COMPUTER HACK

COMPUTER HACK
Hacking means finding out weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks. Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker,[4] not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.

Timeline of computer security hacker history
1903

    Magician and inventor Nevil Maskelyne disrupts John Ambrose Fleming's public demonstration of Guglielmo Marconi's purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditorium's projector.
Editing Timeline of computer security hacker history (section)
==1930s==
===1932===
* Polish cryptologists [[Marian Rejewski]], [[Henryk Zygalski]] and [[Jerzy Różycki]] broke the [[Cryptanalysis of the Enigma|Enigma machine]] code.

===1939===
* [[Alan Turing]], [[Gordon Welchman]] and [[Harold Keen]] worked together to develop the [[Bombe]] (on the basis of Rejewski's works on [[Bomba (cryptography)|Bomba]]). The [[Enigma machine]]'s use of a reliably small key space makes it vulnerable to brute force and thus a violation of [http://cwe.mitre.org/data/definitions/326.html CWE-326].

1932

    Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code.
Editing Timeline of computer security hacker history (section)
===1939===
* [[Alan Turing]], [[Gordon Welchman]] and [[Harold Keen]] worked together to develop the [[Bombe]] (on the basis of Rejewski's works on [[Bomba (cryptography)|Bomba]]). The [[Enigma machine]]'s use of a reliably small key space makes it vulnerable to brute force and thus a violation of [http://cwe.mitre.org/data/definitions/326.html CWE-326].

1939

    Alan Turing, Gordon Welchman and Harold Keen worked together to develop the Bombe (on the basis of Rejewski's works on Bomba). The Enigma machine's use of a reliably small key space makes it vulnerable to brute force and thus a violation of CWE-326
Editing Timeline of computer security hacker history (section)
==1960s==
===1965===
* William D. Mathews from MIT found a vulnerability in a [http://osvdb.org/show/osvdb/23257 Multics CTSS running on a IBM 7094]. This flaw discloses the contents of the password file. The issue occurred when multiple instances of the system text editor were invoked, causing the editor to create temporary files with a constant name. This would inexplicably cause the contents of the system CTSS password file to display to any user logging into the system.

1965

    William D. Mathews from MIT found a vulnerability in a Multics CTSS running on a IBM 7094.This flaw discloses the contents of the password file. The issue occurred when multiple instances of the system text editor were invoked, causing the editor to create temporary files with a constant name. This would inexplicably cause the contents of the system CTSS password file to display to any user logging into the system.
Editing Timeline of computer security hacker history (section)
==1970s==
===1971===
* [[John Draper|John T. Draper]] (later nicknamed Captain Crunch), his friend [[Joybubbles|Joe Engressia]], and [[blue box]] [[phone phreaking]] hit the news with an [[Esquire Magazine]] feature story.David Price: [http://www.counterpunch.org/price06302008.html Blind Whistling Phreaks and the FBI's Historical Reliance on Phone Tap Criminality] [[CounterPunch]], June 30, 2008

1971

    John T. Draper (later nicknamed Captain Crunch), his friend Joe Engressia, and blue box phone phreaking hit the news with an Esquire Magazine feature story.
Editing Timeline of computer security hacker history (section)
==1980s==
===1981===
* [[Chaos Computer Club]] forms in Germany.

* '''The Warelords''' forms in The United States, founded by '''Black Bart''' (cracker of Dung Beetles in 1982) in St. Louis, Missouri, and was composed of many teenage hackers, phreakers, coders, and largely black hat-style underground computer geeks.  One of the more notable group members was '''Tennessee Tuxedo''', a young man that was instrumental with developing conference calls via the use of trunk line phreaking via the use of the Novation Apple Cat II that allowed them to share their current hacks, phreaking codes, and new software releases. Other notable members were The Apple Bandit, Krakowicz, and Krac-man.  Black Bart was clever at using his nationally known and very popular BBS system in order to promote the latest gaming software.  He used that relationship to his advantage, often shipping the original pre-released software to his most trusted code crackers during the beta-testing phase, weeks prior to their public release.  The Warelords often collaborated with other piracy groups at the time, such as The Syndicate and The Midwest Pirates Guild and developed an international ring of involved piracy groups that reached as far away as Japan.  Long before the movie War Games went into pre-production, The Warelords had successfully infiltrated such corporations and institutions as The White House, Southwestern Bell "Ma Bell" Mainframe Systems, and large corporate providers of voice mail systems.

