The 414s

The 414s

The 414s gained notoriety in the early 1980s as a group of friends and computer hackers who broke into dozens of high-profile computer systems, including ones at Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific Bank.[1]

They were eventually identified as six teenagers, taking their name after the area code of their hometown of Milwaukee, Wisconsin. Ranging in age from 16 to 22, they met as members of a local Explorer Scout troop.[2] The 414s were investigated and identified by the FBI in 1983. There was widespread media coverage of them at the time,[3][4] and 17-year-old Neal Patrick, a student at Rufus King High School, emerged as spokesman and "instant celebrity" during the brief frenzy of interest, which included Patrick appearing on the September 5, 1983 cover of Newsweek.[5][6]

Patrick and the 414s were described as meeting the profile of computer hackers at the time: "Young, male, intelligent, highly motivated and energetic." Patrick claimed his only motivation was the challenge of getting into places he wasn't supposed to, and remaining there undetected. The systems they broke into usually were running Digital Equipment Corporation's VMS operating system.[2]

Many saw them as harmless pranksters, sort of a real life WarGames—a film that was released earlier that year. The 414s themselves were not entirely harmless, doing $1,500 worth of damage at Sloan-Kettering during their June 3, 1983[7] break-in by deleting billing records[8] (ostensibly to cover their tracks). Patrick and the 414s did cause real concern, as experts realized that others could duplicate their techniques and do real damage.[6] They used inexpensive personal computers and simple hacking techniques, such as using common or default passwords and exploiting well-known, but unpatched, security holes.

Chen Chui, an administrator who discovered the electronic break-in, left a message for the intruders and contacted the FBI, who placed wiretaps and eventually traced the calls back to Milwaukee. Gerald Wondra, 22 at the time, was the first visited by the FBI. Wondra lived with his mother in West Allis, a Milwaukee suburb. Wondra said he was "curious, he was just having fun".[2]

Most of the members of the 414s were not prosecuted, in various agreements to stop their activities and pay restitutions.[9] Wondra and another defendant each plead guilty on two counts of "making harassing telephone calls."[10]

As a result of news coverage, congressman Dan Glickman called for an investigation and new laws about computer hacking.[11] Neal Patrick testified before the U.S. House of Representatives on September 26, 1983 about the dangers of computer hacking, and six bills concerning computer crime were introduced in the House that year.[12]

References

  1. ^ Detroit Free Press, September 27, 1983
  2. ^ a b c Covert, Colin (August 28, 1983). "High-Tech Hijinks Seven Curious Teenagers Wreak Havoc Via Computer". Detroit Free Press. p. 1F. 
  3. ^ Detroit Free Press. September 27, 1983 
  4. ^ Elmer-DeWitt, Philip (August 29, 1983). "The 414 Gang Strikes Again". Time magazine: pp. p. 75. http://www.time.com/time/magazine/article/0,9171,949797,00.html 
  5. ^ "Beware: Hackers at play". Newsweek: pp. pp. 42–46,48. September 5, 1983 
  6. ^ a b Enter Magazine, March 1984
  7. ^ "Profits of deceit: dispatches from the front lines of fraud" by Patricia Franklin. Page 35. 1990.
  8. ^ "Computers: The 414 Gang Strikes Again," Time Magazine. August 29, 1983.
  9. ^ "Computer User Sentenced". New York Times. May 1, 1984. http://query.nytimes.com/gst/fullpage.html?res=9F01E2D71338F932A35756C0A962948260. Retrieved 2006-12-30. 
  10. ^ "TWO WHO RAIDED COMPUTERS PLEADING GUILTY". New York Times. 1984-03-17. 
  11. ^ "Timeline: The U.S. Government and Cybersecurity". Washington Post. May 16, 2003. http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26.html. Retrieved 2006-04-14. 
  12. ^ David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.

Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • List of computer criminals — Hacker Adrian Lamo (left) with contemporaries Kevin Mitnick (center) and Kevin Poulsen …   Wikipedia

  • Timeline of computer security hacker history — This is a timeline of computer security hacker history. Hacking and system cracking appeared with the first electronic computers. Below are some important events in the history of hacking and cracking.1970s1971* John T. Draper (later nicknamed… …   Wikipedia

  • Hacker (Computersicherheit) — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Black-Hat — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Black-Hat-Hacker — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Blackhat — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Grey-Hat — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Grey-Hat-Hacker — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Grey Hat — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

  • Greyhat — Hacker aus dem Bereich der Computersicherheit beschäftigen sich mit Sicherheitsmechanismen und deren Schwachstellen. Während der Begriff auch diejenigen beinhaltet, die Sicherheitslücken suchen, um sie aufzuzeigen oder zu korrigieren, wird er von …   Deutsch Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”