GlobalHell: Difference between revisions
mNo edit summary |
Rescuing 1 sources and tagging 0 as dead.) #IABot (v2.0.9.5 |
||
(13 intermediate revisions by 4 users not shown) | |||
Line 1: | Line 1: | ||
{{Short description|Hacker group}} |
{{Short description|Hacker group}} |
||
{{lowercase title|globalHell}}'''globalHell''' (known as 'gH') was an American hacker group. They were one of the first hacking groups who gained notoriety for website defacements and breaches. The combined losses caused by the group were estimated to be ranged between $1.5m and $2.5m.<ref name=":3">{{Cite web |date=2000-03-30 |title=Global Hell hacker to plead guilty, Part I |url=https://www.zdnet.com/home-and-office/networking/global-hell-hacker-to-plead-guilty-part-i/ |url-status=live |archive-url=https://web.archive.org/web/20230602000830/https://www.zdnet.com/home-and-office/networking/global-hell-hacker-to-plead-guilty-part-i/ |archive-date=2023-06-02 |access-date=2024-03-07 |website=ZDNET |language=en}}</ref> The group was called a " |
{{lowercase title|globalHell}}'''globalHell''' (known as 'gH') was an American hacker group. They were one of the first hacking groups who gained notoriety for website defacements and breaches. The combined losses caused by the group were estimated to be ranged between $1.5m and $2.5m.<ref name=":3">{{Cite web |date=2000-03-30 |title=Global Hell hacker to plead guilty, Part I |url=https://www.zdnet.com/home-and-office/networking/global-hell-hacker-to-plead-guilty-part-i/ |url-status=live |archive-url=https://web.archive.org/web/20230602000830/https://www.zdnet.com/home-and-office/networking/global-hell-hacker-to-plead-guilty-part-i/ |archive-date=2023-06-02 |access-date=2024-03-07 |website=ZDNET |language=en}}</ref> The group was called a "cyber gang" as it had many of the same characteristics of a gang and carried out the same activities as a gang, including trafficking in stolen credit card numbers.<ref>{{Cite book |last1=Marion |first1=Nancy E. |url=https://books.google.com/books?id=GErEEAAAQBAJ&dq=globalHell&pg=PA202 |title=Cybercrime: An Encyclopedia of Digital Crime |last2=Twede |first2=Jason |date=2020-10-06 |publisher=Bloomsbury Publishing USA |isbn=978-1-4408-5735-5 |language=en |archive-url=https://web.archive.org/web/20240518204244/https://books.google.co.in/books?id=GErEEAAAQBAJ&dq=globalHell&pg=PA202&redir_esc=y#v=onepage&q=globalHell&f=false |archive-date=2024-05-18}}</ref> |
||
{{Infobox organization |
{{Infobox organization |
||
Line 14: | Line 14: | ||
| leader_name2 = Chad Davis (Mindphasr) |
| leader_name2 = Chad Davis (Mindphasr) |
||
}} |
}} |
||
Global Hell was more concerned with gaining notoriety for defacing prominent Web sites than with destroying or capturing sensitive information.<ref>{{Cite book |url=https://books.google.com/books?id=y54RrVCvtaAC&dq=globalHell&pg=PR3 |title=Electronic Crime Needs Assessment for State and Local Law Enforcement |date=2001 |publisher=U.S. Department of Justice, Office of Justice Programs, National Institute of Justice |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134727/https://books.google.com/books?id=y54RrVCvtaAC&newbks=0&printsec=frontcover&pg=PR3&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref> The members of the group were responsible for breaking and defacing around 115 sites. A few of the systems they broke into include those of [[United States Army]], [[White House]], [[U.S. Cellular|United States Cellular]], [[Ameritech]], [[United States Postal Service|US Postal Service]], [[NASA]] and [[National Oceanic and Atmospheric Administration]].<ref>{{Cite magazine |last= |first= |date=2006-08-23 |title=Hacking Like it's 1999 |url=https://www.wired.com/2006/08/hacking-like-it/ |url-status=live |archive-url=https://web.archive.org/web/20230603054012/https://www.wired.com/2006/08/hacking-like-it/ |archive-date=2023-06-03 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref><ref>{{Cite book |last1=Harrison |first1=Ann |url=https://books.google.com/books?id=ksACoz3PoMwC&dq=globalHell&pg=PA16 |title=Crackers Used Known Weakness on Fed Sites |last2=Ohlson |first2=Kathleen |date=1999-07-05 |publisher=IDG Enterprise |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134313/https://books.google.co.in/books?id=ksACoz3PoMwC&pg=PA16&dq=globalHell&hl=en&sa=X&ved=2ahUKEwjp1v3Cw-GEAxXRs1YBHen-BFwQuwV6BAgJEAY#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref> The group disbanded in 1999 due to being prosecuted for computer intrusion.<ref name=":3" /> |
Global Hell was more concerned with gaining notoriety for defacing prominent Web sites than with destroying or capturing sensitive information.<ref>{{Cite book |url=https://books.google.com/books?id=y54RrVCvtaAC&dq=globalHell&pg=PR3 |title=Electronic Crime Needs Assessment for State and Local Law Enforcement |date=2001 |publisher=U.S. Department of Justice, Office of Justice Programs, National Institute of Justice |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134727/https://books.google.com/books?id=y54RrVCvtaAC&newbks=0&printsec=frontcover&pg=PR3&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref> The members of the group were responsible for breaking and defacing around 115 sites. A few of the systems they broke into include those of [[United States Army]], [[White House]], [[U.S. Cellular|United States Cellular]], [[Ameritech]], [[United States Postal Service|US Postal Service]], [[NASA]] and [[National Oceanic and Atmospheric Administration]].<ref>{{Cite magazine |last= |first= |date=2006-08-23 |title=Hacking Like it's 1999 |url=https://www.wired.com/2006/08/hacking-like-it/ |url-status=live |archive-url=https://web.archive.org/web/20230603054012/https://www.wired.com/2006/08/hacking-like-it/ |archive-date=2023-06-03 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref><ref>{{Cite book |last1=Harrison |first1=Ann |url=https://books.google.com/books?id=ksACoz3PoMwC&dq=globalHell&pg=PA16 |title=Crackers Used Known Weakness on Fed Sites |last2=Ohlson |first2=Kathleen |date=1999-07-05 |publisher=IDG Enterprise |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134313/https://books.google.co.in/books?id=ksACoz3PoMwC&pg=PA16&dq=globalHell&hl=en&sa=X&ved=2ahUKEwjp1v3Cw-GEAxXRs1YBHen-BFwQuwV6BAgJEAY#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref> The group disbanded in 1999 due to being prosecuted for computer intrusion.<ref name=":3" /> [[IRC]] channel called #feed-the-goats was the home of hacking group.<ref>{{Cite magazine |last=Zetter |first=Kim |title=Final Conspirator in Credit Card Hacking Ring Gets 5 Years |url=https://www.wired.com/2010/04/toey-sentence/ |access-date=2024-07-19 |magazine=Wired |language=en-US |issn=1059-1028 |archive-date=2021-08-01 |archive-url=https://web.archive.org/web/20210801114239/https://www.wired.com/2010/04/toey-sentence/ |url-status=live }}</ref><ref>{{Cite magazine |last=Zetter |first=Kim |title=Coder Journeys From Wall Street to Prison |url=https://www.wired.com/2010/05/watt-reports-to-prison/ |access-date=2024-07-19 |magazine=Wired |language=en-US |issn=1059-1028 |archive-date=2023-05-10 |archive-url=https://web.archive.org/web/20230510211235/https://www.wired.com/2010/05/watt-reports-to-prison/ |url-status=live }}</ref> |
||
== History == |
== History == |
||
The group was founded by [[Patrick Gregory]] and Chad Davis in February 1998. Gregory was a member of a street gang who turned to cyberspace to escape from the gang.<ref>{{Cite book |last=Erbschloe |first=Michael |url=https://books.google.com/books?id=xyhUAAAAMAAJ&q=globalHell |title=Information Warfare: How to Survive Cyber Attacks |date=2001 |publisher=Osborne/McGraw-Hill |isbn=978-0-07-213260-1 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134309/https://books.google.com/books?id=xyhUAAAAMAAJ&newbks=0&printsec=frontcover&dq=globalHell&q=globalHell&hl=en |url-status=live }}</ref> Between 1998 and 2000, the group's membership was estimated between 15 and 20.<ref>{{Cite book |last1=Sachs |first1=Marcus |url=https://books.google.com/books?id=n7d5mssw6kMC&dq=globalHell&pg=PA35 |title=Cyber Adversary Characterization: Auditing the Hacker Mind |last2=Parker |first2=Tom |last3=Shaw |first3=Eric |last4=Stroz |first4=Ed |date=2004-07-09 |publisher=Elsevier |isbn=978-0-08-047699-5 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134323/https://books.google.com/books?id=n7d5mssw6kMC&newbks=0&printsec=frontcover&pg=PA35&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref> |
The group was founded by [[Patrick Gregory]] and Chad Davis in February 1998. Gregory was a member of a street gang who turned to cyberspace to escape from the gang.<ref>{{Cite book |last=Erbschloe |first=Michael |url=https://books.google.com/books?id=xyhUAAAAMAAJ&q=globalHell |title=Information Warfare: How to Survive Cyber Attacks |date=2001 |publisher=Osborne/McGraw-Hill |isbn=978-0-07-213260-1 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134309/https://books.google.com/books?id=xyhUAAAAMAAJ&newbks=0&printsec=frontcover&dq=globalHell&q=globalHell&hl=en |url-status=live }}</ref> Between 1998 and 2000, the group's membership was estimated between 15 and 20.<ref>{{Cite book |last1=Sachs |first1=Marcus |url=https://books.google.com/books?id=n7d5mssw6kMC&dq=globalHell&pg=PA35 |title=Cyber Adversary Characterization: Auditing the Hacker Mind |last2=Parker |first2=Tom |last3=Shaw |first3=Eric |last4=Stroz |first4=Ed |date=2004-07-09 |publisher=Elsevier |isbn=978-0-08-047699-5 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134323/https://books.google.com/books?id=n7d5mssw6kMC&newbks=0&printsec=frontcover&pg=PA35&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref> |
||
[[File:Whitehouse Website Defacement.png|thumb|'''White House Website Defacement''']] |
[[File:Whitehouse Website Defacement.png|thumb|'''White House Website Defacement''']] |
||
In April 1999, the group invaded computer systems operated by the White House, the U.S. Army, Ameritech, U.S. Cellular and several other companies. On May 2, 1999, hackers invaded the White House website and put a picture of flowered panties on its home page.<ref>{{Cite book |last=Clark |first=David Leon |url=https://books.google.com/books?id=ZyH6SudBkDoC&dq=globalHell&pg=PA38 |title=Enterprise Security: The Manager's Defense Guide |date=2003 |publisher=Addison-Wesley Professional |isbn=978-0-201-71972-7 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132553/https://books.google.com/books?id=ZyH6SudBkDoC&newbks=0&printsec=frontcover&pg=PA38&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref> |
