Search Details

Word: hackers (lookup in dictionary) (lookup stats)
Dates: all
Sort By: most recent first (reverse)


Usage:

Thus began a game of cat and mouse that led Stoll and half a dozen investigative agencies far beyond the Berkeley campus. For ten months, they followed the hacker as he wended his way through the networks that link U.S. military and industrial computers all over the world. By the time the hacker was tracked to a ground-floor apartment in Hannover, West Germany, he had accomplished perhaps the most extensive breach of U.S. computer security to date. While no top secrets appear to have been uncovered, the incident shows how easy it can be to go fishing for sensitive...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...case first came to light in the West German weekly Quick, which identified the suspect as a 24-year-old computer-science student with the pseudonym Mathias Speer. In a press conference last week, his pursuer, Stoll, described how the young hacker used the Lawrence Lab computer as a gateway to Internet, a U.S. Government-owned network that connects some 20,000 computers handling scientific research and unclassified military work. While Speer used fairly standard techniques for cracking passwords, he showed uncommon persistence. He attacked some 450 different computers and gained access to more than 30. Victims ranged from...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...intruder's appetite for military data is what eventually did him in. To trick him into staying connected long enough to effect a telephone trace, Stoll dangled an irresistible lure: a file of bogus Star Wars information titled SDI Network Project. The sting worked. The hacker stayed on the line for more than an hour, greedily loading the phony data into his home computer. (The information was booby-trapped as well, containing an address in Berkeley for more information on the fictitious project.) West German authorities, working with the FBI, traced the call to the Hannover apartment, questioned its occupant...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...intrusions came to an abrupt halt, but the mystery persists. Was Speer % simply a clever hacker? Or was he a would-be mercenary or even an East bloc spy? Speer is apparently not telling, and the West Germans lack sufficient evidence to haul him into court. But back in Berkeley, an intriguing new lead has surfaced. Three months after Speer took the Star Wars bait, the lab received a request for more information on the bogus project. Postmarked Pittsburgh, it was signed by a reputed arms dealer with ties to Saudi Arabia. How could he have got the address...

Author: /time Magazine | Title: Technology: A Bold Raid on Computer Security | 5/2/1988 | See Source »

...series of raids on U. S. military computers is traced to a hacker in Hannover, West Germany. -- First peek at the Stealth bomber...

Author: /time Magazine | Title: Time Magazine Contents Page | 5/2/1988 | See Source »

Previous | 63 | 64 | 65 | 66 | 67 | 68 | 69 | 70 | 71 | 72 | 73 | 74 | 75 | 76 | 77 | 78 | 79 | 80 | 81 | 82 | 83 | Next