Nahshon Even-Chaim (born May 1971), aka Phoenix, was the first major computer hacker to be convicted in Australia. He was one of the most highly skilled members of a computer hacking group called The Realm, based in Melbourne, Australia, from the late 1980s until his arrest by the Australian Federal Police in early 1990. His targets centered on defense and nuclear weapons research networks. [1] [2] [3] [4]
Even-Chaim began breaking into systems by dialing indirectly or placing a call through X.25 networks, later taking advantage of Internet connectivity as it became available. He developed a reputation within The Realm, his computer hacking group, for his skill and arrogance.
In late 1988 Australian Federal Police officers discovered his identity using a combination of undercover work and informants. Aided by new computer crime legislation that came into force in June 1989, the AFP obtained a warrant in January 1990 to eavesdrop not only on Even-Chaim's phone conversations but also the data transmitted through his modem. The tap on his voice calls, which began on 26 January 1990, ran for eight weeks, while the data tap started two weeks later and ran for six weeks. The intercepts were being monitored by the AFP at its Telephone Intercept Branch in Canberra, 650 km from Even-Chaim's home. [1]
Both intercepts provided police with sufficient evidence to prosecute him and two other members of his hacking group, Richard Jones, a.k.a. Electron and David John Woodcock, a.k.a. Nom. The data taps revealed Even-Chaim spent marathon sessions at his computer, working at a rapid pace to enter and tamper with computer systems. It was the first time in the world a remote data intercept had been used to gain evidence for a computer crime prosecution. [1] [5]
Transcripts of the phone taps captured Even-Chaim laughing with another hacker about how he had been "fucking with NASA", adding: "Yeah, they're gonna really want me bad. This is fun!" [1] [6] In another conversation, this time with an American hacker, he claimed: "The guys down at the local universities here are screaming with rage because they couldn't get rid of us. The Americans are getting pretty damn pissed off with me because I'm doing so much and they can't do much about it. I'm getting to the point now where I can get into almost any system on the Internet. I've virtually raped the Internet beyond belief." [7]
Accounts of the police investigation that identified Even-Chaim and the two other offenders, as well as their arrest and prosecution, are contained in the book Hackers: The Hunt for Australia’s Most Infamous Computer Cracker, co-written by Bill Apro, an AFP computer crime investigator who led the investigation, in the book Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier by Suelette Dreyfus and In the Realm of the Hackers , a film by Kevin Anderson.
Even-Chaim pleaded guilty to 15 charges, which involved his intrusion into computers at:
After allegedly compromising computers used by computer security experts Eugene Spafford, Clifford Stoll, and Russell L. Brand (at LLNL), Even-Chaim called New York Times journalist John Markoff in response to an article in which Markoff had attributed a recent spate of computer break-ins to a worm. Even-Chaim boasted to Markoff that the break-ins had been the work of himself and his associates, and ridiculed the computer security community, claiming: "It used to be the security guys chasing the hackers. Now, it's the hackers chasing the security guys." [4] Markoff published the claims in a follow-up article in March 1990. [9]
In the early hours of 2 April 1990, Even-Chaim's home in Caulfield North, suburban Melbourne, was raided by the Australian Federal Police and he was arrested. Simultaneously, the AFP raided the homes of fellow Realm members Jones and Woodcock. Even-Chaim was charged with 48 offenses, most of which carried a maximum 10-year jail sentence. On 6 October 1993, Even-Chaim, who by then had negotiated a deal in which he would plead guilty if the number of charges was reduced to 15, was sentenced to 500 hours of community service, with a 12-month suspended jail term. Unlike his two co-accused, he had revealed little at his police interview or in court that might explain his motivation for his hacking.
Even-Chaim apparently worked in IT for at least some time after his conviction and has pursued an interest in music. Despite approaches by The Age newspaper in 2003 and the producer of a television documentary on The Realm, Even-Chaim has declined to discuss his hacking career.
A hacker is a person skilled in information technology who achieves goals by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone with knowledge of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online and pose as criminals. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. Hacking and cyber-attacks are used extra-legally and illegally by law enforcement and security agencies, and employed by state actors as a weapon of legal and illegal warfare.
Kevin David Mitnick was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. Mitnick's pursuit, arrest, trial, and sentence along with the associated journalism, books, and films were all controversial. After his release from prison, he ran his own security firm, Mitnick Security Consulting, LLC, and was also involved with other computer security businesses.
A covert listening device, more commonly known as a bug or a wire, is usually a combination of a miniature radio transmitter with a microphone. The use of bugs, called bugging, or wiretapping is a common technique in surveillance, espionage and police investigations.
The Australian High Tech Crime Centre (AHTCC) are hosted by the Australian Federal Police (AFP) at their headquarters in Canberra. Under the auspices of the AFP, the AHTCC is party to the formal Joint Operating Arrangement established between the AFP, the Australian Security Intelligence Organisation and the Computer Network Vulnerability Team of the Australian Signals Directorate.