In April 1999, the group invaded computer systems operated by the White House, the U.S. Army, Ameritech, U.S. Cellular and several other companies. On May 2, 1999, hackers invaded the White House website and put a picture of flowered panties on its home page.<ref>{{Cite book |last=Clark |first=David Leon |url=https://books.google.com/books?id=ZyH6SudBkDoC&dq=globalHell&pg=PA38 |title=Enterprise Security: The Manager's Defense Guide |date=2003 |publisher=Addison-Wesley Professional |isbn=978-0-201-71972-7 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132553/https://books.google.com/books?id=ZyH6SudBkDoC&newbks=0&printsec=frontcover&pg=PA38&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref> Along with gH, a group called 'Hong Kong Danger Duo' also took part in the White House hack.<ref>{{Cite web |last=Meeks |first=Brock |date=1999-05-11 |title=White House Web site shut down |url=https://www.zdnet.com/article/white-house-web-site-shut-down/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-02 |archive-url=https://web.archive.org/web/20240802171653/https://www.zdnet.com/article/white-house-web-site-shut-down/ |url-status=live }}</ref> |
||
On May 8, 1999, FBI agents arrested Eric Burns, known as Zyklon, charging him with multiple felony counts of computer intrusion, causing damage in excess of $40,000. On May 9, 1999, FBI launched raids on suspected members.<ref>{{Cite book |last=Newton |first=Michael |url=https://books.google.com/books?id=sAK6_W7lLkoC&dq=globalHell&pg=PA127 |title=The Encyclopedia of High-tech Crime and Crime-fighting |date=2003 |publisher=Infobase Publishing |isbn=978-1-4381-2986-0 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132508/https://books.google.com/books?id=sAK6_W7lLkoC&newbks=0&printsec=frontcover&pg=PA127&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref><ref>{{Cite web |date=1999-06-24 |title=FBI on offensive in 'cyber war,' raiding hackers' homes |url=http://edition.cnn.com/TECH/computing/9906/24/t_t/hacker.raid/index.html |url-status=live |archive-url=https://web.archive.org/web/20230928204421/http://edition.cnn.com/TECH/computing/9906/24/t_t/hacker.raid/index.html |archive-date=2023-09-28 |access-date=2024-07-04 |website=CNN}}</ref> |
On May 8, 1999, FBI agents arrested Eric Burns, known as Zyklon, charging him with multiple felony counts of computer intrusion, causing damage in excess of $40,000. On May 9, 1999, FBI launched raids on suspected members.<ref>{{Cite book |last=Newton |first=Michael |url=https://books.google.com/books?id=sAK6_W7lLkoC&dq=globalHell&pg=PA127 |title=The Encyclopedia of High-tech Crime and Crime-fighting |date=2003 |publisher=Infobase Publishing |isbn=978-1-4381-2986-0 |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132508/https://books.google.com/books?id=sAK6_W7lLkoC&newbks=0&printsec=frontcover&pg=PA127&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref><ref>{{Cite web |date=1999-06-24 |title=FBI on offensive in 'cyber war,' raiding hackers' homes |url=http://edition.cnn.com/TECH/computing/9906/24/t_t/hacker.raid/index.html |url-status=live |archive-url=https://web.archive.org/web/20230928204421/http://edition.cnn.com/TECH/computing/9906/24/t_t/hacker.raid/index.html |archive-date=2023-09-28 |access-date=2024-07-04 |website=CNN}}</ref><ref>{{Cite magazine |last=Burrough |first=Bryan |date=2000-06-01 |title=Invisible Enemies |url=https://www.vanityfair.com/news/2000/06/web-hackers-200006 |access-date=2024-07-19 |magazine=Vanity Fair |language=en-US |archive-date=2022-11-29 |archive-url=https://web.archive.org/web/20221129170316/https://www.vanityfair.com/news/2000/06/web-hackers-200006 |url-status=live }}</ref><ref>{{Cite web |date=2000-02-16 |title=STATEMENT OF JANET RENO ATTORNEY GENERAL OF THE UNITED STATES BEFORE THE UNITED STATES SENATE COMMITTEE ON APPROPRIATIONS SUBCOMMITTEE ON COMMERCE, JUSTICE, AND STATE THE JUDICIARY AND RELATED AGENCIES |url=https://www.justice.gov/archive/ag/testimony/2000/reno21600.htm |access-date=2024-07-19 |website=www.justice.gov |archive-date=2021-04-14 |archive-url=https://web.archive.org/web/20210414035010/https://www.justice.gov/archive/ag/testimony/2000/reno21600.htm |url-status=live }}</ref> |
||
On May 27, the group retaliated for |
On May 27, the group retaliated for doing searches of nine of its members by the FBI by flooding the FBI Web site with thousands of requests for access.<ref>{{Cite news |last=Simons |first=John |date=1999-06-01 |title=FBI Conducts Hacker Raids Amid Web-Site Break-Ins |url=https://www.wsj.com/articles/SB928191596777748168 |work=[[The Wall Street Journal]] |access-date=2024-08-09 |archive-date=2024-08-09 |archive-url=https://web.archive.org/web/20240809075207/https://www.wsj.com/articles/SB928191596777748168 |url-status=live }}</ref> The FBI shut down the site as to not cause anymore damage to the server. A hacker named 'Israeli Ghost' took credit for the attack on the FBI’s site.<ref>{{Cite web |last=Meeks |first=Brock |date=1999-05-26 |title=Hack attack knocks out FBI site |url=https://www.zdnet.com/article/hack-attack-knocks-out-fbi-site/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-02 |archive-url=https://web.archive.org/web/20240802171653/https://www.zdnet.com/article/hack-attack-knocks-out-fbi-site/ |url-status=live }}</ref> Over the next week, Global Hell also attacked the [[Virginia Senate]].<ref>{{Cite book |last= |first= |url=https://books.google.com/books?id=Qw0EAAAAMBAJ&dq=globalHell&pg=PA6 |title=Hack Attack |date=1999-05-31 |publisher=IDG Network World Inc |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132507/https://books.google.co.in/books?id=Qw0EAAAAMBAJ&pg=PA6&dq=globalHell&hl=en&sa=X&ved=2ahUKEwjF5_alxuGEAxVO3TQHHUEYDV04ChC7BXoECAkQBg#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref>{{Cite news |last=Richardson |first=Tim |date=1999-05-28 |title=FBI site still down after hack attack |url=https://www.theregister.com/1999/05/28/fbi_site_still_down_after/ |work=The Register |access-date=2024-07-04 |archive-date=2005-01-18 |archive-url=https://web.archive.org/web/20050118044308/http://www.theregister.com/1999/05/28/fbi_site_still_down_after/ |url-status=live }}</ref> Hackers from other organizations defaced website of [[United States Department of the Interior]] and a site run by an Idaho-based federal supercomputer laboratory. A note threatening the destruction of the computers "if the FBI doesn't stop" was posted on a site maintained by the [[Idaho National Laboratory]].<ref>{{Cite web |last=Kaplan |first=Lee |date=1999-05-28 |title=FBI Wages War With Hackers |url=https://www.cbsnews.com/news/fbi-wages-war-with-hackers/ |url-status=live |archive-url=https://web.archive.org/web/20170321012108/http://www.cbsnews.com/news/fbi-wages-war-with-hackers/ |archive-date=2017-03-21 |access-date=2024-07-04 |website=CBS |language=en-US}}</ref><ref>{{Cite magazine |last=Taylor |first=Chris |date=1999-06-14 |title=Geeks vs. G-Men |url=https://time.com/archive/6735603/geeks-vs-g-men/ |access-date=2024-07-04 |magazine=TIME |language=en |archive-date=2024-07-04 |archive-url=https://web.archive.org/web/20240704072218/https://time.com/archive/6735603/geeks-vs-g-men/ |url-status=live }}</ref><ref>{{Cite news |last=Bell |first=Steve |date=2002-08-01 |title=The web's most wanted |url=https://www.theguardian.com/technology/2002/aug/01/hacking.internetcrime |access-date=2024-07-19 |work=The Guardian |language=en-GB |issn=0261-3077 |archive-date=2024-08-03 |archive-url=https://web.archive.org/web/20240803160325/https://www.theguardian.com/technology/2002/aug/01/hacking.internetcrime |url-status=live }}</ref><ref>{{Cite web |last=Meeks |first=Brock |date=1999-05-27 |title=Feds vs. hackers: The battle widens |url=https://www.zdnet.com/article/feds-vs-hackers-the-battle-widens-5000095881/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-02 |archive-url=https://web.archive.org/web/20240802171654/https://www.zdnet.com/article/feds-vs-hackers-the-battle-widens-5000095881/ |url-status=live }}</ref><ref>{{Cite web |last=Meeks |first=Brock |date=1999-05-31 |title=More government sites hacked |url=https://www.zdnet.com/article/more-government-sites-hacked-5000095882/ |website=ZDNET |access-date=2024-08-02 |archive-date=2024-07-05 |archive-url=https://web.archive.org/web/20240705083005/https://www.zdnet.com/article/more-government-sites-hacked-5000095882/ |url-status=live }}</ref> Global Hell was not able break into classified servers.<ref>{{Cite web |last=Fitzgerald |first=Michael |date=1999-06-02 |title=FBI missing the real hacking threat? |url=https://www.zdnet.com/article/fbi-missing-the-real-hacking-threat-5000095885/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-03 |archive-url=https://web.archive.org/web/20240803160206/https://www.zdnet.com/article/fbi-missing-the-real-hacking-threat-5000095885/ |url-status=live }}</ref><ref>{{Cite web |last= |date=1999-07-10 |title=HACKERS DELIGHT IN GOVERNMENT WEB WORRIES |url=https://www.courant.com/1999/07/10/hackers-delight-in-government-web-worries/ |access-date=2024-08-09 |website=Hartford Courant |language=en-US |archive-date=2024-08-09 |archive-url=https://web.archive.org/web/20240809065912/https://www.courant.com/1999/07/10/hackers-delight-in-government-web-worries/ |url-status=live }}</ref> |
||
Two members of the group were willing to cooperate. Through them, they got the address of Davis (Mindphasr). On June 2, FBI raided the Davis's apartment and he admitted being a member.<ref>{{Cite news |last=Schwartz |first=John |date=1999-06-02 |title=Online Security Is Pentagon's Latest Battle |url=https://www.washingtonpost.com/wp-srv/national/daily/june99/hackers02.htm |url-status=live |archive-url=https://web.archive.org/web/20240704191746/https://www.washingtonpost.com/wp-srv/national/daily/june99/hackers02.htm |archive-date=2024-07-04 |access-date=2024-07-04 |newspaper=Washington Post}}</ref> On June 28, at 2:14 a.m., Davis gained access to the Army's website and put a message "Global Hell is alive. Global Hell will not die". He also gained access to an unidentified Army network and modified the computer files. Public access was restored within two hours. After this attack, the Army switched its website from Microsoft's [[Windows NT]] servers to [[WebSTAR|WebStar]] servers running [[Mac operating systems|Mac OS]].<ref>{{Cite news |date=1999-09-17 |title=U.S. Army Web Site Discontinues Its Use of NT |url=https://www.hpcwire.com/1999/09/17/u-s-army-web-site-discontinues-its-use-of-nt/ |url-status=live |archive-url=https://web.archive.org/web/20240704191738/https://www.hpcwire.com/1999/09/17/u-s-army-web-site-discontinues-its-use-of-nt/ |archive-date=2024-07-04 |access-date=2024-07-04 |work=HPCwire}}</ref><ref>{{Cite web |last=Dickey |first=Connie E. |date=1999-09-01 |title=Web page hacker arrested, government sites becoming more secure |url=https://irp.fas.org/news/1999/09/a19990901hacker.htm |url-status=live |archive-url=https://web.archive.org/web/20240704191740/https://irp.fas.org/news/1999/09/a19990901hacker.htm |archive-date=2024-07-04 |access-date=2024-07-04 |website=irp.fas.org}}</ref><ref>{{Cite book |last=Ohlson |first=Kathleen |url=https://books.google.com/books?id=hyDkcWWyD_4C&dq=globalHell&pg=PA27 |title=Feds Arrest Teen Hacker |date=1999-09-06 |publisher=IDG Enterprise |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132604/https://books.google.co.in/books?id=hyDkcWWyD_4C&pg=PA27&dq=globalHell&hl=en&sa=X&ved=2ahUKEwjp1v3Cw-GEAxXRs1YBHen-BFwQuwV6BAgFEAY#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref> |
