I have remodified this History of hacking based on St. Petersburg times newspaper
The history of computer hacking can be traced back to the 1870s, but I will emphasize on the most recent years for simplicity.
It all started at MIT’s (Massachusetts Institute of Technology) artificial intelligence lab.The university’s mainframe computers were used by the first hackers. At first, hacker was a name with a positive significance for a person who was good at computers and could push computer programs beyond the normal functioning standard. It was a borrowed name from a term to describe members of a model train group at MIT who hacked the electric trains and switches to make them perform faster, better and differently.
John Draper was the talk of the 70s because of his ability to make free calls. He built a "blue box" that, when used together with the whistle and phone receiver, phone calls would be made for free. He was arrested on several counts for tampering with the phone lines throughout the 70s. Steve Jobs, Steve Wozniak (founders of apple computer) used this knowledge.
The early 1980s
People often say the public was lured into hacking by the movie war game. The main character was Matthew Broderick. It is said that the movie made hackers seem cyber heroes which captured the imagination of young minds in this year.
Hacking groups like Legion of Doom in the United States, and Chaos Computer Club in Germany began to emerge.
Sherwood Forest and Catch-22 were used by phreaks and hackers to interact, and share stolen passwords and credit card
Los Alamos labaoratory’s computers for developing nuclear weapons were hacked by the 414 gang. A gang that
comprised of six teenagers who were later apprehended by the law.
The Late 1980s
The Computer Fraud and Abuse Act was passed in 1986
A self-replicating worm was use on the government's ARPAnet to test its effect on UNIX systems by Robert T. Morris, Jr.,
a graduate student at Cornell University. Which later spread to 6000 computers. He was fined 10,000 USD.
Some German hackers were arrested for breaking into the United States government and corporate computers and sold
operating-system source code to the Russian KGB.
A radio stations phone system was rigged by three hacker-friends during a call-in contest. They won 20 000USD, two cars and
all expense paid trips.
The use of internet came in and hackers started formulating new strategies.
Kevin Mitnick was arrested for stealing 20,000 credit card numbers.
Vladimir Levin and other Russian crackers siphoned 10 million USD from Citibank and transfer it to bank accounts in Finland and
The late 1990s
The hacking group Cult of the Dead Cow releases its Trojan horse program, Back Orifice. Once installed on a machine with
Windows 95 or Windows 98 Operating systems, it allows unauthorized remote access to the machine.
A 19-year-old Israeli hacker Ehud Tenenbaum known as Analyzer was arrested for breaking into pentagon’s computers and
stealing some software.
Well, the popular attacks in the 2000s are,
the attacks launched on yahoo, Amazon and eBay, that resulted to the denial of service for users.
Break-ins on Microsoft, for latest versions of their products.
The 2001 attack that led to the prevention of millions of users from reaching Microsoft Web pages for two days.
This brief history of Hacking and cracking above is meant to serve as a quick reference point to those who really want to know how it all started. That's why its been in summary. Its good to know the history of most things we do.
A second that has just past is history. Share what you know.