Kane Gamble

Last updated

Kane Gamble or known online as Cracka (born October 2, 1999) is a British hacker from Coalville, Leicester, member of the team Crackas With Attitude (CWA) who hacked the email and phone accounts of several US government officials (including the former CIA chief John Brennan, the former director of national intelligence James Clapper, the former deputy director of the FBI, Mark Giuliano, Obama's deputy national security adviser, Avril Haines). [1] [2] [3] [4] [5] [6] [7] [8] Gamble was 15 years old at the time. [9] He accessed “extremely sensitive” documents referring to operations (military and intelligence) in Iraq and Afghanistan. [10] [11] Some of the information obtained were posted on Wikileaks and others websites. [12] He pleaded guilty to 10 charges and was sentenced to two years in a youth detention centre. [13]

Related Research Articles

<span class="mw-page-title-main">Hacktivism</span> Computer-based activities as a means of protest

Internet activism, hacktivism, or hactivism, is the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change. With roots in hacker culture and hacker ethics, its ends are often related to free speech, human rights, or freedom of information movements.

Cyberterrorism is the use of the Internet to conduct violent acts that result in, or threaten, the loss of life or significant bodily harm, in order to achieve political or ideological gains through threat or intimidation. Emerging alongside the development of information technology, cyberterrorism involves acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet by means of tools such as computer viruses, computer worms, phishing, malicious software, hardware methods, and programming scripts can all be forms of internet terrorism. Some authors opt for a very narrow definition of cyberterrorism, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.

A security hacker or security researcher is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.

globalHell was an American hacker group. They were one of the first hacking groups who gained notoriety for website defacements and breaches. The combined losses caused by the group were estimated to be ranged between $1.5m and $2.5m. The group was called a "cyber gang" as it had many of the same characteristics of a gang and carried out the same activities as a gang, including trafficking in stolen credit card numbers.

<span class="mw-page-title-main">John Brennan (CIA officer)</span> Director of the Central Intelligence Agency from 2013 to 2017

John Owen Brennan is a former American intelligence officer who served as the Director of the Central Intelligence Agency (CIA) from March 2013 to January 2017. He served as chief counterterrorism advisor to U.S. President Barack Obama, with the title Deputy National Security Advisor for Homeland Security and Counterterrorism, and Assistant to the President. Previously, he advised Obama on foreign policy and intelligence issues during the 2008 election campaign and presidential transition.

<span class="mw-page-title-main">Sextortion</span> Non-physical forms of coercion to extort sexual favors from the victim

Sextortion employs non-physical forms of coercion to extort sexual favors from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion, as well as to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion.

<span class="mw-page-title-main">Chinese espionage in the United States</span>

The United States has often accused the People's Republic of China of attempting to unlawfully acquire U.S. military technology and classified information as well as trade secrets of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology, including espionage, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include Larry Wu-tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak, Peter Lee, and Shujun Wang. The Ministry of State Security (MSS) maintains a bureau dedicated to espionage against the United States, the United States Bureau.

Russian espionage in the United States has occurred since at least the Cold War, and likely well before. According to the United States government, by 2007 it had reached Cold War levels.

Cyberwarfare by China is the aggregate of cyberattacks attributed to the organs of the People's Republic of China and various related advanced persistent threat (APT) groups.

<span class="mw-page-title-main">Tailored Access Operations</span> Unit of the U.S. National Security Agency

The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.

Blackshades is a malicious trojan horse used by hackers to control infected computers remotely. The malware targets computers using operating systems based on Microsoft Windows. According to US officials, over 500,000 computer systems have been infected worldwide with the software.

<span class="mw-page-title-main">Islamic State Hacking Division</span>

The Islamic State Hacking Division (ISHD) or The United Cyber Caliphate(UCC) is a merger of several hacker groups self-identifying as the digital army for the Islamic State of Iraq and Levant (ISIS/ISIL). The unified organization comprises at least four distinct groups, including the Ghost Caliphate Section, Sons Caliphate Army (SCA), Caliphate Cyber Army (CCA), and the Kalashnikov E-Security Team. Other groups potentially involved with the United Cyber Caliphate are the Pro-ISIS Media group Rabitat Al-Ansar (League of Supporters) and the Islamic Cyber Army (ICA). Evidence does not support the direct involvement of the Islamic State leadership. It suggests external and independent coordination of Pro-ISIS cyber campaigns under the United Cyber Caliphate(UCC) name. Investigations also display alleged links to Russian Intelligence group, APT28, using the name as a guise to wage war against western nations.

The Democratic National Committee cyber attacks took place in 2015 and 2016, in which two groups of Russian computer hackers infiltrated the Democratic National Committee (DNC) computer network, leading to a data breach. Cybersecurity experts, as well as the U.S. government, determined that the cyberespionage was the work of Russian intelligence agencies.