Two members of the group were willing to cooperate. Through them, they got the address of Davis (Mindphasr). On June 2, FBI raided the Davis's apartment and he admitted being a member.<ref>{{Cite news |last=Schwartz |first=John |date=1999-06-02 |title=Online Security Is Pentagon's Latest Battle |url=https://www.washingtonpost.com/wp-srv/national/daily/june99/hackers02.htm |url-status=live |archive-url=https://web.archive.org/web/20240704191746/https://www.washingtonpost.com/wp-srv/national/daily/june99/hackers02.htm |archive-date=2024-07-04 |access-date=2024-07-04 |newspaper=Washington Post}}</ref> On June 28, at 2:14 a.m., Davis gained access to the Army's website and put a message "Global Hell is alive. Global Hell will not die".<ref>{{Cite book |last= |first= |url=https://books.google.com/books?id=IpYcAAAAMAAJ&dq=%22global+hell%22&pg=PA985 |title=Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations for 2001: Hearings Before a Subcommittee of the Committee on Appropriations, House of Representatives, One Hundred Sixth Congress, Second Session |date=2000 |publisher=U.S. Government Printing Office |language=en |access-date=2024-07-20 |archive-url=https://web.archive.org/web/20240722163943/https://books.google.com/books?id=IpYcAAAAMAAJ&dq=%22global+hell%22&pg=PA985#v=onepage&q=%22global%20hell%22&f=false |archive-date=2024-07-22 |url-status=live}}</ref><ref>{{Cite web |date=1999-06-28 |title=Army site latest hacking target |url=https://www.zdnet.com/article/army-site-latest-hacking-target/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-02 |archive-url=https://web.archive.org/web/20240802170242/https://www.zdnet.com/article/army-site-latest-hacking-target/ |url-status=live }}</ref> He also gained access to an unidentified Army network and modified the computer files. The website was tampered with for as long as nine hours.<ref>{{Cite web |date=1999-06-29 |title=Army site falls prey to hackers |url=http://news.bbc.co.uk/2/hi/americas/381378.stm |access-date=2024-07-19 |website=BBC |archive-date=2024-02-06 |archive-url=https://web.archive.org/web/20240206230713/http://news.bbc.co.uk/2/hi/americas/381378.stm |url-status=live }}</ref> Public access was restored within two hours of knowing. After this attack, the Army switched its website from Microsoft's [[Windows NT]] servers to [[WebSTAR|WebStar]] servers running [[Mac operating systems|Mac OS]].<ref>{{Cite news |date=1999-09-17 |title=U.S. Army Web Site Discontinues Its Use of NT |url=https://www.hpcwire.com/1999/09/17/u-s-army-web-site-discontinues-its-use-of-nt/ |url-status=live |archive-url=https://web.archive.org/web/20240704191738/https://www.hpcwire.com/1999/09/17/u-s-army-web-site-discontinues-its-use-of-nt/ |archive-date=2024-07-04 |access-date=2024-07-04 |work=HPCwire}}</ref><ref>{{Cite web |last=Dickey |first=Connie E. |date=1999-09-01 |title=Web page hacker arrested, government sites becoming more secure |url=https://irp.fas.org/news/1999/09/a19990901hacker.htm |url-status=live |archive-url=https://web.archive.org/web/20240704191740/https://irp.fas.org/news/1999/09/a19990901hacker.htm |archive-date=2024-07-04 |access-date=2024-07-04 |website=irp.fas.org}}</ref><ref>{{Cite book |last=Ohlson |first=Kathleen |url=https://books.google.com/books?id=hyDkcWWyD_4C&dq=globalHell&pg=PA27 |title=Feds Arrest Teen Hacker |date=1999-09-06 |publisher=IDG Enterprise |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132604/https://books.google.co.in/books?id=hyDkcWWyD_4C&pg=PA27&dq=globalHell&hl=en&sa=X&ved=2ahUKEwjp1v3Cw-GEAxXRs1YBHen-BFwQuwV6BAgFEAY#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref>{{Cite web |date=1999-09-01 |title=FBI Arrests Teenager Suspected As Hacker of Pentagon System |url=https://www.wsj.com/articles/SB936143295363671484 |website=WSJ |access-date=2024-08-09 |archive-date=2024-07-15 |archive-url=https://web.archive.org/web/20240715121237/https://www.wsj.com/articles/SB936143295363671484 |url-status=live }}</ref> |
||
Davis was arrested on August 30, 1999, and he pleaded guilty on January 4, 2000. On March 1, 2000, he received a six-month jail term and three years' probation. He was ordered to pay restitution in the amount of $8,054. Davis was the first person to be arrested in this investigation.<ref>{{Cite news |last=Suro |first=Roberto |date=1999-09-01 |title=The Hackers Who Won't Quit |url=https://www.washingtonpost.com/wp-srv/national/daily/sept99/global1.htm |url-status=live |archive-url=https://web.archive.org/web/20221206142140/https://www.washingtonpost.com/wp-srv/national/daily/sept99/global1.htm |archive-date=2022-12-06 |access-date=2024-03-07 |newspaper=Washington Post}}</ref><ref>{{Cite web |date=1999-09-15 |title=Tips on Technology |url=https://www.saipantribune.com/news/local/tips-on-technology/article_662e6bb3-d062-5bfd-9a67-03711de84988.html |access-date=2024-03-07 |website=Saipan Tribune |language=en |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132549/https://www.saipantribune.com/news/local/tips-on-technology/article_662e6bb3-d062-5bfd-9a67-03711de84988.html |url-status=live }}</ref><ref>{{Cite book |url=https://books.google.com/books?id=opSS9Xmsjw4C&dq=globalHell&pg=RA4-PA109 |title=Sine Pari |date= 1997|publisher=U.S. Army Special Operations Command |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132516/https://books.google.com/books?id=opSS9Xmsjw4C&newbks=0&printsec=frontcover&pg=RA4-PA109&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref>{{Cite web |last=Shandor |first=John |date=1999-09-03 |title=Wisconsin Teen Charged with Pentagon Hacking |url=https://www.hpcwire.com/1999/09/03/wisconsin-teen-charged-with-pentagon-hacking/ |access-date=2024-07-04 |website=HPCwire |language=en-US |archive-date=2024-07-04 |archive-url=https://web.archive.org/web/20240704070436/https://www.hpcwire.com/1999/09/03/wisconsin-teen-charged-with-pentagon-hacking/ |url-status=live }}</ref><ref>{{Cite web |date=1999-08-30 |title=WISCONSIN HACKER CHARGED WITH MILITARY BREAK-IN |url=https://www.justice.gov/archive/opa/pr/1999/August/387crm.htm |url-status=live |archive-url=https://web.archive.org/web/20220914192356/https://www.justice.gov/archive/opa/pr/1999/August/387crm.htm |archive-date=2022-09-14 |access-date=2024-07-04 |website=www.justice.gov}}</ref> |
Davis was arrested on August 30, 1999,<ref>{{Cite web |date=1999-09-01 |title=Teen hacker arrested |url=https://www.zdnet.com/home-and-office/networking/teen-hacker-arrested/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-03 |archive-url=https://web.archive.org/web/20240803160325/https://www.zdnet.com/home-and-office/networking/teen-hacker-arrested/ |url-status=live }}</ref> and he pleaded guilty on January 4, 2000. On March 1, 2000, he received a six-month jail term and three years' probation. He was ordered to pay restitution in the amount of $8,054. Davis was the first person to be arrested in this investigation.<ref>{{Cite news |last=Suro |first=Roberto |date=1999-09-01 |title=The Hackers Who Won't Quit |url=https://www.washingtonpost.com/wp-srv/national/daily/sept99/global1.htm |url-status=live |archive-url=https://web.archive.org/web/20221206142140/https://www.washingtonpost.com/wp-srv/national/daily/sept99/global1.htm |archive-date=2022-12-06 |access-date=2024-03-07 |newspaper=Washington Post}}</ref><ref>{{Cite web |date=1999-09-15 |title=Tips on Technology |url=https://www.saipantribune.com/news/local/tips-on-technology/article_662e6bb3-d062-5bfd-9a67-03711de84988.html |access-date=2024-03-07 |website=Saipan Tribune |language=en |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132549/https://www.saipantribune.com/news/local/tips-on-technology/article_662e6bb3-d062-5bfd-9a67-03711de84988.html |url-status=live }}</ref><ref>{{Cite book |url=https://books.google.com/books?id=opSS9Xmsjw4C&dq=globalHell&pg=RA4-PA109 |title=Sine Pari |date= 1997|publisher=U.S. Army Special Operations Command |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132516/https://books.google.com/books?id=opSS9Xmsjw4C&newbks=0&printsec=frontcover&pg=RA4-PA109&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref>{{Cite web |last=Shandor |first=John |date=1999-09-03 |title=Wisconsin Teen Charged with Pentagon Hacking |url=https://www.hpcwire.com/1999/09/03/wisconsin-teen-charged-with-pentagon-hacking/ |access-date=2024-07-04 |website=HPCwire |language=en-US |archive-date=2024-07-04 |archive-url=https://web.archive.org/web/20240704070436/https://www.hpcwire.com/1999/09/03/wisconsin-teen-charged-with-pentagon-hacking/ |url-status=live }}</ref><ref>{{Cite web |date=1999-08-30 |title=WISCONSIN HACKER CHARGED WITH MILITARY BREAK-IN |url=https://www.justice.gov/archive/opa/pr/1999/August/387crm.htm |url-status=live |archive-url=https://web.archive.org/web/20220914192356/https://www.justice.gov/archive/opa/pr/1999/August/387crm.htm |archive-date=2022-09-14 |access-date=2024-07-04 |website=www.justice.gov}}</ref><ref>{{Cite web |date=1999-09-03 |title=FBI charges teen with hacking Army unclassified network |url=https://www.route-fifty.com/digital-government/1999/09/fbi-charges-teen-with-hacking-army-unclassified-network/311877/ |access-date=2024-07-19 |website=Route Fifty |language=en |archive-date=2024-07-19 |archive-url=https://web.archive.org/web/20240719180410/https://www.route-fifty.com/digital-government/1999/09/fbi-charges-teen-with-hacking-army-unclassified-network/311877/ |url-status=live }}</ref> |
||
Burns pleaded guilty to his charges on September 7, 1999. On November 19, 1999, he was sentenced to 15 months in prison and three years' probation, plus an order to pay $36,240 in restitution to his victims. Burns was prohibited from using a computer for three years.<ref>{{Cite magazine |last= |first= |date=2000-03-29 |title=MostHateD to Plead Most Guilty |url=https://www.wired.com/2000/03/mosthated-to-plead-most-guilty/ |url-status=live |archive-url=https://web.archive.org/web/20231210001206/http://www.wired.com/2000/03/mosthated-to-plead-most-guilty/ |archive-date=2023-12-10 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref> |
Burns pleaded guilty to his charges on September 7, 1999. On November 19, 1999, he was sentenced to 15 months in prison and three years' probation, plus an order to pay $36,240 in restitution to his victims. Burns was prohibited from using a computer for three years.<ref>{{Cite magazine |last= |first= |date=2000-03-29 |title=MostHateD to Plead Most Guilty |url=https://www.wired.com/2000/03/mosthated-to-plead-most-guilty/ |url-status=live |archive-url=https://web.archive.org/web/20231210001206/http://www.wired.com/2000/03/mosthated-to-plead-most-guilty/ |archive-date=2023-12-10 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref> |
||
