Jesse Tuttle (also known as Hackah Jak) is an American tech consultant, Speaker, software engineer, and hacker, who is a former member of the hacking groups Hackweiser, Project China, and The Dispatchers.[1][2]
In 2000, Tuttle adopted the name "Hackah Jak"[3][4] and joined the group Hackweiser, where he served as a website defacer[5][6] and exploit developer [7] for the hacking group from 2000 to 2003.
Project China
In April 2001, Tuttle interviewed with the South China Morning Post[1][2] after a U.S. Navy intelligence aircraft collided in mid-air with a Chinese interceptor fighter jet resulting in an international incident [8][9] that unfolded to become a global decentralized hacktivist[1][2] movement. The cyber incident was referred to as "The First World Hacker War" by the New York Times.[10] This cyber incident resulted in the release of the Code Red virus [11] that infected about a million servers and resulted in more than 2 billion dollars in damages.[1][2]
Pentesting federal systems
In May 2001, the FBI raided Tuttle's residence for hacking a financial firm,[12] which led to him performing pentesting work for federal authorities.[3][13][14][15]
Tuttle's stated mission was the disruption of Osama bin Laden’s network, Al-Qaeda, and the collection of intelligence to benefit US counter-terrorism operations.[19]
The Dispatchers was a decentralized group of hacktivists and was described as "having groups working on different projects",[19] a similar organizational framework later used by the hacker collective known as Anonymous.[24]
Tool developer
Tools developed by Tuttle have been utilized by both hackers and forensic teams associated with the Federal Bureau of Investigation (FBI) and the National Infrastructure Protection Center (NIPC) in investigations of compromised US military systems.[7]
Investigated by Department of Defense
In 2002, the Department of Defense investigated Tuttle for hacking U.S. Military systems as part of his work for federal authorities.[3][4]
Legal Battle: 2003 – 2007
Early in 2003, the FBI enlisted his help on a human trafficking case involving a child sex trafficking ring.[3][12] In May 2003, local police arrested Tuttle on charges of hacking Hamilton County Ohio Government Computer Systems, which he denies.[3][25]
In June 2003, Tuttle was indicted on 16 felony charges, six counts of unauthorized use of government property, ten counts of possessing sexually oriented material involving a minor, and faced 86 years in prison.[26][27] These allegations arose from accusations that Tuttle hacked into the Hamilton County government and Sheriff's computer systems.
During the proceedings, the evidence against Tuttle was scrutinized. Judge Thomas Crush went on the record and said "he had no proof that Tuttle had done anything wrong..."[27]
In August 2003, Tuttle was placed on pre-trial electronic monitoring house arrest to prevent him from attending a conference in Las Vegas.[27][28] By July 2005, reports indicated that investigative errors and questionable legal procedures had delayed his trial.[29][12] Later in 2007, it was reported that Tuttle had spent more than four years on pre-trial house arrest.[30][31]
FBI Collaboration and Defense
FBI Agents and Federal Prosecutors met behind closed doors with Judge Thomas Crush, the judge presiding over Tuttle's case. Court records and other sources also revealed he had been working with the FBI since 2001.[15] This cooperation, initiated in the wake of the September 11 attacks,[13][14] aimed to safeguard sensitive computer systems against cyber threats.
Through court filings and the recording of Tuttle's interrogation, it was disclosed that Tuttle was also working with the FBI and Assistant U.S. Attorney's Office to bring down a human trafficking network.[12]
In 2003 Hamilton County Prosecutors accused Tuttle of being "delusional" and deny claims that Tuttle had any connections with the FBI.[27]
In 2007, Hamilton County Prosecutors acknowledged for the first time that Tuttle had deep connections within the FBI and that Tuttle worked for the FBI however insisted that doesn't give Tuttle permission to break the law.[30][31]
In 2016, Michael German, a former undercover FBI agent reviewed details about Tuttle's case and said in an interview "The program (Confidential Human Source Program) is a matter of making sure that the illegal activity an informant is involved in is actually authorized". He went on to say "It’s not that we’re ignoring these crimes; it’s that we’re letting the informant engage in the criminal activity for the purpose of furthering our investigation". "If I’m committing this activity that would otherwise be criminal, but I’m not doing it for a criminal purpose, I’m doing it for a law enforcement purpose, it really isn’t criminal activity after all".[32]
Mentions in Books
The following books contain references to Tuttle under the alias of Hackah Jak.
Michael Hall and Brian Proffitt, The Joy of Linux: A Gourmet Guide to Open Source, 2001, Prima Publishing. (Page 142) [33]
Paul Price, Ashley S. Timmer, Craig J. Calhoun, Understanding September 11, 2002, New Press. (Page 191) [34]
Michael E. Whitman and Herbert J. Mattord, Principles of Information Security, 2003, Thomson Course Technology. (Page 492) [35]
Dorian J. Cougias, E.L. Heiberger, and Karsten Koop, The Backup Book: Disaster Recovery from Desktop to Data Center, 2003, Schaser-Vartan Books. (Page 246) [36]
Michael E. Brown, Grave New World: Security Challenges in the 21st Century, 2003, Georgetown University Press. (Page 96) [37]
Nitrozac and Snaggy, The Best of The Joy of Tech, 2004, O'Reilly. (Page 49) [38]
Thomas J. Holt and Bernadette H. Schell, Corporate Hacking and Technology-Driven Crime: Social Dynamics and Implications, 2011, Business Science Reference. (Page 179) [39]
Various, Proceedings of the 10th European Conference on Information Warfare and Security, 2011, Academic Publishing Limited. (Pages 12) [40]
Srinidhi Ravi, Hackers that shook the world!, 2012, Asian School of Cyber Laws. (Page 126) [41]
"This is the 21st century, the world of technology belongs to us (hackers)." – Jesse Tuttle, September 19, 2001 [16]
"It's known that a country, even a Third World country, relies on computers and Internet access to get bank transactions and government work done, and if you cripple the Net in that country, that will cripple them (banks and government) as well." – Jesse Tuttle, September 19, 2001 [16]
"I can in minutes code a scanner to scan the Internet for 2-year-old known vulnerabilities, I've hit a lot of workstations this way and then worked my way through the network to the server." – Jesse Tuttle, July 22, 2002 [54]
“Do you shop online? E-mail? Chat? Would you like people to know what your e-mail says, what your chat conversations say? Your bank account numbers or credit card numbers? If not, invest in security for a computer.” - Jesse Tuttle, May 31, 2003 [1][2]
↑ Denning, Dorothy E. (2001-11-01). "Is Cyber Terror Next?". Social Science Research Council. Archived from the original on 2021-04-13. Retrieved 2024-02-12.
↑ Various (2011). Proceedings of the 10th European Conference on Information Warfare and Security. Reading, UK: Academic Publishing Limited. p.12. ISBN978-1-908272-07-2.
↑ Ravi, Srinidhi (2012). Hackers that shook the world!. Pune, India: Asian School of Cyber Laws. p.126.
This page is based on this Wikipedia article Text is available under the CC BY-SA 4.0 license; additional terms may apply. Images, videos and audio are available under their respective licenses.