||||||
87 | |||||||||||||||||||||||||||
88 | |||||||||||||||||||||||||||
89 | |||||||||||||||||||||||||||
90 | |||||||||||||||||||||||||||
91 | |||||||||||||||||||||||||||
92 | |||||||||||||||||||||||||||
93 | |||||||||||||||||||||||||||
94 | |||||||||||||||||||||||||||
95 | |||||||||||||||||||||||||||
96 | |||||||||||||||||||||||||||
97 | |||||||||||||||||||||||||||
98 | |||||||||||||||||||||||||||
99 | |||||||||||||||||||||||||||
100 |