===1982===
* [[The 414s]] break into 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's [[Memorial Sloan-Kettering Cancer Center]].[http://www.time.com/time/magazine/article/0,9171,949797-1,00.html The 414 Gang Strikes Again, Aug 29 1983, Time magazine] The incident appeared as the cover story of [[Newsweek]] with the title ''Beware: Hackers at play'',''Beware: Hackers at play'', Newsweek, September 5, 1983, pp. 42-46,48 possibly the first mass-media use of the term ''hacker'' in the context of computer security. As a result, the [[U.S. House of Representatives]] held hearings on computer security and passed several laws.David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.

===1983===
* The group [[P.H.I.R.M.|KILOBAUD]] is formed in February, kicking off a series of other hacker groups which form soon after.
* The movie ''[[WarGames]]'' introduces the wider public to the phenomenon of hacking and creates a degree of mass paranoia of hackers and their supposed abilities to bring the world to a screeching halt by launching nuclear [[ICBM]]s.
* The U.S. House of Representatives begins hearings on computer security hacking.{{cite news|publisher=Washington Post|url=http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26.html|year=2002|accessdate=2006-04-14|title=Timeline: The U.S. Government and Cybersecurity | date=May 16, 2003}}
* In his [[Turing Award]] lecture, [[Ken Thompson]] mentions "hacking" and describes a security exploit that he calls a "[[Trojan horse (computing)|Trojan horse]]".{{cite conference|first=Ken|last=Thompson|title=Reflections on Trusting Trust|booktitle=1983 Turing Award Lecture|publisher=[[Association for Computing Machinery|ACM]]|date=October 1983|url=http://www.acm.org/awards/article/a1983-thompson.pdf|format=[[PDF]]}}

===1984===
* Someone calling himself [[Lex Luthor]] founds the [[Legion of Doom (hacking)|Legion of Doom]]. Named after a Saturday morning cartoon, the LOD had the reputation of attracting "the best of the best" — until one of the most talented members called [[Phiber Optik]] feuded with Legion of Doomer [[Erik Bloodaxe (hacker)|Erik Bloodaxe]] and got 'tossed out of the clubhouse'. Phiber's friends formed a rival group, the [[Masters of Deception]].
* The [[Comprehensive Crime Control Act]] gives the Secret Service jurisdiction over [[computer fraud]].
* [[Cult of the Dead Cow]] forms in [[Lubbock, Texas]] and begins publishing its [[underground ezine|ezine]].
* The [[Hacker (computer security)|hacker]] magazine ''2600'' begins regular publication, right when [[Technical Assistance Program|TAP]] was putting out its final issue.  The editor of ''2600'', "[[Emmanuel Goldstein]]" (whose real name is [[Eric Gorden Corley|Eric Corley]]), takes his handle from the leader of the resistance in [[George Orwell]]'s 1984. The publication provides tips for would-be hackers and phone phreaks, as well as commentary on the hacker issues of the day. Today, copies of ''2600'' are sold at most large retail bookstores.
* The first [[Chaos Communication Congress]], the annual European hacker conference organized by the [[Chaos Computer Club]], is held in [[Hamburg]]
* [[William Gibson]]'s groundbreaking science fiction novel [[Neuromancer]], about ''Case'', a futuristic computer hacker, is published.  Considered the first major [[cyberpunk]] novel, it brought into hacker jargon such terms as "[[cyberspace]]", "the matrix", "simstim", and "[[Intrusion Countermeasures Electronics|ICE]]".

===1985===
* [[P.H.I.R.M.|KILOBAUD]] is re-organized into The [[P.H.I.R.M.]], and begins [[sysop]]ping hundreds of [[Bulletin board system|BBSs]] throughout the United States, Canada, and Europe.
* The online 'zine ''[[Phrack]]'' is established.
* ''[[The Hacker's Handbook]]'' is published in the UK.
* The FBI, Secret Service, Middlesex County NJ Prosecutor's Office and various local law enforcement agencies [http://www.scribd.com/doc/34933732/2600-The-Hacker-Quarterly-Volume-2-Number-8-August-1985 execute seven search warrants concurrently across New Jersey on July 12, 1985], seizing equipment from BBS operators and users alike for "complicity in computer theft", under a [http://nj-statute-info.com/getStatute.php?statute_id=1618 newly passed, and yet untested criminal statue].  This is famously known as the [http://www.artofhacking.com/tucops/etc/law/live/aoh_psbust.htm Private Sector Bust], or the [http://2600.wrepp.com/2600/article.php?i=128&a=1777 2600 BBS Seizure], and implicated the Private Sector BBS sysop, Store Manager (also a BBS sysop), Beowulf, Red Barchetta, The Vampire, the NJ Hack Shack BBS sysop, and the Treasure Chest BBS sysop.

===1986===
* After more and more break-ins to [[government]] and [[corporation|corporate]] computers, Congress passes the [[Computer Fraud and Abuse Act]], which makes it a crime to break into computer systems. The law, however, does not cover juveniles.
* [[Robert Schifreen]] and Stephen Gold are convicted of accessing the [[Telecom Gold]] account belonging to the [[Prince Philip, Duke of Edinburgh|Duke of Edinburgh]] under the [[Forgery and Counterfeiting Act 1981]] in the United Kingdom, the first conviction for illegally accessing a computer system. On appeal, the conviction is overturned as hacking is not within the legal definition of forgery.'Hacking' into Prestel is not a Forgery Act offence" (Law Report), The Times, 21 July 1987.
* Arrest of a hacker who calls himself [[The Mentor]]. He published a now-famous treatise shortly after his arrest that came to be known as the [[Hacker's Manifesto]] in the e-zine [[Phrack]].  This still serves as the most famous piece of hacker literature and is frequently used to illustrate the mindset of hackers.
* Astronomer [[Clifford Stoll]] plays a pivotal role in tracking down hacker [[Markus Hess]], events later covered in Stoll's 1990 book ''[[The Cuckoo's Egg (book)|The Cuckoo's Egg]]''.{{cite book
| title=The cuckoo's egg
| author=Cliff Stoll
| publisher=Doubleday
| location=New York
| year=1989
| isbn=0-370-31433-6 }}

===1987===
* [[Decoder magazine]] begins in Italy.
* The [[Christmas Tree EXEC]] "worm" causes major disruption to the [[VNET]], [[BITNET]] and [[European Academic Research Network|EARN]] networks.Burger, R.: "Computer viruses - a high tech disease", ''Abacus/Data Becker GmbH'' (1988), ISBN 1-55755-043-3

===1988===
* The ''[[Morris Worm]]''.  Graduate student [[Robert T. Morris, Jr.]] of [[Cornell University]] launches a worm on the government's [[ARPAnet]] (precursor to the Internet).Spafford, E.H.: "The Internet Worm Program: An Analysis", ''Purdue Technical Report CSD-TR-823'' (undated)Eichin, M.W. and Rochlis, J.A.: "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988", ''MIT''(1989)  The worm spreads to 6,000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years probation, and fined $10,000.
* [[First National Bank of Chicago]] is the victim of $70-million computer theft.
* The [[CERT Coordination Center|Computer Emergency Response Team]] (CERT) is created by [[DARPA]] to address [[network security]].
* The [[Father Christmas (computer worm)]] spreads over [[DECnet]] networks.