In December 1999, Curador, a Wales-based 16-year-old member of the group reportedly compromised 26 companies, including a number of ISPs. When authorities tracked him down and confiscated his system, they found more than 200,000 [[Pacific Bell]] Internet user accounts of which 63,000 were already cracked.<ref>{{Cite book |last1=McClure |first1=Stuart |url=https://books.google.com/books?id=eTkEAAAAMBAJ&dq=globalHell&pg=PA64 |title=Hacking frenzy shows network security breaches are not about to go out of fashion |last2=Scambray |first2=Joel |date=2000-01-24 |publisher=InfoWorld Media Group, Inc. |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132550/https://books.google.co.in/books?id=eTkEAAAAMBAJ&pg=PA64&dq=globalHell&hl=en&sa=X&ved=2ahUKEwiqjJDn_uGEAxXuqVYBHbLbBl04ChC7BXoECAYQBg#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref> [[PacBell]], then a part of [[SBC Communications]], responded by asking the affected customers to change their passwords immediately.<ref>{{Cite web |last=Gettleman |first=Jeffrey |date=2000-01-12 |title=Passwords of PacBell Net Accounts Stolen |url=https://www.latimes.com/archives/la-xpm-2000-jan-12-fi-53116-story.html |access-date=2024-07-04 |website=Los Angeles Times |language=en-US |archive-date=2024-06-01 |archive-url=https://web.archive.org/web/20240601131434/https://www.latimes.com/archives/la-xpm-2000-jan-12-fi-53116-story.html |url-status=live }}</ref> Losses were estimated to be $3 million.<ref>{{Cite web |date=2000-04-21 |title=CYBER ATTACK: IMPROVING PREVENTION AND PROSECUTION' |url=https://www.govinfo.gov/content/pkg/CHRG-106shrg69335/html/CHRG-106shrg69335.htm |access-date=2024-07-05 |website=www.govinfo.gov |archive-date=2023-09-29 |archive-url=https://web.archive.org/web/20230929081542/https://www.govinfo.gov/content/pkg/CHRG-106shrg69335/html/CHRG-106shrg69335.htm |url-status=live }}</ref><ref>{{Cite web |title=White House |url=http://web.textfiles.com/ezines/HWA/hwa-hn52.txt |access-date=2024-07-05 |website=web.textfiles.com |archive-date=2021-05-27 |archive-url=https://web.archive.org/web/20210527092653/http://web.textfiles.com/ezines/HWA/hwa-hn52.txt |url-status=live }}</ref> |
In December 1999, Curador, a Wales-based 16-year-old member of the group reportedly compromised 26 companies, including a number of ISPs. When authorities tracked him down and confiscated his system, they found more than 200,000 [[Pacific Bell]] Internet user accounts of which 63,000 were already cracked.<ref>{{Cite web |last=Lemos |first=Robert |date=2000-01-07 |title=Teen hacks 27 ISPs, gains root access |url=https://www.zdnet.com/article/teen-hacks-27-isps-gains-root-access-5000105047/ |access-date=2024-08-02 |website=ZDNET |language=en}}</ref><ref>{{Cite book |last1=McClure |first1=Stuart |url=https://books.google.com/books?id=eTkEAAAAMBAJ&dq=globalHell&pg=PA64 |title=Hacking frenzy shows network security breaches are not about to go out of fashion |last2=Scambray |first2=Joel |date=2000-01-24 |publisher=InfoWorld Media Group, Inc. |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307132550/https://books.google.co.in/books?id=eTkEAAAAMBAJ&pg=PA64&dq=globalHell&hl=en&sa=X&ved=2ahUKEwiqjJDn_uGEAxXuqVYBHbLbBl04ChC7BXoECAYQBg#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref> [[PacBell]], then a part of [[SBC Communications]], responded by asking the affected customers to change their passwords immediately.<ref>{{Cite web |last=Gettleman |first=Jeffrey |date=2000-01-12 |title=Passwords of PacBell Net Accounts Stolen |url=https://www.latimes.com/archives/la-xpm-2000-jan-12-fi-53116-story.html |access-date=2024-07-04 |website=Los Angeles Times |language=en-US |archive-date=2024-06-01 |archive-url=https://web.archive.org/web/20240601131434/https://www.latimes.com/archives/la-xpm-2000-jan-12-fi-53116-story.html |url-status=live }}</ref> Losses were estimated to be $3 million.<ref>{{Cite web |date=2000-04-21 |title=CYBER ATTACK: IMPROVING PREVENTION AND PROSECUTION' |url=https://www.govinfo.gov/content/pkg/CHRG-106shrg69335/html/CHRG-106shrg69335.htm |access-date=2024-07-05 |website=www.govinfo.gov |archive-date=2023-09-29 |archive-url=https://web.archive.org/web/20230929081542/https://www.govinfo.gov/content/pkg/CHRG-106shrg69335/html/CHRG-106shrg69335.htm |url-status=live }}</ref><ref>{{Cite web |title=White House |url=http://web.textfiles.com/ezines/HWA/hwa-hn52.txt |access-date=2024-07-05 |website=web.textfiles.com |archive-date=2021-05-27 |archive-url=https://web.archive.org/web/20210527092653/http://web.textfiles.com/ezines/HWA/hwa-hn52.txt |url-status=live }}</ref> |
||
The group disbanded in 1999 as 12 participants in the group have been prosecuted for computer intrusions and about 30 more have faced lesser penalties.<ref>{{Cite book |last=Auchard |first=Eric |url=https://books.google.com/books?id=xelRAAAAIBAJ&dq=globalhell&pg=PA4&article_id=5642,1484073 |title=Hacker cleared of Yahoo attack, but hit other sites |date=2000-03-04 |publisher=Pittsburgh Post-Gazette |language=en |archive-url=https://web.archive.org/web/20240518202733/https://books.google.co.in/books?id=xelRAAAAIBAJ&dq=globalhell&pg=PA4&article_id=5642,1484073&redir_esc=y#v=onepage&q=globalhell&f=false |archive-date=18 May 2024}}</ref><ref>{{Cite web |last= |first= |date=2016-07-26 |title=Top 10 Most Notorious Hacking Groups of All Time |url=https://cyware.com/news/top-10-most-notorious-hacking-groups-of-all-time-32d01ba2 |url-status=live |archive-url=https://web.archive.org/web/20220523120114/https://cyware.com/news/top-10-most-notorious-hacking-groups-of-all-time-32d01ba2 |archive-date=2022-05-23 |access-date=2024-03-07 |website=Cyware Labs |language=en}}</ref> |
The group disbanded in 1999 as 12 participants in the group have been prosecuted for computer intrusions and about 30 more have faced lesser penalties.<ref>{{Cite book |last=Auchard |first=Eric |url=https://books.google.com/books?id=xelRAAAAIBAJ&dq=globalhell&pg=PA4&article_id=5642,1484073 |title=Hacker cleared of Yahoo attack, but hit other sites |date=2000-03-04 |publisher=Pittsburgh Post-Gazette |language=en |archive-url=https://web.archive.org/web/20240518202733/https://books.google.co.in/books?id=xelRAAAAIBAJ&dq=globalhell&pg=PA4&article_id=5642,1484073&redir_esc=y#v=onepage&q=globalhell&f=false |archive-date=18 May 2024}}</ref><ref>{{Cite web |last= |first= |date=2016-07-26 |title=Top 10 Most Notorious Hacking Groups of All Time |url=https://cyware.com/news/top-10-most-notorious-hacking-groups-of-all-time-32d01ba2 |url-status=live |archive-url=https://web.archive.org/web/20220523120114/https://cyware.com/news/top-10-most-notorious-hacking-groups-of-all-time-32d01ba2 |archive-date=2022-05-23 |access-date=2024-03-07 |website=Cyware Labs |language=en}}</ref> |
||
Line 37: | Line 37: | ||
On Feb 12, 2000, a hacker calling himself [[Dennis Moran (computer criminal)|Coolio]] redirected users from [[RSA Security|RSA Security's]] website to another hacked site in Colombia on which he left a message "owned by coolio".<ref>{{Cite news |date=2000-03-07 |title=´Coolio´ May Be Charged in Other Hacker Attacks |url=https://www.nytimes.com/2000/03/07/technology/acutecoolioacute-may-be-charged-in-other-hacker-attacks.html |archive-url=https://web.archive.org/web/20240518203553/https://www.nytimes.com/2000/03/07/technology/acutecoolioacute-may-be-charged-in-other-hacker-attacks.html |archive-date=2024-05-18 |access-date=2024-03-07 |work=The New York Times |language=en}}</ref> He was assumed to be a member of gH by [[Reuters]]. But law inforcement was searching "Coolio" lived in [[New Hampshire]], not gH member "Coolio" who resided in [[Southern California]].<ref>{{Cite web |last=Hopper |first=Ian |date=2000-02-16 |title=FBI investigation swamped with tips, continue to seek Midwest 'Coolio' |url=https://edition.cnn.com/2000/TECH/computing/02/16/dos.attacks.coolio/index.html |url-status=live |archive-url=https://web.archive.org/web/20220505211837/http://edition.cnn.com/2000/TECH/computing/02/16/dos.attacks.coolio/index.html |archive-date=2022-05-05 |access-date=2024-07-04 |website=CNN}}</ref><ref>{{Cite web |first= |date=2000-03-27 |title=Errata: Rajeev Syal of The Telegraph |url=https://attrition.org/errata/media/telegraph.001.html |url-status=live |archive-url=https://web.archive.org/web/20230605175858/https://attrition.org/errata/media/telegraph.001.html |archive-date=2023-06-05 |access-date=2024-07-04 |website=attrition.org}}</ref> |
On Feb 12, 2000, a hacker calling himself [[Dennis Moran (computer criminal)|Coolio]] redirected users from [[RSA Security|RSA Security's]] website to another hacked site in Colombia on which he left a message "owned by coolio".<ref>{{Cite news |date=2000-03-07 |title=´Coolio´ May Be Charged in Other Hacker Attacks |url=https://www.nytimes.com/2000/03/07/technology/acutecoolioacute-may-be-charged-in-other-hacker-attacks.html |archive-url=https://web.archive.org/web/20240518203553/https://www.nytimes.com/2000/03/07/technology/acutecoolioacute-may-be-charged-in-other-hacker-attacks.html |archive-date=2024-05-18 |access-date=2024-03-07 |work=The New York Times |language=en}}</ref> He was assumed to be a member of gH by [[Reuters]]. But law inforcement was searching "Coolio" lived in [[New Hampshire]], not gH member "Coolio" who resided in [[Southern California]].<ref>{{Cite web |last=Hopper |first=Ian |date=2000-02-16 |title=FBI investigation swamped with tips, continue to seek Midwest 'Coolio' |url=https://edition.cnn.com/2000/TECH/computing/02/16/dos.attacks.coolio/index.html |url-status=live |archive-url=https://web.archive.org/web/20220505211837/http://edition.cnn.com/2000/TECH/computing/02/16/dos.attacks.coolio/index.html |archive-date=2022-05-05 |access-date=2024-07-04 |website=CNN}}</ref><ref>{{Cite web |first= |date=2000-03-27 |title=Errata: Rajeev Syal of The Telegraph |url=https://attrition.org/errata/media/telegraph.001.html |url-status=live |archive-url=https://web.archive.org/web/20230605175858/https://attrition.org/errata/media/telegraph.001.html |archive-date=2023-06-05 |access-date=2024-07-04 |website=attrition.org}}</ref> |
||
In March 2000, Patrick Gregory or MostHateD, agreed to plead guilty to conspiracy to commit teleconferencing fraud and computer trespass. On March 31, he was arrested on charges of car theft and burglary by the local burglary squad. Later sheriff's department discovered that Gregory was expected in federal court. Due to his arrest, he missed an important federal court appointment where he was to plead guilty to computer trespass, telephone fraud and data theft.<ref>{{Cite web |last=van der Hoorn |first=Hielko |date=2000-03-29 |title=Hackersgroep Global Hell succesvol ontwapend |url=https://tweakers.net/nieuws/9941/hackersgroep-global-hell-succesvol-ontwapend.html |url-status=live |archive-url=https://web.archive.org/web/20150624151016/http://tweakers.net/nieuws/9941/hackersgroep-global-hell-succesvol-ontwapend.html |archive-date=2015-06-24 |access-date=2024-07-04 |website=Tweakers |language=NL}}</ref><ref>{{Cite web |last=Greene |first=Thomas C. |date=2000-03-30 |title=MostHateD to plead guilty |url=https://www.theregister.com/2000/03/30/mosthated_to_plead_guilty/ |url-status=live |archive-url=https://web.archive.org/web/20230203222650/https://www.theregister.com/2000/03/30/mosthated_to_plead_guilty/ |archive-date=2023-02-03 |access-date=2024-07-04 |website=The Register}}</ref><ref>{{Cite web |last=Greene |first=Thomas C. |date=2000-03-31 |title=MostHateD in gaol for burglarly |url=https://www.theregister.com/2000/03/31/mosthated_in_gaol_for_burglary/ |url-status=live |archive-url=https://web.archive.org/web/20221130231223/https://www.theregister.com/2000/03/31/mosthated_in_gaol_for_burglary/ |archive-date=2022-11-30 |access-date=2024-07-04 |website=The Register}}</ref> |