<span class="mw-page-title-main">Russian interference in the 2016 United States elections</span>

The Russian government conducted foreign electoral interference in the 2016 United States elections with the goals of sabotaging the presidential campaign of Hillary Clinton, boosting the presidential campaign of Donald Trump, and increasing political and social discord in the United States. According to the U.S. intelligence community, the operation—code named Project Lakhta—was ordered directly by Russian president Vladimir Putin. The "hacking and disinformation campaign" to damage Clinton and help Trump became the "core of the scandal known as Russiagate". The 448-page Mueller Report, made public in April 2019, examined over 200 contacts between the Trump campaign and Russian officials but concluded that there was insufficient evidence to bring any conspiracy or coordination charges against Trump or his associates.

<span class="mw-page-title-main">Vault 7</span> CIA files on cyber war and surveillance

Vault 7 is a series of documents that WikiLeaks began to publish on 7 March 2017, detailing the activities and capabilities of the United States Central Intelligence Agency (CIA) to perform electronic surveillance and cyber warfare. The files, dating from 2013 to 2016, include details on the agency's software capabilities, such as the ability to compromise cars, smart TVs, web browsers including Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera, the operating systems of most smartphones including Apple's iOS and Google's Android, and computer operating systems including Microsoft Windows, macOS, and Linux. A CIA internal audit identified 91 malware tools out of more than 500 tools in use in 2016 being compromised by the release. The tools were developed by the Operations Support Branch of the CIA.

<span class="mw-page-title-main">Josh Campbell (journalist)</span>

Josh Campbell is an American correspondent with CNN, former U.S. intelligence community official, and military veteran. He serves as an adjunct senior fellow and national security policy researcher with the Center for a New American Security.

DarkMatter Group is a computer security company founded in the United Arab Emirates (UAE) in 2014 or 2015. The company has described itself as a purely defensive company, however in 2016, it became a contractor for Project Raven, to help the UAE surveil other governments, militants, and human rights activists. It has employed former U.S. intelligence operatives and graduates of the Israel Defense Force technology units.

<span class="mw-page-title-main">Project Insecurity</span> Defunct computer security organization

Project Insecurity was a computer security organization founded in 2018 by Matthew Telfer focusing on educational resources, vulnerability identification and remediation, and exploit development.

Lapsus$, stylised as LAPSUS$ and classified by Microsoft as Strawberry Tempest, is an international extortion-focused hacker group known for its various cyberattacks against companies and government agencies. The group was active in several countries, and has had its members arrested in Brazil and the UK in 2022. According to City of London Police at least two of the members were teenagers.

References

  1. "What It's Like for a Hacker to Get Back Online After a Two-Year Internet Ban". VICE. 2020-08-24. Retrieved 2024-12-08.
  2. Paganini, Pierluigi (2018-04-21). "UK Teenager Kane Gamble who hacked CIA Chief and other US Intel officials gets 2-year jail sentence". Security Affairs. Retrieved 2024-12-08.
  3. Blake, Andrew. "Kane Gamble, British hacker, admits targeting heads of CIA, FBI". The Washington Times. Retrieved 2024-12-08.
  4. "Two years for teen 'cyber terrorist' who targeted US officials". 2018-04-20. Retrieved 2024-12-08.
  5. Association, Press (2018-04-20). "Two years' detention for UK teenager who 'cyberterrorised' US officials". The Guardian. ISSN   0261-3077 . Retrieved 2024-12-08.
  6. "UK teen Kane Gamble gets two years for hacking CIA ex-chief – DW – 04/20/2018". dw.com. Retrieved 2024-12-08.
  7. "Leicester teen tries to hack CIA and FBI chiefs' computers". 2017-10-06. Retrieved 2024-12-08.
  8. "British teenager who 'cyber-terrorised' US intelligence officials sentenced". The Independent. 2018-04-22. Retrieved 2024-12-08.
  9. Paganini, Pierluigi (2018-04-21). "UK Teenager Kane Gamble who hacked CIA Chief and other US Intel officials gets 2-year jail sentence". Security Affairs. Retrieved 2024-12-08.
  10. "British teenager who 'cyber-terrorised' US intelligence officials sentenced". The Independent. 2018-04-22. Retrieved 2024-12-08.
  11. "Two years for teen 'cyber terrorist' who targeted US officials". 2018-04-20. Retrieved 2024-12-08.
  12. https://www.bbc.com/news/uk-england-leicestershire-43840075
  13. "Two years for teen 'cyber terrorist' who targeted US officials". 2018-04-20. Retrieved 2024-12-08.