===1989===
* [[Jude Milhon]] (aka St Jude) and [[R. U. Sirius]] launch [[Mondo 2000]], a major '90s tech-lifestyle magazine, in [[Berkeley, California]].
* The politically motivated [[WANK (computer worm)|WANK worm]] spreads over [[DECnet]].
* Dutch magazine [[Hack-Tic]] begins.
* [[The Cuckoo's Egg]] by Clifford Stoll is published.

1932

    Polish cryptologists Marian Rejewski, Henryk Zygalski and Jerzy Różycki broke the Enigma machine code.
Editing Timeline of computer security hacker history (section)
===1939===
* [[Alan Turing]], [[Gordon Welchman]] and [[Harold Keen]] worked together to develop the [[Bombe]] (on the basis of Rejewski's works on [[Bomba (cryptography)|Bomba]]). The [[Enigma machine]]'s use of a reliably small key space makes it vulnerable to brute force and thus a violation of [http://cwe.mitre.org/data/definitions/326.html CWE-326].

1939

    Alan Turing, Gordon Welchman and Harold Keen worked together to develop the Bombe (on the basis of Rejewski's works on Bomba). The Enigma machine's use of a reliably small key space makes it vulnerable to brute force and thus a violation of CWE-326

Editing Timeline of computer security hacker history (section)
==1960s==
===1965===
* William D. Mathews from MIT found a vulnerability in a [http://osvdb.org/show/osvdb/23257 Multics CTSS running on a IBM 7094]. This flaw discloses the contents of the password file. The issue occurred when multiple instances of the system text editor were invoked, causing the editor to create temporary files with a constant name. This would inexplicably cause the contents of the system CTSS password file to display to any user logging into the system.

1965

    William D. Mathews from MIT found a vulnerability in a Multics CTSS running on a IBM 7094. This flaw discloses the contents of the password file. The issue occurred when multiple instances of the system text editor were invoked, causing the editor to create temporary files with a constant name. This would inexplicably cause the contents of the system CTSS password file to display to any user logging into the system.

Editing Timeline of computer security hacker history (section)
==1970s==
===1971===
* [[John Draper|John T. Draper]] (later nicknamed Captain Crunch), his friend [[Joybubbles|Joe Engressia]], and [[blue box]] [[phone phreaking]] hit the news with an [[Esquire Magazine]] feature story.David Price: [http://www.counterpunch.org/price06302008.html Blind Whistling Phreaks and the FBI's Historical Reliance on Phone Tap Criminality] [[CounterPunch]], June 30, 2008

1971

    John T. Draper (later nicknamed Captain Crunch), his friend Joe Engressia, and blue box phone phreaking hit the news with an Esquire Magazine feature story.
Editing Timeline of computer security hacker history (section)
==1980s==
===1981===
* [[Chaos Computer Club]] forms in Germany.

* '''The Warelords''' forms in The United States, founded by '''Black Bart''' (cracker of Dung Beetles in 1982) in St. Louis, Missouri, and was composed of many teenage hackers, phreakers, coders, and largely black hat-style underground computer geeks.  One of the more notable group members was '''Tennessee Tuxedo''', a young man that was instrumental with developing conference calls via the use of trunk line phreaking via the use of the Novation Apple Cat II that allowed them to share their current hacks, phreaking codes, and new software releases. Other notable members were The Apple Bandit, Krakowicz, and Krac-man.  Black Bart was clever at using his nationally known and very popular BBS system in order to promote the latest gaming software.  He used that relationship to his advantage, often shipping the original pre-released software to his most trusted code crackers during the beta-testing phase, weeks prior to their public release.  The Warelords often collaborated with other piracy groups at the time, such as The Syndicate and The Midwest Pirates Guild and developed an international ring of involved piracy groups that reached as far away as Japan.  Long before the movie War Games went into pre-production, The Warelords had successfully infiltrated such corporations and institutions as The White House, Southwestern Bell "Ma Bell" Mainframe Systems, and large corporate providers of voice mail systems.