In March 2000, Patrick Gregory or MostHateD, agreed to plead guilty to conspiracy to commit teleconferencing fraud and computer trespass. On March 31, he was arrested on charges of car theft and burglary by the local burglary squad. Later sheriff's department discovered that Gregory was expected in federal court. Due to his arrest, he missed an important federal court appointment where he was to plead guilty to computer trespass, telephone fraud and data theft.<ref>{{Cite web |last=van der Hoorn |first=Hielko |date=2000-03-29 |title=Hackersgroep Global Hell succesvol ontwapend |url=https://tweakers.net/nieuws/9941/hackersgroep-global-hell-succesvol-ontwapend.html |url-status=live |archive-url=https://web.archive.org/web/20150624151016/http://tweakers.net/nieuws/9941/hackersgroep-global-hell-succesvol-ontwapend.html |archive-date=2015-06-24 |access-date=2024-07-04 |website=Tweakers |language=NL}}</ref><ref>{{Cite web |last=Greene |first=Thomas C. |date=2000-03-30 |title=MostHateD to plead guilty in gLobaL heLL hack case |url=https://www.theregister.com/2000/03/30/mosthated_to_plead_guilty/ |url-status=live |archive-url=https://web.archive.org/web/20230203222650/https://www.theregister.com/2000/03/30/mosthated_to_plead_guilty/ |archive-date=2023-02-03 |access-date=2024-07-04 |website=The Register}}</ref><ref>{{Cite web |last=Greene |first=Thomas C. |date=2000-03-31 |title=MostHateD in gaol for burglarly |url=https://www.theregister.com/2000/03/31/mosthated_in_gaol_for_burglary/ |url-status=live |archive-url=https://web.archive.org/web/20221130231223/https://www.theregister.com/2000/03/31/mosthated_in_gaol_for_burglary/ |archive-date=2022-11-30 |access-date=2024-07-04 |website=The Register}}</ref> |
||
On April 12, 2000, Patrick Gregory plead guilty to conspiracy for "computer hacking" and "telecommunications fraud". Gregory also admitted to stealing codes that allowed him to create illegal conference calls. Those conversations were some of the most important evidence against gH members. On September 6, 2000, he was sentenced to 26 months in prison and had pay $154,529.86 in restitution.<ref>{{Cite book |url=https://books.google.com/books?id=wzBOqbfxS6wC&dq=globalHell&pg=RA7-PA24 |title=Federal Probation |date=2000 |publisher=Administrative Office of the United States Courts |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134325/https://books.google.com/books?id=wzBOqbfxS6wC&newbks=0&printsec=frontcover&pg=RA7-PA24&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref><ref>{{Cite book |last= |first= |url=https://books.google.com/books?id=pyXLFAU1pgcC&dq=globalHell&pg=PA14 |title=Cracker Cracks |date=2000-04-17 |publisher=IDG Enterprise |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134129/https://books.google.co.in/books?id=pyXLFAU1pgcC&pg=PA14&dq=globalHell&hl=en&sa=X&ved=2ahUKEwiqjJDn_uGEAxXuqVYBHbLbBl04ChC7BXoECAUQBg#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref>{{Cite book |last= |first= |url=https://books.google.com/books?id=46MegYVa5u0C&dq=globalHell&pg=PA73 |title="Cyber Attack: Improving Prevention and Prosecution" : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining how to Combat Cyber Attacks by Improving Prevention and Prosecution, Scottsdale, AZ, April 21, 2000 |date=2001 |publisher=U.S. Government Printing Office |isbn=978-0-16-064807-6 |language=en |access-date=March 7, 2024 |archive-date=March 7, 2024 |archive-url=https://web.archive.org/web/20240307134017/https://books.google.com/books?id=46MegYVa5u0C&newbks=0&printsec=frontcover&pg=PA73&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref><ref>{{Cite web |last=Marshall |first=Bruce K. |title=Patrick Gregory used stolen conference call PINs and computer passwords to carry out his crimes |url=http://passwordresearch.com/stories/story59.html |url-status=live |archive-url=https://web.archive.org/web/20240704191740/http://passwordresearch.com/stories/story59.html |archive-date=2024-07-04 |access-date=2024-07-04 |website=PasswordResearch.com}}</ref> |
On April 12, 2000, Patrick Gregory plead guilty to conspiracy for "computer hacking" and "telecommunications fraud".<ref>{{Cite web |date=2000-04-12 |title='MostHateD' pleads to hacking crime |url=https://www.zdnet.com/article/mosthated-pleads-to-hacking-crime/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-03 |archive-url=https://web.archive.org/web/20240803155528/https://www.zdnet.com/article/mosthated-pleads-to-hacking-crime/ |url-status=live }}</ref> Gregory also admitted to stealing codes that allowed him to create illegal conference calls. Those conversations were some of the most important evidence against gH members. On September 6, 2000, he was sentenced to 26 months in prison and had pay $154,529.86 in restitution.<ref>{{Cite book |url=https://books.google.com/books?id=wzBOqbfxS6wC&dq=globalHell&pg=RA7-PA24 |title=Federal Probation |date=2000 |publisher=Administrative Office of the United States Courts |language=en |access-date=2024-03-07 |archive-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134325/https://books.google.com/books?id=wzBOqbfxS6wC&newbks=0&printsec=frontcover&pg=RA7-PA24&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref><ref>{{Cite book |last= |first= |url=https://books.google.com/books?id=pyXLFAU1pgcC&dq=globalHell&pg=PA14 |title=Cracker Cracks |date=2000-04-17 |publisher=IDG Enterprise |language=en |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307134129/https://books.google.co.in/books?id=pyXLFAU1pgcC&pg=PA14&dq=globalHell&hl=en&sa=X&ved=2ahUKEwiqjJDn_uGEAxXuqVYBHbLbBl04ChC7BXoECAUQBg#v=onepage&q=globalHell&f=false#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref>{{Cite book |last= |first= |url=https://books.google.com/books?id=46MegYVa5u0C&dq=globalHell&pg=PA73 |title="Cyber Attack: Improving Prevention and Prosecution" : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining how to Combat Cyber Attacks by Improving Prevention and Prosecution, Scottsdale, AZ, April 21, 2000 |date=2001 |publisher=U.S. Government Printing Office |isbn=978-0-16-064807-6 |language=en |access-date=March 7, 2024 |archive-date=March 7, 2024 |archive-url=https://web.archive.org/web/20240307134017/https://books.google.com/books?id=46MegYVa5u0C&newbks=0&printsec=frontcover&pg=PA73&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |url-status=live }}</ref><ref>{{Cite web |last=Marshall |first=Bruce K. |title=Patrick Gregory used stolen conference call PINs and computer passwords to carry out his crimes |url=http://passwordresearch.com/stories/story59.html |url-status=live |archive-url=https://web.archive.org/web/20240704191740/http://passwordresearch.com/stories/story59.html |archive-date=2024-07-04 |access-date=2024-07-04 |website=PasswordResearch.com}}</ref> |
||
== Members == |
== Members == |
||
*'''Patrick W. Gregory or MostHateD''' – Leader of the group. He was sentenced to 26 months' imprisonment and three years' supervised release. He received a reduced sentence for identifing other group members.<ref>{{cite web |date=2000-04-12 |title=SECOND "GLOBAL HELL" HACKER PLEADS GUILTY; PATRICK GREGORY FACES UP TO FIVE YEARS IN PRISON FOR CONSPIRACY TO COMMIT TELECOMMUNICATIONS FRAUD AND COMPUTER HACKING |url=http://www.usdoj.gov/criminal/cybercrime/gregory.htm |url-status=dead |archive-url=https://web.archive.org/web/20000619120801/http://www.usdoj.gov/criminal/cybercrime/gregory.htm |archive-date=2000-06-19 |access-date= |publisher=U.S. Department of Justice}}</ref><ref>{{Cite web |last=Poulson |first=Kevin |date=2001-07-05 |title=Max Vision begins 18-month term |url=https://www.theregister.com/2001/07/05/max_vision_begins_18month_term/ |website=The Register |access-date=2024-07-05 |archive-date=2024-05-12 |archive-url=https://web.archive.org/web/20240512070229/https://www.theregister.com/2001/07/05/max_vision_begins_18month_term/ |url-status=live }}</ref> |
*'''Patrick W. Gregory or MostHateD''' – Leader of the group. He was sentenced to 26 months' imprisonment and three years' supervised release. He received a reduced sentence for identifing other group members.<ref>{{cite web |date=2000-04-12 |title=SECOND "GLOBAL HELL" HACKER PLEADS GUILTY; PATRICK GREGORY FACES UP TO FIVE YEARS IN PRISON FOR CONSPIRACY TO COMMIT TELECOMMUNICATIONS FRAUD AND COMPUTER HACKING |url=http://www.usdoj.gov/criminal/cybercrime/gregory.htm |url-status=dead |archive-url=https://web.archive.org/web/20000619120801/http://www.usdoj.gov/criminal/cybercrime/gregory.htm |archive-date=2000-06-19 |access-date= |publisher=U.S. Department of Justice}}</ref><ref>{{Cite web |last=Poulson |first=Kevin |date=2001-07-05 |title=Max Vision begins 18-month term |url=https://www.theregister.com/2001/07/05/max_vision_begins_18month_term/ |website=The Register |access-date=2024-07-05 |archive-date=2024-05-12 |archive-url=https://web.archive.org/web/20240512070229/https://www.theregister.com/2001/07/05/max_vision_begins_18month_term/ |url-status=live }}</ref> |
||
*'''Chad Davis or Mindphasr''' – He was ordered to pay restitution to the U.S. Army and serve six months in prison, followed by three years of supervised release and was required to receive approval to use the Internet.<ref>{{Cite web |date=2000-03-01 |title=Chad Davis, "Global Hell" Hacker, Sentenced to Six Months in Prison, Three Years Probation, for Air Force Network Hacks |url=http://www.4law.co.il/da1.htm |url-status=live |archive-url=https://web.archive.org/web/20240209212847/http://www.4law.co.il/da1.htm |archive-date=2024-02-09 |access-date=2024-07-04 |website=www.4law.co.il}}</ref><ref>{{Cite web |date=2002-01-02 |title=DOJ charges teen with Pentagon hacking |url=https://www.cnet.com/tech/services-and-software/doj-charges-teen-with-pentagon-hacking/ |url-status=live |archive-url=https://web.archive.org/web/20230812213314/https://www.cnet.com/tech/services-and-software/doj-charges-teen-with-pentagon-hacking/ |archive-date=2023-08-12 |access-date=2024-07-04 |website=CNET |language=en}}</ref> |
*'''Chad Davis or Mindphasr''' – Davis admitted to being a member of Global Hell and cracking into a number of other websites. He was ordered to pay restitution to the U.S. Army and serve six months in prison, followed by three years of supervised release and was required to receive approval to use the Internet.<ref>{{Cite web |date=2000-03-01 |title=Chad Davis, "Global Hell" Hacker, Sentenced to Six Months in Prison, Three Years Probation, for Air Force Network Hacks |url=http://www.4law.co.il/da1.htm |url-status=live |archive-url=https://web.archive.org/web/20240209212847/http://www.4law.co.il/da1.htm |archive-date=2024-02-09 |access-date=2024-07-04 |website=www.4law.co.il}}</ref><ref>{{Cite web |date=2002-01-02 |title=DOJ charges teen with Pentagon hacking |url=https://www.cnet.com/tech/services-and-software/doj-charges-teen-with-pentagon-hacking/ |url-status=live |archive-url=https://web.archive.org/web/20230812213314/https://www.cnet.com/tech/services-and-software/doj-charges-teen-with-pentagon-hacking/ |archive-date=2023-08-12 |access-date=2024-07-04 |website=CNET |language=en}}</ref><ref>{{Cite book |last1=Schell |first1=Bernadette H. |url=https://books.google.com/books?id=f6jOEAAAQBAJ&dq=%22global+hell%22&pg=PA163 |title=Cybercrime: A Reference Handbook |last2=Martin |first2=Clemens |date=2004-10-18 |publisher=Bloomsbury Publishing USA |isbn=978-1-85109-688-6 |language=en |access-date=2024-07-20 |archive-date=2024-07-22 |archive-url=https://web.archive.org/web/20240722163919/https://books.google.com/books?id=f6jOEAAAQBAJ&dq=%22global+hell%22&pg=PA163#v=onepage&q=%22global%20hell%22&f=false |url-status=live }}</ref><ref>{{Cite web |last= |first= |date=2000-03-02 |title=ARMY WEB HACKER GIVEN 6-MONTH TERM |url=https://www.chicagotribune.com/2000/03/02/army-web-hacker-given-6-month-term/ |access-date=2024-07-19 |website=Chicago Tribune |language=en-US |archive-date=2024-07-22 |archive-url=https://web.archive.org/web/20240722163839/https://www.chicagotribune.com/2000/03/02/army-web-hacker-given-6-month-term/ |url-status=live }}</ref> |
||
*'''Eric Burns or''' '''Zyklon''' – pleaded guilty for defacing the White House website |
*'''Eric Burns or''' '''Zyklon''' – pleaded guilty for defacing the White House website |
||
*'''John Georgelas''' – He was a minor during the crackdown and was therefore not charged for his involvement. In 2006, sentenced to prison for unrelated cybercrime.<ref>{{Cite web |date=2006-08-15 |title=Former Data Technician at Local Internet Hosting Company and Self-Admitted Supporter of Pro-Jihad Website Sentenced to 34 Months for Attempting to Cause Damage to a Protected Computer |url=https://www.justice.gov/archive/usao/txn/PressRel06/georgelas_john_sen_pr.html |url-status=live |archive-url=https://web.archive.org/web/20221116211156/https://www.justice.gov/archive/usao/txn/PressRel06/georgelas_john_sen_pr.html |archive-date=2022-11-16 |access-date=2024-03-07 |website=www.justice.gov}}</ref><ref>{{Cite journal |date=April 2019 |title=CTCSENTINEL |url=https://ctc.westpoint.edu/wp-content/uploads/2019/04/CTC-SENTINEL-042019.pdf |journal=Combating Terrorism Center at West Point |volume=12 |issue=4 |pages=28 |archive-url=https://web.archive.org/web/20240512015643/https://ctc.westpoint.edu/wp-content/uploads/2019/04/CTC-SENTINEL-042019.pdf |archive-date=2024-05-12}}</ref> |
*'''John Georgelas''' – He was a minor during the crackdown and was therefore not charged for his involvement. In 2006, sentenced to prison for unrelated cybercrime.<ref>{{Cite web |date=2006-08-15 |title=Former Data Technician at Local Internet Hosting Company and Self-Admitted Supporter of Pro-Jihad Website Sentenced to 34 Months for Attempting to Cause Damage to a Protected Computer |url=https://www.justice.gov/archive/usao/txn/PressRel06/georgelas_john_sen_pr.html |url-status=live |archive-url=https://web.archive.org/web/20221116211156/https://www.justice.gov/archive/usao/txn/PressRel06/georgelas_john_sen_pr.html |archive-date=2022-11-16 |access-date=2024-03-07 |website=www.justice.gov}}</ref><ref>{{Cite journal |date=April 2019 |title=CTCSENTINEL |url=https://ctc.westpoint.edu/wp-content/uploads/2019/04/CTC-SENTINEL-042019.pdf |journal=Combating Terrorism Center at West Point |volume=12 |issue=4 |pages=28 |archive-url=https://web.archive.org/web/20240512015643/https://ctc.westpoint.edu/wp-content/uploads/2019/04/CTC-SENTINEL-042019.pdf |archive-date=2024-05-12}}</ref> |
||
*'''[[ne0h]]''' – A Canadian hacker, featured in Kevin Mitnick's book, "The Art of Intrusion".<ref name=":4">{{Cite web |last=Broersma |first=Matthew |date=1999-06-02 |title=Hackers: Government hacks pointless |url=https://www.zdnet.com/article/hackers-government-hacks-pointless/ |access-date=2024-08-02 |website=ZDNET |language=en |archive-date=2024-08-03 |archive-url=https://web.archive.org/web/20240803155530/https://www.zdnet.com/article/hackers-government-hacks-pointless/ |url-status=live }}</ref><ref>{{Cite book |last1=Mitnick |first1=Kevin D. |url=https://books.google.com/books?id=12_GLOhw5oEC |title=The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers |last2=Simon |first2=William L. |date=2009-03-17 |publisher=John Wiley & Sons |isbn=978-0-470-50382-9 |language=en |access-date=2024-08-02 |archive-date=2024-08-02 |archive-url=https://web.archive.org/web/20240802165641/https://www.google.co.in/books/edition/The_Art_of_Intrusion/12_GLOhw5oEC?hl=en&gbpv=0 |url-status=live }}</ref> |
|||
*'''[[ne0h]]''' – ne0h is a Canadian hacker, featured in Kevin Mitnick's book, "The Art of Intrusion", but ne0h's real identity is unknown. |
|||
*'''[[Dennis Moran (computer criminal)|Dennis Moran]] or Coolio''' – Longtime member<ref>{{Cite magazine |last= |first= |date=2000-03-09 |title=Coolio Goes to the Cooler |url=https://www.wired.com/2000/03/coolio-goes-to-the-cooler/ |url-status=live |archive-url=https://web.archive.org/web/20240307154012/https://www.wired.com/2000/03/coolio-goes-to-the-cooler/ |archive-date=2024-03-07 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref> |
*'''[[Dennis Moran (computer criminal)|Dennis Moran]] or Coolio''' – Longtime member<ref>{{Cite magazine |last= |first= |date=2000-03-09 |title=Coolio Goes to the Cooler |url=https://www.wired.com/2000/03/coolio-goes-to-the-cooler/ |url-status=live |archive-url=https://web.archive.org/web/20240307154012/https://www.wired.com/2000/03/coolio-goes-to-the-cooler/ |archive-date=2024-03-07 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref> |
||
*'''Russell Sanford or Egodeath'''<ref>{{Cite book |last1=Gallo |first1=Facundo |url=https://books.google.com/books?id=4Dd_AgAAQBAJ&dq=globalHell&pg=PA55 |title=Inseguridad informática |date=2010-03-09 |publisher=Lulu.com |isbn=978-1-4457-2054-8 |language=es |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307181346/https://books.google.com/books?id=4Dd_AgAAQBAJ&newbks=0&printsec=frontcover&pg=PA55&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref name=":0">{{Cite web |last=Meeks |first=Brock |date=1999-09-06 |title=Global Hell says it's going legit |url=https://www.zdnet.com/article/global-hell-says-its-going-legit/ |access-date=2024-05-18 |website=ZDNET |language=en |archive-date=2017-03-23 |archive-url=https://web.archive.org/web/20170323092642/http://www.zdnet.com/article/global-hell-says-its-going-legit/ |url-status=live }}</ref> |
*'''Russell Sanford or Egodeath'''<ref>{{Cite book |last1=Gallo |first1=Facundo |url=https://books.google.com/books?id=4Dd_AgAAQBAJ&dq=globalHell&pg=PA55 |title=Inseguridad informática |date=2010-03-09 |publisher=Lulu.com |isbn=978-1-4457-2054-8 |language=es |access-date=2024-03-07 |archive-url=https://web.archive.org/web/20240307181346/https://books.google.com/books?id=4Dd_AgAAQBAJ&newbks=0&printsec=frontcover&pg=PA55&dq=globalHell&hl=en#v=onepage&q=globalHell&f=false |archive-date=2024-03-07 |url-status=live}}</ref><ref name=":0">{{Cite web |last=Meeks |first=Brock |date=1999-09-06 |title=Global Hell says it's going legit |url=https://www.zdnet.com/article/global-hell-says-its-going-legit/ |access-date=2024-05-18 |website=ZDNET |language=en |archive-date=2017-03-23 |archive-url=https://web.archive.org/web/20170323092642/http://www.zdnet.com/article/global-hell-says-its-going-legit/ |url-status=live }}</ref> |
||
*'''Ben Crackel or Ben-z''' – Died on June 5, 2006<ref name=":0" /> |
*'''Ben Crackel or Ben-z''' – Died on June 5, 2006<ref name=":0" /> |
||
*'''Jason Allen Neff or Cl0pz''' – He avoided charges at the time. He later become a member of a gang of swatters under the name “CrazyJ”. He was also known as "Cl0pz420". He was also a member of [[Milw0rm]], 'partylinegaga' and other computer hacking and phreaking groups. He was arrested in 2011 for Swatting Conspiracy.<ref name=":1">{{Cite magazine |last=Poulsen |first=Kevin |date=2011-05-09 |title=Veteran of 90's Cyber Gang GlobalHell Charged in Swatting Conspiracy |url=https://www.wired.com/2011/05/neff/ |url-status=live |archive-url=https://web.archive.org/web/20231228122721/http://www.wired.com/2011/05/neff/ |archive-date=2023-12-28 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref><ref>{{Cite web |date=2010-09-02 |title=UNITED STATES OF AMERICA V. JASON NEFF |url=https://www.wired.com/images_blogs/threatlevel/2011/05/Jason_Neff.pdf |archive-url=https://web.archive.org/web/20231229091624/https://www.wired.com/images_blogs/threatlevel/2011/05/Jason_Neff.pdf |archive-date=2023-12-29 |access-date=2024-05-18}}</ref> |
*'''Jason Allen Neff or Cl0pz''' – He avoided charges at the time. He later become a member of a gang of swatters under the name “CrazyJ”. He was also known as "Cl0pz420". He was also a member of [[Milw0rm]], 'partylinegaga' and other computer hacking and phreaking groups. He was arrested in 2011 for Swatting Conspiracy.<ref name=":1">{{Cite magazine |last=Poulsen |first=Kevin |date=2011-05-09 |title=Veteran of 90's Cyber Gang GlobalHell Charged in Swatting Conspiracy |url=https://www.wired.com/2011/05/neff/ |url-status=live |archive-url=https://web.archive.org/web/20231228122721/http://www.wired.com/2011/05/neff/ |archive-date=2023-12-28 |access-date=2024-03-07 |magazine=Wired |language=en-US |issn=1059-1028}}</ref><ref>{{Cite web |date=2010-09-02 |title=UNITED STATES OF AMERICA V. JASON NEFF |url=https://www.wired.com/images_blogs/threatlevel/2011/05/Jason_Neff.pdf |archive-url=https://web.archive.org/web/20231229091624/https://www.wired.com/images_blogs/threatlevel/2011/05/Jason_Neff.pdf |archive-date=2023-12-29 |access-date=2024-05-18}}</ref> |
||
*'''p0gO'''<ref name=":4" /> |
|||
*'''[[YTCracker|ytcracker]]'''<ref>{{Cite web |last= |first= |date=2000-03-05 |title=『サービス拒否』攻撃の少年容疑者が別の容疑で起訴へ |url=https://wired.jp/2000/03/06/%E3%80%8E%E3%82%B5%E3%83%BC%E3%83%93%E3%82%B9%E6%8B%92%E5%90%A6%E3%80%8F%E6%94%BB%E6%92%83%E3%81%AE%E5%B0%91%E5%B9%B4%E5%AE%B9%E7%96%91%E8%80%85%E3%81%8C%E5%88%A5%E3%81%AE%E5%AE%B9%E7%96%91%E3%81%A7/ |archive-url=https://web.archive.org/web/20240519132438/https://wired.jp/2000/03/06/%E3%80%8E%E3%82%B5%E3%83%BC%E3%83%93%E3%82%B9%E6%8B%92%E5%90%A6%E3%80%8F%E6%94%BB%E6%92%83%E3%81%AE%E5%B0%91%E5%B9%B4%E5%AE%B9%E7%96%91%E8%80%85%E3%81%8C%E5%88%A5%E3%81%AE%E5%AE%B9%E7%96%91%E3%81%A7/ |archive-date=2024-05-19 |access-date=2024-05-19 |website=WIRED.jp |language=ja-JP}}</ref> |
*'''[[YTCracker|ytcracker]]'''<ref>{{Cite web |last= |first= |date=2000-03-05 |title=『サービス拒否』攻撃の少年容疑者が別の容疑で起訴へ |url=https://wired.jp/2000/03/06/%E3%80%8E%E3%82%B5%E3%83%BC%E3%83%93%E3%82%B9%E6%8B%92%E5%90%A6%E3%80%8F%E6%94%BB%E6%92%83%E3%81%AE%E5%B0%91%E5%B9%B4%E5%AE%B9%E7%96%91%E8%80%85%E3%81%8C%E5%88%A5%E3%81%AE%E5%AE%B9%E7%96%91%E3%81%A7/ |archive-url=https://web.archive.org/web/20240519132438/https://wired.jp/2000/03/06/%E3%80%8E%E3%82%B5%E3%83%BC%E3%83%93%E3%82%B9%E6%8B%92%E5%90%A6%E3%80%8F%E6%94%BB%E6%92%83%E3%81%AE%E5%B0%91%E5%B9%B4%E5%AE%B9%E7%96%91%E8%80%85%E3%81%8C%E5%88%A5%E3%81%AE%E5%AE%B9%E7%96%91%E3%81%A7/ |archive-date=2024-05-19 |access-date=2024-05-19 |website=WIRED.jp |language=ja-JP}}</ref> |
||
*'''dieSl0w'''<ref name=":1" /> |
*'''dieSl0w'''<ref name=":1" /> |
||
*''' |
