Hacking Cases Before 2017
In the last article, the history of the earliest use of the word Hacking in the field of technology was told as far as I can remember.
👉👉👉👉👉 If you want to read, click here to read 👈👈👈👈👈👈
As far as I know, since 2015, more and more people are interested in hacking in Myanmar.
So, this time, we will describe some hacking events from 2017 to the previous years that are still little known
1878
Early telephone calls
Back in the day, making telephone calls wasn't as easy as it is now. Those who are familiar with the communication system known as Auto exchange, which was found in Burma until 2010-11, can communicate with rural areas. It is a system where employees use switchboards to connect communication between customers.
(You can see it in the picture below.)
The earliest incident started with a company called the Bell, which employed teenage employees. After the group of teenage boys learned how these systems worked, they began to block the phones and make them reach others without reaching the person they wanted to call. Because of this incident, all the teenage boys were fired. Because they've done it over and over again. That was in 1878, two years after Alexander Graham Bell received the first US patent for the telephone.
It is an event that has been included in hacking history because it is consistent with the nature of hacking.
1903
Wireless telegraphy
In the late 19th century, electromagnetic waves were discovered. That is what led to the first incident of actual hacking. This is how it happened. It was hacked in 1903 by Nevil Maskelyne, a wireless enthusiast. The discovery of electromagnetic waves led to wireless telegraphy. An Italian scientist named Guglielmo Marconi invented wireless telegraphy in 1895. There is someone who worked for Marconi. John Ambrose Fleming was an English electrical engineer and physicist. In 1903, John Ambrose Fleming performed the first public demonstration of Marconi's "safe wireless telegraphy". That's when Nevil Maskelyne interrupted John Ambrose Fleming by sending Morse code messages.
Shortly after the affair, Fleming himself asked the readers of the Times to cover up the troublemaker (as he used the term 'scientific vandal') responsible for the incident. Interesting and respectable. What is more interesting is that Nevil Maskelyne himself made a reply and came back saying that the evidence was only to point out the Vulnerability (weakness) of the wireless telegraphy system. Since they are respectable people, I have attached their WiKi link below. Those who want to read about them can click on the link. Let's move on to the next event.
Guglielmo Marconi https://en.wikipedia.org/wiki/Guglielmo_Marconi
Ambrose Fleming https://en.wikipedia.org/wiki/John_Ambrose_Fleming
Nevil Maskelyne
https://en.wikipedia.org/wiki/Nevil_Maskelyne_(magician)
1939-1945
Military Codebreaking
Fig: Colossus machine
In the past, there were many methods of sending information, and when these methods were not safe, encryption systems called ciphers developed to prevent interception and readability. During World War II, special operations were conducted to uncover the encryption systems used by the Axis Powers. They did the most at Bletchley Park in the UK. Most famously, in 1939, the Bombe, an electronic device that could decipher the German Enigma-machine-encrypt code, was invented. In addition, they were able to identify the Lorenz Cypher system used by German high-level military intelligence. And they were able to develop the world's first programmable electronic computer (named Colossus) that used thermionic vulves to perform boolean and counting operations.
Wiki link about Colossus ==> https://en.wikipedia.org/wiki/Colossus_computer
About secret messages during World War II -- Wiki Link ==>
https://en.wikipedia.org/wiki/World_War_II_cryptography
1957-1980
Phone Phreaking
In the late 1950s, people called Phone Hacker (Phone Phreakers) became fashionable in America. They listened to the tones emitted by the phones in order to identify the routes of the calls. What was different was a blind boy named Joe Engressia who was only 7 years old. He heard a high-pitched tone from a telephone line in 1957. And it made a whistling sound with a frequency of exactly 2600Hz. That was the exact frequency needed to communicate with the phone lines. Phreakers, including John Draper, known as Captain Crunch (due to the use of crackers in Cap'n Crunch food cans); Apple founders Steve Wonzniak and Steve Jobs began building blue boxes in 1975, electronic devices that communicate with phone lines. They are Phreakers too.
Wiki Link ==> https://en.wikipedia.org/wiki/Phreaking
1970-1995
Kevin Mitnick
In the late 1950s, people called Phone Hacker (Phone Phreakers) became fashionable in America. They listened to the tones emitted by the phones in order to identify the routes of the calls. What was different was a blind boy named Joe Engressia who was only 7 years old. He heard a high-pitched tone from a telephone line in 1957. And it made a whistling sound with a frequency of exactly 2600Hz. That was the exact frequency needed to communicate with the phone lines. Phreakers, including John Draper, known as Captain Crunch (due to the use of crackers in Cap'n Crunch food cans); Apple founders Steve Wonzniak and Steve Jobs began building blue boxes in 1975, electronic devices that communicate with phone lines. They are Phreakers too.
Wiki Link ==> https://en.wikipedia.org/wiki/Kevin_Mitnick
1988
The Morris Worm
In 1988, Robert Morris, a graduate student at Cornell University, created what became known as the first worm on the Internet. I just wanted to know that the creator is still a student at MIT, so I launched it from a computer at MIT. When he first posted it, he posted it as a harmless bug. However, there was a bug in the spreading method of the worm, and it caused unexpected DoS attacks. The spread of the infection was much faster than expected, so it became very contagious and very bad. Since he already understood the issue, he tried to fix it by telling the developers how to kill it, but it was too late, so he found out who created it. Thus, Morris is listed as the first person to be sentenced under the Computer Fraud and Abuse Act.