===1982===
* [[The 414s]] break into 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's [[Memorial Sloan-Kettering Cancer Center]].[http://www.time.com/time/magazine/article/0,9171,949797-1,00.html The 414 Gang Strikes Again, Aug 29 1983, Time magazine] The incident appeared as the cover story of [[Newsweek]] with the title ''Beware: Hackers at play'',''Beware: Hackers at play'', Newsweek, September 5, 1983, pp. 42-46,48 possibly the first mass-media use of the term ''hacker'' in the context of computer security. As a result, the [[U.S. House of Representatives]] held hearings on computer security and passed several laws.David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.

===1983===
* The group [[P.H.I.R.M.|KILOBAUD]] is formed in February, kicking off a series of other hacker groups which form soon after.
* The movie ''[[WarGames]]'' introduces the wider public to the phenomenon of hacking and creates a degree of mass paranoia of hackers and their supposed abilities to bring the world to a screeching halt by launching nuclear [[ICBM]]s.
* The U.S. House of Representatives begins hearings on computer security hacking.{{cite news|publisher=Washington Post|url=http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26.html|year=2002|accessdate=2006-04-14|title=Timeline: The U.S. Government and Cybersecurity | date=May 16, 2003}}
* In his [[Turing Award]] lecture, [[Ken Thompson]] mentions "hacking" and describes a security exploit that he calls a "[[Trojan horse (computing)|Trojan horse]]".{{cite conference|first=Ken|last=Thompson|title=Reflections on Trusting Trust|booktitle=1983 Turing Award Lecture|publisher=[[Association for Computing Machinery|ACM]]|date=October 1983|url=http://www.acm.org/awards/article/a1983-thompson.pdf|format=[[PDF]]}}

===1984===
* Someone calling himself [[Lex Luthor]] founds the [[Legion of Doom (hacking)|Legion of Doom]]. Named after a Saturday morning cartoon, the LOD had the reputation of attracting "the best of the best" — until one of the most talented members called [[Phiber Optik]] feuded with Legion of Doomer [[Erik Bloodaxe (hacker)|Erik Bloodaxe]] and got 'tossed out of the clubhouse'. Phiber's friends formed a rival group, the [[Masters of Deception]].
* The [[Comprehensive Crime Control Act]] gives the Secret Service jurisdiction over [[computer fraud]].
* [[Cult of the Dead Cow]] forms in [[Lubbock, Texas]] and begins publishing its [[underground ezine|ezine]].
* The [[Hacker (computer security)|hacker]] magazine ''2600'' begins regular publication, right when [[Technical Assistance Program|TAP]] was putting out its final issue.  The editor of ''2600'', "[[Emmanuel Goldstein]]" (whose real name is [[Eric Gorden Corley|Eric Corley]]), takes his handle from the leader of the resistance in [[George Orwell]]'s 1984. The publication provides tips for would-be hackers and phone phreaks, as well as commentary on the hacker issues of the day. Today, copies of ''2600'' are sold at most large retail bookstores.
* The first [[Chaos Communication Congress]], the annual European hacker conference organized by the [[Chaos Computer Club]], is held in [[Hamburg]]
* [[William Gibson]]'s groundbreaking science fiction novel [[Neuromancer]], about ''Case'', a futuristic computer hacker, is published.  Considered the first major [[cyberpunk]] novel, it brought into hacker jargon such terms as "[[cyberspace]]", "the matrix", "simstim", and "[[Intrusion Countermeasures Electronics|ICE]]".

===1985===
* [[P.H.I.R.M.|KILOBAUD]] is re-organized into The [[P.H.I.R.M.]], and begins [[sysop]]ping hundreds of [[Bulletin board system|BBSs]] throughout the United States, Canada, and Europe.
* The online 'zine ''[[Phrack]]'' is established.
* ''[[The Hacker's Handbook]]'' is published in the UK.
* The FBI, Secret Service, Middlesex County NJ Prosecutor's Office and various local law enforcement agencies [http://www.scribd.com/doc/34933732/2600-The-Hacker-Quarterly-Volume-2-Number-8-August-1985 execute seven search warrants concurrently across New Jersey on July 12, 1985], seizing equipment from BBS operators and users alike for "complicity in computer theft", under a [http://nj-statute-info.com/getStatute.php?statute_id=1618 newly passed, and yet untested criminal statue].  This is famously known as the [http://www.artofhacking.com/tucops/etc/law/live/aoh_psbust.htm Private Sector Bust], or the [http://2600.wrepp.com/2600/article.php?i=128&a=1777 2600 BBS Seizure], and implicated the Private Sector BBS sysop, Store Manager (also a BBS sysop), Beowulf, Red Barchetta, The Vampire, the NJ Hack Shack BBS sysop, and the Treasure Chest BBS sysop.

===1986===
* After more and more break-ins to [[government]] and [[corporation|corporate]] computers, Congress passes the [[Computer Fraud and Abuse Act]], which makes it a crime to break into computer systems. The law, however, does not cover juveniles.
* [[Robert Schifreen]] and Stephen Gold are convicted of accessing the [[Telecom Gold]] account belonging to the [[Prince Philip, Duke of Edinburgh|Duke of Edinburgh]] under the [[Forgery and Counterfeiting Act 1981]] in the United Kingdom, the first conviction for illegally accessing a computer system. On appeal, the conviction is overturned as hacking is not within the legal definition of forgery.'Hacking' into Prestel is not a Forgery Act offence" (Law Report), The Times, 21 July 1987.
* Arrest of a hacker who calls himself [[The Mentor]]. He published a now-famous treatise shortly after his arrest that came to be known as the [[Hacker's Manifesto]] in the e-zine [[Phrack]].  This still serves as the most famous piece of hacker literature and is frequently used to illustrate the mindset of hackers.
* Astronomer [[Clifford Stoll]] plays a pivotal role in tracking down hacker [[Markus Hess]], events later covered in Stoll's 1990 book ''[[The Cuckoo's Egg (book)|The Cuckoo's Egg]]''.{{cite book
| title=The cuckoo's egg
| author=Cliff Stoll
| publisher=Doubleday
| location=New York
| year=1989
| isbn=0-370-31433-6 }}

===1987===
* [[Decoder magazine]] begins in Italy.
* The [[Christmas Tree EXEC]] "worm" causes major disruption to the [[VNET]], [[BITNET]] and [[European Academic Research Network|EARN]] networks.Burger, R.: "Computer viruses - a high tech disease", ''Abacus/Data Becker GmbH'' (1988), ISBN 1-55755-043-3

===1988===
* The ''[[Morris Worm]]''.  Graduate student [[Robert T. Morris, Jr.]] of [[Cornell University]] launches a worm on the government's [[ARPAnet]] (precursor to the Internet).Spafford, E.H.: "The Internet Worm Program: An Analysis", ''Purdue Technical Report CSD-TR-823'' (undated)Eichin, M.W. and Rochlis, J.A.: "With Microscope and Tweezers: An Analysis of the Internet Virus of November 1988", ''MIT''(1989)  The worm spreads to 6,000 networked computers, clogging government and university systems. Morris is dismissed from Cornell, sentenced to three years probation, and fined $10,000.
* [[First National Bank of Chicago]] is the victim of $70-million computer theft.
* The [[CERT Coordination Center|Computer Emergency Response Team]] (CERT) is created by [[DARPA]] to address [[network security]].
* The [[Father Christmas (computer worm)]] spreads over [[DECnet]] networks.