The Computer Misuse Act 1990 is an Act of the Parliament of the United Kingdom, introduced partly in response to the decision in R v Gold & Schifreen (1988) 1 AC 1063. Critics of the bill complained that it was introduced hastily, was poorly thought out, and that intention was often difficult to prove, with the bill inadequately differentiating "joyriding" hackers like Gold and Schifreen from serious computer criminals. The Act has nonetheless become a model from which several other countries, including Canada and the Republic of Ireland, have drawn inspiration when subsequently drafting their own information security laws, as it is seen "as a robust and flexible piece of legislation in terms of dealing with cybercrime”. Several amendments have been passed to keep the Act up to date.
Chris Goggans is an American hacker, a founding member of the Legion of Doom group, and a former editor of Phrack magazine. He is known as an expert in security as well as for his statements on hacker ethics and responsibility.
A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers.
Electron was the computer handle of Richard Jones, a member of an underground hacker community called The Realm. Jones, born in June 1969, was one of three members of the group arrested in simultaneous raids by the Australian Federal Police in Melbourne, Australia, on 2 April 1990. All three — Nahshon Even-Chaim, Electron and Nom — were convicted of a range of computer crimes involving the intrusion into US defense and government computer systems and the theft of an online computer security newsletter in the late 1980s and early 1990.
In The Realm of the Hackers is a 2003 Australian documentary directed by Kevin Anderson about the prominent hacker community, centered in Melbourne, Australia in the late 1980s until early 1990. The storyline is centered on the Australian teenagers going by the hacker names "Electron" and "Phoenix", who were members of an elite computer hacking group called 'The Realm' and hacked into some of the most secure computer networks in the world, including those of the US Naval Research Laboratory, Lawrence Livermore National Laboratory, a government lab charged with the security of the US nuclear stockpile, and NASA. The film runs for 55 minutes and was inspired by the book Underground, by Melbourne-based writer and academic Suelette Dreyfus.
The Information Technology Act, 2000 is an Act of the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce.
The WANK Worm and the OILZ Worm were computer worms that attacked DEC VMS computers in 1989 over the DECnet. They were written in DIGITAL Command Language.
Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier is a 1997 book by Suelette Dreyfus, researched by Julian Assange. It describes the exploits of a group of Australian, American, and British black hat hackers during the late 1980s and early 1990s, among them Assange himself.
United States v. Ivanov was an American court case addressing subject-matter jurisdiction for computer crimes performed by Internet users outside of the United States against American businesses and infrastructure. In trial court, Aleksey Vladimirovich Ivanov of Chelyabinsk, Russia was indicted for conspiracy, computer fraud, extortion, and possession of illegal access devices; all crimes committed against the Online Information Bureau (OIB) whose business and infrastructure were based in Vernon, Connecticut.
Underground: The Julian Assange Story is an Australian television film produced for Network Ten. It premiered at the 2012 Toronto International Film Festival and aired on Network Ten on 7 October 2012. The film draws its title from Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier, a 1997 book by Suelette Dreyfus, researched by Julian Assange, but the film bears little relation to the book itself, which catalogues the exploits of a group of Australian, American, and British hackers during the 1980s and early 1990s, among them Assange himself. The film was not approved by Julian Assange, Wikileaks or any other member of the Assange family and there was no collaboration with the Assanges or Wikileaks during the making of the film. However Julian Assange subsequently had "a very favourable response to the movie".
Mass surveillance in Australia takes place in several network media, including telephone, internet, and other communications networks, financial systems, vehicle and transit networks, international travel, utilities, and government schemes and services including those asking citizens to report on themselves or other citizens.
Hamza Bendelladj, born in 1988 in Tizi Ouzou, is an Algerian cyber-criminal and carder who goes by the code name BX1 and has been nicknamed as the "Smiling Hacker". Bendelladj is a polyglot, speaking 5 languages often used for profit in view of his linguistic knowledge, in order to extract money almost everywhere in the world. This led to a search for him that lasted 5 years. He was on the top 10 list of the most wanted hackers by Interpol and the FBI for allegedly embezzling tens of millions of dollars from more than two hundred American and European financial institutions via a computer virus, the "SpyEYE Botnet", which infected more than 60 million computers worldwide, mostly from the United States, and was developed with his Russian accomplice Aleksandr Andreivich Panin, a.k.a. "Gribodemon", to steal banking information stored on infected computers.
The ANOM sting operation is a collaboration by law enforcement agencies from several countries, running between 2018 and 2021, that intercepted millions of messages sent through the supposedly secure smartphone-based messaging app ANOM. The ANOM service was widely used by criminals, but instead of providing secure communication, it was actually a trojan horse covertly distributed by the United States Federal Bureau of Investigation (FBI) and the Australian Federal Police (AFP), enabling them to monitor all communications. Through collaboration with other law enforcement agencies worldwide, the operation resulted in the arrest of over 800 suspects allegedly involved in criminal activity, in 16 countries. Among the arrested people were alleged members of Australian-based Italian mafia, Albanian organised crime, outlaw motorcycle clubs, drug syndicates and other organised crime groups.
Books
Newspapers
Magazines
Film
E-zines: