SlideShare a Scribd company logo
1 of 6
5 OF THE WORLD’S MOST
FAMOUS HACKERS & WHAT
HAPPENED TO THEM
JONATHAN JAMES WAS KNOWN AS “C0MRADE” ON THE INTERNET. WHAT IS HIS TICKET TO FAME? HE WAS
CONVICTED AND SENT TO PRISON FOR HACKING IN THE UNITED STATES–ALL WHILE HE WAS STILL A MINOR. AT
ONLY FIFTEEN YEARS OF AGE, HE MANAGED TO HACK INTO A NUMBER OF NETWORKS, INCLUDING THOSE
BELONGING TO BELL SOUTH, MIAMI-DADE, THE U.S. DEPARTMENT OF DEFENSE, AND NASA.
YES, JAMES HACKED INTO NASA’S NETWORK AND DOWNLOADED ENOUGH SOURCE CODE TO LEARN HOW THE
INTERNATIONAL SPACE STATION WORKED. THE TOTAL VALUE OF THE DOWNLOADED ASSETS EQUALED $1.7
MILLION. TO ADD INSULT TO INJURY, NASA HAD TO SHUT DOWN THEIR NETWORK FOR THREE WHOLE WEEKS
WHILE THEY INVESTIGATED THE BREACH, WHICH COST THEM $41,000.
THE STORY OF JAMES HAS A TRAGIC ENDING, HOWEVER. IN 2007, A NUMBER OF HIGH PROFILE COMPANIES FELL
VICTIM TO A MASSIVE WAVE OF MALICIOUS NETWORK ATTACKS. EVEN THOUGH JAMES DENIED ANY
INVOLVEMENT, HE WAS SUSPECTED AND INVESTIGATED. IN 2008, JAMES COMMITTED SUICIDE, BELIEVING HE
WOULD BE CONVICTED OF CRIMES THAT HE DID NOT COMMIT.
Jonathan James
Albert Gonzalez
Kevin Mitnick is the “Most Wanted Computer Criminal” in U.S history. There are two featured films
based on Kevin Mitnick – Takedown (2000) and Freedom Downtime. What did he do? He hacked
the cell phone and made free calls, he had stolen the code from companies like Sun Microsystems
and Novell. Kevin also hacked into NSA (National Security Agency) phone calls. When he found
guilty in many frauds charges, he had been sent to prison for five years. Nowadays, he works as a
professional Security Consultant.
Kevin Poulsen
ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of
the United States.
Gonzalez started off as the leader of a hacker group known as ShadowCrew. This group would go
on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also
fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft
crimes totaling $4.3 million stolen.
The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX
Companies and Heartland Payment Systems for their stored credit card numbers. In 2010,
Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out
simultaneously).
Gary McKinnon
Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his
intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and
fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was
called the “Hannibal Lecter of computer crime.”
He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole
wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51
months in prison, as well paying $56,000 in restitution.
Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working
as a journalist and is now a senior editor for Wired News. At one point, he even helped law
enforcement to identify 744 sex offenders on MySpace.
Gary McKinnon
Scottish computer hacker, Gray McKinnon was popular as Internet handle “Solo.” He gained access
97 American Military Networks and NASA between 2001 and 2002, and leaving the message on
military website, “Your Security is Crap.” However, he claimed that he was just searching for
information about energy suppression and UFO activity cover-ups. It has registered “Biggest
Military Computer Hack of all the time.” But, now he has reinvented as a SEO wizard and charging
40 Pounds per hour to help websites cum blog ranks.

More Related Content

Similar to 5 of the world’s most famous hackers

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywordskhansalman19
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackersJeffJedras
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowAbdullah Khosa
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technologyTricon Infotech
 
2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)Felipe Prado
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleFelipe Prado
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by RudyUdieh Moody
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackersRoman Antonov
 
2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)Felipe Prado
 
Hacking Incidents that made Headlines
Hacking Incidents that made HeadlinesHacking Incidents that made Headlines
Hacking Incidents that made Headlineskanika sharma
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)Felipe Prado
 
2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)Felipe Prado
 
2600 v16 n2 (summer 1999)
2600 v16 n2 (summer 1999)2600 v16 n2 (summer 1999)
2600 v16 n2 (summer 1999)Felipe Prado
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdfaesalem06
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 

Similar to 5 of the world’s most famous hackers (20)

Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common KeywordsComputer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
History's most notorious hackers
History's most notorious hackersHistory's most notorious hackers
History's most notorious hackers
 
Top 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till nowTop 10 Cyber Crimes in the World till now
Top 10 Cyber Crimes in the World till now
 
How hackers embarrassed technology
How hackers embarrassed technologyHow hackers embarrassed technology
How hackers embarrassed technology
 
2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)2600 v14 n1 (spring 1997)
2600 v14 n1 (spring 1997)
 
DEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc styleDEF CON 27 - JOSEPH MENN - change the world c dc style
DEF CON 27 - JOSEPH MENN - change the world c dc style
 
Computer Hacking by Rudy
Computer Hacking by RudyComputer Hacking by Rudy
Computer Hacking by Rudy
 
5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers5 biggest cyber attacks and most famous hackers
5 biggest cyber attacks and most famous hackers
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)2600 v13 n3 (autumn 1996)
2600 v13 n3 (autumn 1996)
 
Hackers
HackersHackers
Hackers
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Hacking Incidents that made Headlines
Hacking Incidents that made HeadlinesHacking Incidents that made Headlines
Hacking Incidents that made Headlines
 
2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)2600 v07 n1 (spring 1990)
2600 v07 n1 (spring 1990)
 
2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)2600 v10 n4 (winter 1993)
2600 v10 n4 (winter 1993)
 
2600 v16 n2 (summer 1999)
2600 v16 n2 (summer 1999)2600 v16 n2 (summer 1999)
2600 v16 n2 (summer 1999)
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf1. Malicious software  Chernobyl virusThe Chernobyl virus is a co.pdf
1. Malicious software Chernobyl virusThe Chernobyl virus is a co.pdf
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 

More from MohsinHusenManasiya (20)

Ch - 01 [Eng-11] Chapter -1
Ch - 01 [Eng-11] Chapter -1Ch - 01 [Eng-11] Chapter -1
Ch - 01 [Eng-11] Chapter -1
 
Storage unit
Storage unitStorage unit
Storage unit
 
Satelite
SateliteSatelite
Satelite
 
RFID
RFIDRFID
RFID
 
QR CODE
QR CODEQR CODE
QR CODE
 
Qr
QrQr
Qr
 
Qr codes
Qr codesQr codes
Qr codes
 
Teamviewr
TeamviewrTeamviewr
Teamviewr
 
Malware
MalwareMalware
Malware
 
Q 1
Q 1Q 1
Q 1
 
Ppi
PpiPpi
Ppi
 
Nfc
NfcNfc
Nfc
 
Network
NetworkNetwork
Network
 
Mobile processor
Mobile processorMobile processor
Mobile processor
 
Lasik eye surgery
Lasik eye surgeryLasik eye surgery
Lasik eye surgery
 
Iris
IrisIris
Iris
 
Internet vs intranet vs extranet
Internet vs intranet vs extranetInternet vs intranet vs extranet
Internet vs intranet vs extranet
 
Ingestible robots
Ingestible robotsIngestible robots
Ingestible robots
 
I3 vs i5 vs i7
I3 vs i5 vs i7I3 vs i5 vs i7
I3 vs i5 vs i7
 
How does wireless inductive charging work
How does wireless inductive charging workHow does wireless inductive charging work
How does wireless inductive charging work
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

5 of the world’s most famous hackers

  • 1. 5 OF THE WORLD’S MOST FAMOUS HACKERS & WHAT HAPPENED TO THEM
  • 2. JONATHAN JAMES WAS KNOWN AS “C0MRADE” ON THE INTERNET. WHAT IS HIS TICKET TO FAME? HE WAS CONVICTED AND SENT TO PRISON FOR HACKING IN THE UNITED STATES–ALL WHILE HE WAS STILL A MINOR. AT ONLY FIFTEEN YEARS OF AGE, HE MANAGED TO HACK INTO A NUMBER OF NETWORKS, INCLUDING THOSE BELONGING TO BELL SOUTH, MIAMI-DADE, THE U.S. DEPARTMENT OF DEFENSE, AND NASA. YES, JAMES HACKED INTO NASA’S NETWORK AND DOWNLOADED ENOUGH SOURCE CODE TO LEARN HOW THE INTERNATIONAL SPACE STATION WORKED. THE TOTAL VALUE OF THE DOWNLOADED ASSETS EQUALED $1.7 MILLION. TO ADD INSULT TO INJURY, NASA HAD TO SHUT DOWN THEIR NETWORK FOR THREE WHOLE WEEKS WHILE THEY INVESTIGATED THE BREACH, WHICH COST THEM $41,000. THE STORY OF JAMES HAS A TRAGIC ENDING, HOWEVER. IN 2007, A NUMBER OF HIGH PROFILE COMPANIES FELL VICTIM TO A MASSIVE WAVE OF MALICIOUS NETWORK ATTACKS. EVEN THOUGH JAMES DENIED ANY INVOLVEMENT, HE WAS SUSPECTED AND INVESTIGATED. IN 2008, JAMES COMMITTED SUICIDE, BELIEVING HE WOULD BE CONVICTED OF CRIMES THAT HE DID NOT COMMIT. Jonathan James
  • 3. Albert Gonzalez Kevin Mitnick is the “Most Wanted Computer Criminal” in U.S history. There are two featured films based on Kevin Mitnick – Takedown (2000) and Freedom Downtime. What did he do? He hacked the cell phone and made free calls, he had stolen the code from companies like Sun Microsystems and Novell. Kevin also hacked into NSA (National Security Agency) phone calls. When he found guilty in many frauds charges, he had been sent to prison for five years. Nowadays, he works as a professional Security Consultant.
  • 4. Kevin Poulsen ATM card numbers over a period of 2 years. Yep. That’s equal to a little over half the population of the United States. Gonzalez started off as the leader of a hacker group known as ShadowCrew. This group would go on to steal 1.5 million credit card numbers and sell them online for profit. ShadowCrew also fabricated fraudulent passports, health insurance cards, and birth certificates for identity theft crimes totaling $4.3 million stolen. The big bucks wouldn’t come until later, when Gonzalez hacked into the databases of TJX Companies and Heartland Payment Systems for their stored credit card numbers. In 2010, Gonzalez was sentenced to prison for 20 years (2 sentences of 20 years to be served out simultaneously).
  • 5. Gary McKinnon Kevin Poulsen, also known as “Dark Dante,” gained his fifteen minutes of fame by utilizing his intricate knowledge of telephone systems. At one point, he hacked a radio station’s phone lines and fixed himself as the winning caller, earning him a brand new Porsche. According to media, he was called the “Hannibal Lecter of computer crime.” He then earned his way onto the FBI’s wanted list when he hacked into federal systems and stole wiretap information. Funny enough, he was later captured in a supermarket and sentenced to 51 months in prison, as well paying $56,000 in restitution. Like Kevin Mitnick, Poulsen changed his ways after being released from prison. He began working as a journalist and is now a senior editor for Wired News. At one point, he even helped law enforcement to identify 744 sex offenders on MySpace.
  • 6. Gary McKinnon Scottish computer hacker, Gray McKinnon was popular as Internet handle “Solo.” He gained access 97 American Military Networks and NASA between 2001 and 2002, and leaving the message on military website, “Your Security is Crap.” However, he claimed that he was just searching for information about energy suppression and UFO activity cover-ups. It has registered “Biggest Military Computer Hack of all the time.” But, now he has reinvented as a SEO wizard and charging 40 Pounds per hour to help websites cum blog ranks.