===1989===
* [[Jude Milhon]] (aka St Jude) and [[R. U. Sirius]] launch [[Mondo 2000]], a major '90s tech-lifestyle magazine, in [[Berkeley, California]].
* The politically motivated [[WANK (computer worm)|WANK worm]] spreads over [[DECnet]].
* Dutch magazine [[Hack-Tic]] begins.
* [[The Cuckoo's Egg]] by Clifford Stoll is published.

1981

    Chaos Computer Club forms in Germany.

    The Warelords forms in The United States, founded by Black Bart (cracker of Dung Beetles in 1982) in St. Louis, Missouri, and was composed of many teenage hackers, phreakers, coders, and largely black hat-style underground computer geeks. One of the more notable group members was Tennessee Tuxedo, a young man that was instrumental with developing conference calls via the use of trunk line phreaking via the use of the Novation Apple Cat II that allowed them to share their current hacks, phreaking codes, and new software releases. Other notable members were The Apple Bandit, Krakowicz, and Krac-man. Black Bart was clever at using his nationally known and very popular BBS system in order to promote the latest gaming software. He used that relationship to his advantage, often shipping the original pre-released software to his most trusted code crackers during the beta-testing phase, weeks prior to their public release. The Warelords often collaborated with other piracy groups at the time, such as The Syndicate and The Midwest Pirates Guild and developed an international ring of involved piracy groups that reached as far away as Japan. Long before the movie War Games went into pre-production, The Warelords had successfully infiltrated such corporations and institutions as The White House, Southwestern Bell "Ma Bell" Mainframe Systems, and large corporate providers of voice mail systems.
Editing Timeline of computer security hacker history (section)
===1982===
* [[The 414s]] break into 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's [[Memorial Sloan-Kettering Cancer Center]].[http://www.time.com/time/magazine/article/0,9171,949797-1,00.html The 414 Gang Strikes Again, Aug 29 1983, Time magazine] The incident appeared as the cover story of [[Newsweek]] with the title ''Beware: Hackers at play'',''Beware: Hackers at play'', Newsweek, September 5, 1983, pp. 42-46,48 possibly the first mass-media use of the term ''hacker'' in the context of computer security. As a result, the [[U.S. House of Representatives]] held hearings on computer security and passed several laws.David Bailey, "Attacks on Computers: Congressional Hearings and Pending Legislation," sp, p. 180, 1984 IEEE Symposium on Security and Privacy, 1984.

1982

    The 414s break into 60 computer systems at institutions ranging from the Los Alamos Laboratories to Manhattan's Memorial Sloan-Kettering Cancer Center.] The incident appeared as the cover story of Newsweek with the title Beware: Hackers at play, possibly the first mass-media use of the term hacker in the context of computer security. As a result, the U.S. House of Representatives held hearings on computer security and passed several laws.
Editing Timeline of computer security hacker history (section)
===1983===
* The group [[P.H.I.R.M.|KILOBAUD]] is formed in February, kicking off a series of other hacker groups which form soon after.
* The movie ''[[WarGames]]'' introduces the wider public to the phenomenon of hacking and creates a degree of mass paranoia of hackers and their supposed abilities to bring the world to a screeching halt by launching nuclear [[ICBM]]s.
* The U.S. House of Representatives begins hearings on computer security hacking.{{cite news|publisher=Washington Post|url=http://www.washingtonpost.com/wp-dyn/articles/A50606-2002Jun26.html|year=2002|accessdate=2006-04-14|title=Timeline: The U.S. Government and Cybersecurity | date=May 16, 2003}}
* In his [[Turing Award]] lecture, [[Ken Thompson]] mentions "hacking" and describes a security exploit that he calls a "[[Trojan horse (computing)|Trojan horse]]".{{cite conference|first=Ken|last=Thompson|title=Reflections on Trusting Trust|booktitle=1983 Turing Award Lecture|publisher=[[Association for Computing Machinery|ACM]]|date=October 1983|url=http://www.acm.org/awards/article/a1983-thompson.pdf|format=[[PDF]]}}