Arrested

Mark Lottor, MKL

IRL Name: 
Mark K. Lottor
Biography: 

Network Wizards is owned and operated by Mark K. Lottor. Mark worked at the DDN Network Information Center at SRI International as a systems programmer and assistant computer facility manager for 7 years, and has been working with Internet protocols and services since 1982. He was a member of the Internet Engineering Task Force for over 4 years, mostly involved with the Domain Name System working group, and has authored four Request For Comments documents. Mark produces the quarterly Internet Domain Survey, which counts the number of hosts on the Internet. Mark was also the founder of one of the first web hosting services on the net, Catalog.Com.

Pictures: 
References

Phiber Optik

IRL Name: 
Mark Abene
Biography: 

Mark Abene (born 1972), better known by his pseudonym Phiber Optik, is a computer security hacker from New York City. Phiber Optik was once a member of the Hacker Groups Legion of Doom and Masters of Deception. In 1994, he served a one-year prison sentence for conspiracy and unauthorized access to computer and telephone systems.

Pictures: 
References

Loren Anderson

IRL Name: 
Loren Anderson
Biography: 

Loren Anderson is the son of Clain Anderson who was IBM's director of client security. In 2003, Loren was accused of masterminding an identity-theft operation that was used to illegally withdraw over $100,000 cash from ATMs on Long Island.

As Loren was a minor during his case, not much information about him has been made public.

References

nypost.com/2003/03/27/ibm-big-son-burned-scam-dad-heads-cyber-security/

Terminus

IRL Name: 
Len Rose
Biography: 

Terminus, also known as Terminal Technician, was a well-known freelance Phrack writer who was raided and arrested by the U.S. Secret Service in February 1990 for an article he wrote explaining how trojan horses worked and leaking AT&T SVR3.2 "login.c" source code. Prior to his arrest, he was known as a Unix consultant who ran his own system on UUCP called Netsys. Terminus was also a co-founder of the Full Disclosure Mailing List.

Since his arrest, Len Rose has gone on to work for many companies as a Senior Systems Engineer.

Currently, Len is listed as a "Principal Security Architect" at a company in New Mexico.

Pictures: 
References

Kevin Mitnick, Condor

IRL Name: 
Kevin David Mitnick
Biography: 

Kevin David Mitnick (born August 6, 1963 - died July 16, 2023) is a computer security consultant and convicted criminal who was a very controversial computer hacker in the U.S - mainly because of sensationalized stories by John Markoff. He was last busted in late 1990s for gaining access to computer networks, stealing intellectual property and possession of several forged identification documents.

Everybody knows his punishment was excessive - so stop emailing us about it!

Art of Deception, Mitnick's book, he states that he compromised computers solely by using passwords and codes that he gained by social engineering.

Pictures: 
References

Agent Steal

IRL Name: 
Justin Tanner Petersen
Biography: 

Hacker that was part of a group consisting of himself, Kevin Poulsen, and Ron Austin. Turned informant and worked for the FBI. He got his handle when he was first being investigated by case agent Special Agent Steele. Was arrested for credit card fraud, and breaking & entering.
Was caught on August 1994. He was only living around the corner from the FBI.

He died in early March 2010 in his apartment in LA.

Pictures: 
References

Ben Stark

IRL Name: 
Ben Stark
Biography: 

Part of a group nicknamed the "Deceptive Dou"

Drew public attention in April 2002 for cracking government websites and defacing them with a patriotic "mission outline" in which they described themselves as anonymous US citizens determined to save the country from cyberterrorists by exposing security holes in critical infrastructures.
(Damn this sounds like a movie ;p )

"Tighten the security before a foreign attack forces you to," the Duo's defacements typically read. "At a time like this, we cannot risk the possibility of compromise by a foreign enemy." Accompanying the text was the group's logo: two handguns against the backdrop of a tattered American flag.
(COUGH ...COUGH.. SNEEZE FIRESAIL)

Defaced a Federal Aviation Administration (FAA) server and posted samples from an FAA database detailing passenger screening activity at various U.S. airports with each screener's name, the number of passengers he or she screened, and the number of guns, explosives or chemicals intercepted.
At the time, the FAA downplayed the sensitivity of the database, claiming that it had been prepared for Congress, and was therefore public information. But in the charges filed against Stark, prosecutors describe the list as a "sensitive database".

Defacement of a US Army Corp of Engineers' website under Stark's pre-Deceptive Duo moniker, "The-Rev".

References

Azizbek Takhirovich Mamadjanov

IRL Name: 
Azizbek Takhirovich Mamadjanov
Biography: 

Azizbek Takhirovich Mamadjanov, 21, was sentenced to 42 months and 24 months in prison, respectively, for his role in phishing scams targeting multiple U.S. banks. Over a four month period beginning in March 2006, he helped route millions of dollars stolen from phishing victims to shell companies that they created and controlled.

References

Julio Cesar Ardita

IRL Name: 
Julio Cesar Ardita
Biography: 

Ardita was charged by the U.S. Justice Department with using compromised user accounts at Harvard University to hack into government and university computer systems in the U.S. and abroad. Ardita pled guilty on May 19, 1998 in the United States District Court of Massachusetts to unlawfully intercepting electronic communications and damaging files on military computer systems.

References

Juju Jiang

IRL Name: 
Juju Jiang
Biography: 

Juju Jiang was known for installing keyloggers on Kinko's customer internet terminals.

References
Syndicate content