*'''VallaH''' – A former Microsoft programmer. He lost his job as a Microsoft contractor.<ref name=":0" /><ref>{{Cite book |last1=Boni |first1=William C. |url=https://books.google.com/books?id=xExwyMshBEIC&dq=%22vallah%22+%22global+hell%22&pg=PA87 |title=Netspionage: The Global Threat to Information |last2=Kovacich |first2=Gerald L. |date=2000-09-25 |publisher=Butterworth-Heinemann |isbn=978-0-7506-7257-3 |language=en |access-date=2024-05-18 |archive-date=2024-05-18 |archive-url=https://web.archive.org/web/20240518192321/https://books.google.co.in/books?id=xExwyMshBEIC&pg=PA87&lpg=PA87&dq=%22vallah%22+%22global+hell%22&source=bl&ots=g_AvySQl7K&sig=ACfU3U1DwbaIEcIGZm4YHAFgNbRaAN-ueg&hl=en&sa=X&ved=2ahUKEwic7aeu9peGAxXBTmwGHX4GDPMQ6AF6BAgbEAM#v=onepage&q=%22vallah%22%20%22global%20hell%22&f=false |url-status=live }}</ref> |
||
*'''nostalg1c'''<ref name=":0" /> |
*'''nostalg1c'''<ref name=":0" /> |
||
*'''f0bic'''<ref name=":0" /> |
*'''f0bic'''<ref name=":0" /> |
Latest revision as of 07:52, 9 August 2024
globalHell (known as 'gH') was an American hacker group. They were one of the first hacking groups who gained notoriety for website defacements and breaches. The combined losses caused by the group were estimated to be ranged between $1.5m and $2.5m.[1] The group was called a "cyber gang" as it had many of the same characteristics of a gang and carried out the same activities as a gang, including trafficking in stolen credit card numbers.[2]
Formation | February 1998 |
---|---|
Founder | Patrick W. Gregory (MostHateD), Chad Davis (Mindphasr) |
Dissolved | 1999 |
Purpose | Hacking |
Membership | 20-25 (in 1998-1999) |
Official language | English |
Leader | Patrick W. Gregory (MostHateD) |
Global Hell was more concerned with gaining notoriety for defacing prominent Web sites than with destroying or capturing sensitive information.[3] The members of the group were responsible for breaking and defacing around 115 sites. A few of the systems they broke into include those of United States Army, White House, United States Cellular, Ameritech, US Postal Service, NASA and National Oceanic and Atmospheric Administration.[4][5] The group disbanded in 1999 due to being prosecuted for computer intrusion.[1] IRC channel called #feed-the-goats was the home of hacking group.[6][7]
History
[edit]The group was founded by Patrick Gregory and Chad Davis in February 1998. Gregory was a member of a street gang who turned to cyberspace to escape from the gang.[8] Between 1998 and 2000, the group's membership was estimated between 15 and 20.[9]
In April 1999, the group invaded computer systems operated by the White House, the U.S. Army, Ameritech, U.S. Cellular and several other companies. On May 2, 1999, hackers invaded the White House website and put a picture of flowered panties on its home page.[10] Along with gH, a group called 'Hong Kong Danger Duo' also took part in the White House hack.[11]
On May 8, 1999, FBI agents arrested Eric Burns, known as Zyklon, charging him with multiple felony counts of computer intrusion, causing damage in excess of $40,000. On May 9, 1999, FBI launched raids on suspected members.[12][13][14][15]
On May 27, the group retaliated for doing searches of nine of its members by the FBI by flooding the FBI Web site with thousands of requests for access.[16] The FBI shut down the site as to not cause anymore damage to the server. A hacker named 'Israeli Ghost' took credit for the attack on the FBI’s site.[17] Over the next week, Global Hell also attacked the Virginia Senate.[18][19] Hackers from other organizations defaced website of United States Department of the Interior and a site run by an Idaho-based federal supercomputer laboratory. A note threatening the destruction of the computers "if the FBI doesn't stop" was posted on a site maintained by the Idaho National Laboratory.[20][21][22][23][24] Global Hell was not able break into classified servers.[25][26]
Two members of the group were willing to cooperate. Through them, they got the address of Davis (Mindphasr). On June 2, FBI raided the Davis's apartment and he admitted being a member.[27] On June 28, at 2:14 a.m., Davis gained access to the Army's website and put a message "Global Hell is alive. Global Hell will not die".[28][29] He also gained access to an unidentified Army network and modified the computer files. The website was tampered with for as long as nine hours.[30] Public access was restored within two hours of knowing. After this attack, the Army switched its website from Microsoft's Windows NT servers to WebStar servers running Mac OS.[31][32][33][34]
Davis was arrested on August 30, 1999,[35] and he pleaded guilty on January 4, 2000. On March 1, 2000, he received a six-month jail term and three years' probation. He was ordered to pay restitution in the amount of $8,054. Davis was the first person to be arrested in this investigation.[36][37][38][39][40][41]
Burns pleaded guilty to his charges on September 7, 1999. On November 19, 1999, he was sentenced to 15 months in prison and three years' probation, plus an order to pay $36,240 in restitution to his victims. Burns was prohibited from using a computer for three years.[42]
In December 1999, Curador, a Wales-based 16-year-old member of the group reportedly compromised 26 companies, including a number of ISPs. When authorities tracked him down and confiscated his system, they found more than 200,000 Pacific Bell Internet user accounts of which 63,000 were already cracked.[43][44] PacBell, then a part of SBC Communications, responded by asking the affected customers to change their passwords immediately.[45] Losses were estimated to be $3 million.[46][47]
The group disbanded in 1999 as 12 participants in the group have been prosecuted for computer intrusions and about 30 more have faced lesser penalties.[48][49]
On Feb 12, 2000, a hacker calling himself Coolio redirected users from RSA Security's website to another hacked site in Colombia on which he left a message "owned by coolio".[50] He was assumed to be a member of gH by Reuters. But law inforcement was searching "Coolio" lived in New Hampshire, not gH member "Coolio" who resided in Southern California.[51][52]
In March 2000, Patrick Gregory or MostHateD, agreed to plead guilty to conspiracy to commit teleconferencing fraud and computer trespass. On March 31, he was arrested on charges of car theft and burglary by the local burglary squad. Later sheriff's department discovered that Gregory was expected in federal court. Due to his arrest, he missed an important federal court appointment where he was to plead guilty to computer trespass, telephone fraud and data theft.[53][54][55]
On April 12, 2000, Patrick Gregory plead guilty to conspiracy for "computer hacking" and "telecommunications fraud".[56] Gregory also admitted to stealing codes that allowed him to create illegal conference calls. Those conversations were some of the most important evidence against gH members. On September 6, 2000, he was sentenced to 26 months in prison and had pay $154,529.86 in restitution.[57][58][59][60]
Members
[edit]- Patrick W. Gregory or MostHateD – Leader of the group. He was sentenced to 26 months' imprisonment and three years' supervised release. He received a reduced sentence for identifing other group members.[61][62]
- Chad Davis or Mindphasr – Davis admitted to being a member of Global Hell and cracking into a number of other websites. He was ordered to pay restitution to the U.S. Army and serve six months in prison, followed by three years of supervised release and was required to receive approval to use the Internet.[63][64][65][66]
- Eric Burns or Zyklon – pleaded guilty for defacing the White House website
- John Georgelas – He was a minor during the crackdown and was therefore not charged for his involvement. In 2006, sentenced to prison for unrelated cybercrime.[67][68]
- ne0h – A Canadian hacker, featured in Kevin Mitnick's book, "The Art of Intrusion".[69][70]
- Dennis Moran or Coolio – Longtime member[71]
- Russell Sanford or Egodeath[72][73]
- Ben Crackel or Ben-z – Died on June 5, 2006[73]
- Jason Allen Neff or Cl0pz – He avoided charges at the time. He later become a member of a gang of swatters under the name “CrazyJ”. He was also known as "Cl0pz420". He was also a member of Milw0rm, 'partylinegaga' and other computer hacking and phreaking groups. He was arrested in 2011 for Swatting Conspiracy.[74][75]
- p0gO[69]
- ytcracker[76]
- dieSl0w[74]
- VallaH – A former Microsoft programmer. He lost his job as a Microsoft contractor.[73][77]
- nostalg1c[73]
- f0bic[73]
- Jaynus[73]
- Loophole[78]
- icbm[78]
- Mnemonic[73]
- obsolete[73]
- Altomo[79]
- shekk[80]
References
[edit]- ^ a b "Global Hell hacker to plead guilty, Part I". ZDNET. 2000-03-30. Archived from the original on 2023-06-02. Retrieved 2024-03-07.
- ^ Marion, Nancy E.; Twede, Jason (2020-10-06). Cybercrime: An Encyclopedia of Digital Crime. Bloomsbury Publishing USA. ISBN 978-1-4408-5735-5. Archived from the original on 2024-05-18.
- ^ Electronic Crime Needs Assessment for State and Local Law Enforcement. U.S. Department of Justice, Office of Justice Programs, National Institute of Justice. 2001. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ "Hacking Like it's 1999". Wired. 2006-08-23. ISSN 1059-1028. Archived from the original on 2023-06-03. Retrieved 2024-03-07.
- ^ Harrison, Ann; Ohlson, Kathleen (1999-07-05). Crackers Used Known Weakness on Fed Sites. IDG Enterprise. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Zetter, Kim. "Final Conspirator in Credit Card Hacking Ring Gets 5 Years". Wired. ISSN 1059-1028. Archived from the original on 2021-08-01. Retrieved 2024-07-19.
- ^ Zetter, Kim. "Coder Journeys From Wall Street to Prison". Wired. ISSN 1059-1028. Archived from the original on 2023-05-10. Retrieved 2024-07-19.
- ^ Erbschloe, Michael (2001). Information Warfare: How to Survive Cyber Attacks. Osborne/McGraw-Hill. ISBN 978-0-07-213260-1. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Sachs, Marcus; Parker, Tom; Shaw, Eric; Stroz, Ed (2004-07-09). Cyber Adversary Characterization: Auditing the Hacker Mind. Elsevier. ISBN 978-0-08-047699-5. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Clark, David Leon (2003). Enterprise Security: The Manager's Defense Guide. Addison-Wesley Professional. ISBN 978-0-201-71972-7. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Meeks, Brock (1999-05-11). "White House Web site shut down". ZDNET. Archived from the original on 2024-08-02. Retrieved 2024-08-02.
- ^ Newton, Michael (2003). The Encyclopedia of High-tech Crime and Crime-fighting. Infobase Publishing. ISBN 978-1-4381-2986-0. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ "FBI on offensive in 'cyber war,' raiding hackers' homes". CNN. 1999-06-24. Archived from the original on 2023-09-28. Retrieved 2024-07-04.
- ^ Burrough, Bryan (2000-06-01). "Invisible Enemies". Vanity Fair. Archived from the original on 2022-11-29. Retrieved 2024-07-19.
- ^ "STATEMENT OF JANET RENO ATTORNEY GENERAL OF THE UNITED STATES BEFORE THE UNITED STATES SENATE COMMITTEE ON APPROPRIATIONS SUBCOMMITTEE ON COMMERCE, JUSTICE, AND STATE THE JUDICIARY AND RELATED AGENCIES". www.justice.gov. 2000-02-16. Archived from the original on 2021-04-14. Retrieved 2024-07-19.
