词条 | Jerome Heckenkamp |
释义 |
Jerome Heckenkamp (October 28, 1979 – March 8, 2016)[1] was an Australian-American computer expert. After completing his education at a young age, he worked as a computer network engineer. He was later convicted of hacking attacks on several prominent corporations and universities. Early life and educationHeckenkamp was born in the Australia state of New South Wales. His family moved to Pewaukee Wisconsin when he was young. He was homeschooled as a child, and proved to be an exceptionally intelligent student. He taught himself algebra at age 8 and entered the University of Wisconsin–Waukesha at age 14. He later moved to the University of Wisconsin–Madison where he pursued a graduate degree in Computer Science. He had also lectured on computer programming at the University of New Mexico.[2] CareerThe FBI had suspected that Heckenkamp was involved with hacking before he graduated, but did not immediately bring charges against him. After leaving his university, he was employed at Los Alamos National Laboratory as a computer network engineer. Officials at Los Alamos have stated that he never held a security clearance and did not work with classified information, although Heckenkamp had claimed that he worked in a highly sensitive area. Senator Pete Domenici said of Heckenkamp, "He had the right kind of brain, but he didn't have the right kind of behavior."[2] HackingHe was accused of hacking into the networks of multiple corporations, including Qualcomm, Juniper Networks, E-Trade, eBay, Lycos, and others. According to victim testimony, these attacks caused tens of thousands of dollars' damage.[3] In December 1999 a UNIX system administrator at Qualcomm noticed the attacks to computers in their external DMZ and from their externally accessible SSH gateway host, Qualcomm notified the FBI and began to track the attacks through several network hops, several days later they contacted the University of Wisconsin, where the originating attacks had been launched from. During their own investigation, University of Wisconsin system administrators then noticed that the connections had come from a University mail server, then using their own NetFlow logs, they tracked the packets to an IP registered to one of the dorms. Allegedly, the IP responsible for the attacks was assigned to a second computer in Heckenkamp's dorm room. Having previously worked at the university's computer help desk, Heckenkamp had significant knowledge of the university networks.[4] Although law enforcement had requested that they delay action, system administrators hacked into Heckenkamp's computer and gathered further evidence against him, citing the emergency threat to the university network after Heckenkamp gained root access to their servers.[5] Although Heckenkamp challenged the evidence gained through the search of his computer as an invasion of privacy, the legality of the university's actions was upheld on appeal.[4] Legal battlesHeckenkamp had steadfastly maintained his innocence, claiming that someone else used his computer to launch attacks and that none of the evidence definitively links him to criminal activities.[2] After being prosecuted he was represented by Jennifer Granick, then the clinical director of the Center for Internet and Society at Stanford Law School. During the proceedings, however, he fired and rehired Granick several times. While representing himself in court, he insisted that the charges against him were not valid because the government capitalized every letter of his name on the legal documents, while he only capitalized the first letter. He also claimed the prosecuting attorneys, representing the United States, had not brought their client to court. Neither of these tactics were successful.[3] Heckenkamp eventually entered into a plea bargain in which he admitted guilt and was sentenced to time served, after spending eight months in prison.[4] References1. ^{{cite web|title=In Memory of Jerome T. Heckenkamp|url=http://beckerritter.com/memsol.cgi?page=profile§ion=info&user_id=1758930|website=Becker Ritter Funeral Home|accessdate=30 March 2016|ref=Obituary}}{{dead link|date=November 2017 |bot=InternetArchiveBot |fix-attempted=yes }} 2. ^1 2 {{cite news|last=Clark|first=Heather|title=Los Almos Employee Denies Hacking|url=http://abcnews.go.com/Technology/story?id=99203&|accessdate=3 April 2010|newspaper=ABC News|date=12 January 2002}} 3. ^1 {{cite news|last=Kirby|first=Carrie|title=Hacker suspect sent to jail after hearing|url=http://articles.sfgate.com/2002-03-20/business/17537033_1_hacking-charges-maximum-sentence-court-appearance|accessdate=3 April 2010|newspaper=San Francisco Chronicle|date=20 March 2002}} 4. ^1 2 {{cite news|last=Jaschick|first=Scott|title=Defining Privacy -- and its Limits|url=http://www.insidehighered.com/layout/set/dialog/layout/set/print/news/2007/04/09/heckenkamp|accessdate=3 April 2010|newspaper=Inside Higher Ed|date=9 April 2007}} 5. ^{{cite news|last=Poulson|first=Kevin|title=Court Okays Counter-Hack of eBay Hacker’s Computer|url=https://www.wired.com/threatlevel/2007/04/court_okays_cou/|accessdate=3 April 2010|newspaper=Wired News|date=6 April 2007}} External links
7 : 1979 births|2016 deaths|American people of Australian descent|American computer criminals|University of Wisconsin–Madison alumni|People from New South Wales|People from Pewaukee, Wisconsin |
随便看 |
|
开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。