Wiki link ==> https://en.wikipedia.org/wiki/Morris_worm
1988-1991
Kevin Poulsen
Dark Dante (attacker name) Kevin Poulsen is a really talented and versatile teenager. He has also been in prison since he was a teenager. Later, he was recruited and trained by the Research Institute SRI International, but he did not become a good person and continued to operate underground. After breaking into a telephone company and finding an unpaid bill in a storage locker, he was tracked down. Through that, 1 blank birth certificate, Along with the fake IDs, photos of Poulsen were discovered and his actions and exploits began to leak.
That was in 1988. He managed to escape and was recaptured around April 1991. Among his attacks, the most famous was the hijacking of the phone lines of a Los Angeles radio station. The phone lines went down so badly that it was even featured on NBC's Unsolved Mysteries.
Wiki link ==> https://en.wikipedia.org/wiki/Kevin_Poulsen
1994
Datastream Cowboy and Kuji
Kuji
Kuji (Wiki link) ==> https://en.wikipedia.org/wiki/Mathew_Bevan
Datastream Cowboy (no Wiki Link)
https://www.soldierx.com/hdb/Datastream-Cowboy
2001-2002
Gary McKinnon
He is the one who can easily find Burmese texts and pictures with Burmese background sound and videos on Facebook. Between February 2001 and February 2002, he hacked 97 computers belonging to the US military and NASA. In addition, the US military's military district network in Washington shut down about 2,000 computers for 24 hours and deleted some important files. He hacked the US military's website and even posted a warning saying "Your security is crap". He did these under the pseudonym solo and from his girlfriend's aunt's house. The United States spent about $700,000 to find out what he had done and to fix it. His full story can be found on Wiki.
Wiki link ==> https://en.wikipedia.org/wiki/Gary_McKinnon
2010
The Stuxnet worm
The Stuxnet Worm, which was first discovered in 2010, is different from previous viruses and is very serious. The Stuxnet worm is even called the world's first digital weapon. Because it is designed to cause physical damage to equipment controlled by computers. This is the first case where hackers physically damage equipment in the real world, and it's more complicated and more terrifying. This was noticed after the unexpected breakdown of several uranium sensors at nuclear power plants in Iran. The Stuxnet Worm infected at least 200,000 computers and damaged about 1,000. You can read the details on Wikipedia.
https://en.wikipedia.org/wiki/Stuxnet
2011-2012
LulzSec
Since the era of social media has improved, hacking related things are seen on social media, and hackers also show the things they have hacked on social media platforms in order to get people's attention. Including LulzSec. They hack websites and post on Twitter to embarrass website owners. More than 250 public and private organizations have been targeted, including the 2011 fox.com attack. Including the attack on Sony's PlayStation network. In the Sony attack, the information of 24.6 million customers was stolen. It was so bad that Sony had to shut down its network for 23 days. The FBI later tracked down LulzSec co-founder Hector Xavier Monsegur in 2012 and obtained the personal information of other members from him. As a result, 5 members were arrested in the UK and Ireland.
Wiki link ==> https://en.wikipedia.org/wiki/LulzSec
2016
DNC email leak
Hack & leak တွေသည် လူထုရဲ့ ထင်မြင်ယူဆချက်တွေကိုပါ သက်ရောက်မှုရှိကြောင်း ၂၀၁၆ အမေရိကန်သမ္မတရွေးကောက်ပွဲက သက်သေပြခဲ့သလို ရှိပါတယ်။ ၂၀၁၆ ဇူလိုင်လမှာ ဒီမိုကရက်တစ်အမျိုးသားလွှတ်တော်ကော်မတီတွေရဲ့ email တွေ အများကြီး ပေါက်ကြားခဲ့ပြီး WikiLeaks ကလည်း ဖော်ထုတ်ဖောက်ချခဲ့ပါတယ်။ ၁၉၂၅၂ စောင်သော email တွေနဲ့ 8034 attachment တွေစသည်ဖြင့် ပေါက်ကြားခဲ့ပြီး ပါတီအကြီးတန်းအရာရှိတွေက သူတို့ဘက်က သမ္မတလောင်းကို Barnie Sanders ထက် Hillary Clinton ကို မျက်နှာသာပေးဖွယ်ရှိတဲ့လို့ ပေါက်ကြားခဲ့ပါတယ်။ တကယ်လည်း ဖြစ်လာခဲ့ပါတယ်။ ဒါတွေကလည်း ပြိုင်ဘက် Donal Trump ကို အနည်းငယ် ပိုပြီးအသာရစေခဲ့တယ်လို့ ဆိုနိုင်ပါတယ်။
email leak အကြောင်း Wiki link
==> https://en.wikipedia.org/wiki/2016_Democratic_National_Committee_email_leak
WikiLeaks အကြောင်း Wiki Link (မြန်မာလို Wiki link ဖြစ်လို့ ဒီ post ထဲမှာ သီးသန့် ထည့်မရေးတော့ပါဘူးဗျ) သွားဖတ်ကြည့်ကြပါ။
==> https://my.wikipedia.org/wiki/WikiLeaks
References:
Special thanks to all those who read and encourage.
Thank you even more to those who read without using ad block.
Another upcoming topic will be a compilation of cases where millions of user accounts were hacked at the same time, including Yahoo, so I invite you to come and visit the blog.
0 Comments