- ^ Simons, John (1999-06-01). "FBI Conducts Hacker Raids Amid Web-Site Break-Ins". The Wall Street Journal. Archived from the original on 2024-08-09. Retrieved 2024-08-09.
- ^ Meeks, Brock (1999-05-26). "Hack attack knocks out FBI site". ZDNET. Archived from the original on 2024-08-02. Retrieved 2024-08-02.
- ^ Hack Attack. IDG Network World Inc. 1999-05-31. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Richardson, Tim (1999-05-28). "FBI site still down after hack attack". The Register. Archived from the original on 2005-01-18. Retrieved 2024-07-04.
- ^ Kaplan, Lee (1999-05-28). "FBI Wages War With Hackers". CBS. Archived from the original on 2017-03-21. Retrieved 2024-07-04.
- ^ Taylor, Chris (1999-06-14). "Geeks vs. G-Men". TIME. Archived from the original on 2024-07-04. Retrieved 2024-07-04.
- ^ Bell, Steve (2002-08-01). "The web's most wanted". The Guardian. ISSN 0261-3077. Archived from the original on 2024-08-03. Retrieved 2024-07-19.
- ^ Meeks, Brock (1999-05-27). "Feds vs. hackers: The battle widens". ZDNET. Archived from the original on 2024-08-02. Retrieved 2024-08-02.
- ^ Meeks, Brock (1999-05-31). "More government sites hacked". ZDNET. Archived from the original on 2024-07-05. Retrieved 2024-08-02.
- ^ Fitzgerald, Michael (1999-06-02). "FBI missing the real hacking threat?". ZDNET. Archived from the original on 2024-08-03. Retrieved 2024-08-02.
- ^ "HACKERS DELIGHT IN GOVERNMENT WEB WORRIES". Hartford Courant. 1999-07-10. Archived from the original on 2024-08-09. Retrieved 2024-08-09.
- ^ Schwartz, John (1999-06-02). "Online Security Is Pentagon's Latest Battle". Washington Post. Archived from the original on 2024-07-04. Retrieved 2024-07-04.
- ^ Departments of Commerce, Justice, and State, the Judiciary, and Related Agencies Appropriations for 2001: Hearings Before a Subcommittee of the Committee on Appropriations, House of Representatives, One Hundred Sixth Congress, Second Session. U.S. Government Printing Office. 2000. Archived from the original on 2024-07-22. Retrieved 2024-07-20.
- ^ "Army site latest hacking target". ZDNET. 1999-06-28. Archived from the original on 2024-08-02. Retrieved 2024-08-02.
- ^ "Army site falls prey to hackers". BBC. 1999-06-29. Archived from the original on 2024-02-06. Retrieved 2024-07-19.
- ^ "U.S. Army Web Site Discontinues Its Use of NT". HPCwire. 1999-09-17. Archived from the original on 2024-07-04. Retrieved 2024-07-04.
- ^ Dickey, Connie E. (1999-09-01). "Web page hacker arrested, government sites becoming more secure". irp.fas.org. Archived from the original on 2024-07-04. Retrieved 2024-07-04.
- ^ Ohlson, Kathleen (1999-09-06). Feds Arrest Teen Hacker. IDG Enterprise. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ "FBI Arrests Teenager Suspected As Hacker of Pentagon System". WSJ. 1999-09-01. Archived from the original on 2024-07-15. Retrieved 2024-08-09.
- ^ "Teen hacker arrested". ZDNET. 1999-09-01. Archived from the original on 2024-08-03. Retrieved 2024-08-02.
- ^ Suro, Roberto (1999-09-01). "The Hackers Who Won't Quit". Washington Post. Archived from the original on 2022-12-06. Retrieved 2024-03-07.
- ^ "Tips on Technology". Saipan Tribune. 1999-09-15. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Sine Pari. U.S. Army Special Operations Command. 1997. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Shandor, John (1999-09-03). "Wisconsin Teen Charged with Pentagon Hacking". HPCwire. Archived from the original on 2024-07-04. Retrieved 2024-07-04.
- ^ "WISCONSIN HACKER CHARGED WITH MILITARY BREAK-IN". www.justice.gov. 1999-08-30. Archived from the original on 2022-09-14. Retrieved 2024-07-04.
- ^ "FBI charges teen with hacking Army unclassified network". Route Fifty. 1999-09-03. Archived from the original on 2024-07-19. Retrieved 2024-07-19.
- ^ "MostHateD to Plead Most Guilty". Wired. 2000-03-29. ISSN 1059-1028. Archived from the original on 2023-12-10. Retrieved 2024-03-07.
- ^ Lemos, Robert (2000-01-07). "Teen hacks 27 ISPs, gains root access". ZDNET. Retrieved 2024-08-02.
- ^ McClure, Stuart; Scambray, Joel (2000-01-24). Hacking frenzy shows network security breaches are not about to go out of fashion. InfoWorld Media Group, Inc. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Gettleman, Jeffrey (2000-01-12). "Passwords of PacBell Net Accounts Stolen". Los Angeles Times. Archived from the original on 2024-06-01. Retrieved 2024-07-04.
- ^ "CYBER ATTACK: IMPROVING PREVENTION AND PROSECUTION'". www.govinfo.gov. 2000-04-21. Archived from the original on 2023-09-29. Retrieved 2024-07-05.
- ^ "White House". web.textfiles.com. Archived from the original on 2021-05-27. Retrieved 2024-07-05.
- ^ Auchard, Eric (2000-03-04). Hacker cleared of Yahoo attack, but hit other sites. Pittsburgh Post-Gazette. Archived from the original on 18 May 2024.
- ^ "Top 10 Most Notorious Hacking Groups of All Time". Cyware Labs. 2016-07-26. Archived from the original on 2022-05-23. Retrieved 2024-03-07.
- ^ "´Coolio´ May Be Charged in Other Hacker Attacks". The New York Times. 2000-03-07. Archived from the original on 2024-05-18. Retrieved 2024-03-07.
- ^ Hopper, Ian (2000-02-16). "FBI investigation swamped with tips, continue to seek Midwest 'Coolio'". CNN. Archived from the original on 2022-05-05. Retrieved 2024-07-04.
- ^ "Errata: Rajeev Syal of The Telegraph". attrition.org. 2000-03-27. Archived from the original on 2023-06-05. Retrieved 2024-07-04.
- ^ van der Hoorn, Hielko (2000-03-29). "Hackersgroep Global Hell succesvol ontwapend". Tweakers (in Dutch). Archived from the original on 2015-06-24. Retrieved 2024-07-04.
- ^ Greene, Thomas C. (2000-03-30). "MostHateD to plead guilty in gLobaL heLL hack case". The Register. Archived from the original on 2023-02-03. Retrieved 2024-07-04.
- ^ Greene, Thomas C. (2000-03-31). "MostHateD in gaol for burglarly". The Register. Archived from the original on 2022-11-30. Retrieved 2024-07-04.
- ^ "'MostHateD' pleads to hacking crime". ZDNET. 2000-04-12. Archived from the original on 2024-08-03. Retrieved 2024-08-02.
- ^ Federal Probation. Administrative Office of the United States Courts. 2000. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Cracker Cracks. IDG Enterprise. 2000-04-17. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ "Cyber Attack: Improving Prevention and Prosecution" : Hearing Before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Sixth Congress, Second Session, on Examining how to Combat Cyber Attacks by Improving Prevention and Prosecution, Scottsdale, AZ, April 21, 2000. U.S. Government Printing Office. 2001. ISBN 978-0-16-064807-6. Archived from the original on March 7, 2024. Retrieved March 7, 2024.
- ^ Marshall, Bruce K. "Patrick Gregory used stolen conference call PINs and computer passwords to carry out his crimes". PasswordResearch.com. Archived from the original on 2024-07-04. Retrieved 2024-07-04.
- ^ "SECOND "GLOBAL HELL" HACKER PLEADS GUILTY; PATRICK GREGORY FACES UP TO FIVE YEARS IN PRISON FOR CONSPIRACY TO COMMIT TELECOMMUNICATIONS FRAUD AND COMPUTER HACKING". U.S. Department of Justice. 2000-04-12. Archived from the original on 2000-06-19.
- ^ Poulson, Kevin (2001-07-05). "Max Vision begins 18-month term". The Register. Archived from the original on 2024-05-12. Retrieved 2024-07-05.
- ^ "Chad Davis, "Global Hell" Hacker, Sentenced to Six Months in Prison, Three Years Probation, for Air Force Network Hacks". www.4law.co.il. 2000-03-01. Archived from the original on 2024-02-09. Retrieved 2024-07-04.
- ^ "DOJ charges teen with Pentagon hacking". CNET. 2002-01-02. Archived from the original on 2023-08-12. Retrieved 2024-07-04.
- ^ Schell, Bernadette H.; Martin, Clemens (2004-10-18). Cybercrime: A Reference Handbook. Bloomsbury Publishing USA. ISBN 978-1-85109-688-6. Archived from the original on 2024-07-22. Retrieved 2024-07-20.
- ^ "ARMY WEB HACKER GIVEN 6-MONTH TERM". Chicago Tribune. 2000-03-02. Archived from the original on 2024-07-22. Retrieved 2024-07-19.
- ^ "Former Data Technician at Local Internet Hosting Company and Self-Admitted Supporter of Pro-Jihad Website Sentenced to 34 Months for Attempting to Cause Damage to a Protected Computer". www.justice.gov. 2006-08-15. Archived from the original on 2022-11-16. Retrieved 2024-03-07.
- ^ "CTCSENTINEL" (PDF). Combating Terrorism Center at West Point. 12 (4): 28. April 2019. Archived from the original (PDF) on 2024-05-12.
- ^ a b Broersma, Matthew (1999-06-02). "Hackers: Government hacks pointless". ZDNET. Archived from the original on 2024-08-03. Retrieved 2024-08-02.
- ^ Mitnick, Kevin D.; Simon, William L. (2009-03-17). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers. John Wiley & Sons. ISBN 978-0-470-50382-9. Archived from the original on 2024-08-02. Retrieved 2024-08-02.
- ^ "Coolio Goes to the Cooler". Wired. 2000-03-09. ISSN 1059-1028. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ Gallo, Facundo (2010-03-09). Inseguridad informática (in Spanish). Lulu.com. ISBN 978-1-4457-2054-8. Archived from the original on 2024-03-07. Retrieved 2024-03-07.
- ^ a b c d e f g h Meeks, Brock (1999-09-06). "Global Hell says it's going legit". ZDNET. Archived from the original on 2017-03-23. Retrieved 2024-05-18.
- ^ a b Poulsen, Kevin (2011-05-09). "Veteran of 90's Cyber Gang GlobalHell Charged in Swatting Conspiracy". Wired. ISSN 1059-1028. Archived from the original on 2023-12-28. Retrieved 2024-03-07.
- ^ "UNITED STATES OF AMERICA V. JASON NEFF" (PDF). 2010-09-02. Archived from the original (PDF) on 2023-12-29. Retrieved 2024-05-18.
- ^ "『サービス拒否』攻撃の少年容疑者が別の容疑で起訴へ". WIRED.jp (in Japanese). 2000-03-05. Archived from the original on 2024-05-19. Retrieved 2024-05-19.
- ^ Boni, William C.; Kovacich, Gerald L. (2000-09-25). Netspionage: The Global Threat to Information. Butterworth-Heinemann. ISBN 978-0-7506-7257-3. Archived from the original on 2024-05-18. Retrieved 2024-05-18.
- ^ a b "FBI HACKS INTO WEB OF INTRUDERS". Chicago Tribune. 1999-05-29. Archived from the original on 2024-05-18. Retrieved 2024-05-18.
- ^ "H a c k e r N e w s N e t w o r k". www.gbppr.net. Archived from the original on 2024-05-18. Retrieved 2024-05-19.
- ^ "[gH] Alive as ever. [gH]". afturgurluk.org. Archived from the original on 2024-05-18. Retrieved 2024-05-19.
External links
[edit]- Total defacements by globalHell Archived 2022-12-27 at the Wayback Machine
- YTCracker – #antisec Lyrics Archived 2023-03-31 at the Wayback Machine
- 20/20 Monday interview