Hacking is not a new problem nor is it isolated to one country
Vietnam vet John Draper uses the giveaway whistle in a Cap'n Crunch cereal box and a homebuilt "blue box" to make free phone calls. When Esquire publishes a how-to guide for making blue boxes, incidents of wire fraud in the US skyrocket.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
College kids Steve Wozniak and Steve Jobs, future founders of Apple Computer, launch a home business making and selling blue boxes - illegal telephone attachments that hacked into phone systems, allowing the user to make free long-distance calls.
The Chaos Computer Club forms in Germany and becomes one of the most influential hacker organisations in Europe.
In Milwaukee, six teenagers go on a hacking spree lasting several months, during which they break into computers at high-profile institutions such as the Los Alamos National Laboratory and the Memorial Sloan-Kettering Cancer Center.
The movie War Games opens in cinemas.
Congress passes the Computer Fraud and Abuse Act, making it a crime to break into computer systems.
The hacker mag Decoder launches in Italy.
Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is charged with causing $4m in damage to a Digital Equipment computer, stealing a highly secret computer security system and gaining access to unauthorised MCI long-distance codes through university computers in Los Angeles and England. Mitnick serves five months in prison and six months in a rehab programme. He goes on the run in late 1992, when the US Federal Bureau of Investigation searches for him for alleged parole violations.
Hackers in West Germany are arrested for breaking into US corporate and government systems and selling OS source code to the KGB.
Rumours are rampant that a virus called Michelangelo will crash computers on 6 March 1992, the artist's 517th birthday. Nothing happens.
Russian hackers, led by Vladamir Levin, siphon $10m from Citibank and disperse it to bank accounts around the world. Levin is caught, and all but $400,000 is recovered.
The Brotherhood of Warez, a Canadian hacker group, breaks into the Canadian Broadcasting website.
A 15-year-old Croatian breaks into computers at a US Air Force base in Guam.
A 19-year-old Israeli hacker, Ehud Tenebaum, leads a string of break-ins into Pentagon computers and steals software programs. Tenebaum is arrested but is later appointed to be chief technology officer of a computer consulting firm.
Two hackers are sentenced to death in China for breaking into a bank's computer network and stealing the equivalent of $31,325.
President Clinton announces he will propose that the government spend $1.46bn in FY00 to improve government computer security.
A Russian hacker tries to extort $100,000 from online music retailer CD Universe and threatens to expose customer credit card numbers. He posts them on a website after his extortion attempt fails.
Canadian hacker Mafiaboy launches a denial-of-service attack, taking down Amazon.com, CNN.com and Yahoo in the process.
President Clinton admits he doesn't e-mail his daughter Chelsea at college because he doesn't think the medium is secure.
The I Love You virus spreads quickly around the globe by sending copies of itself to everyone in a computer's address book.
A Dutch hacker releases the Anna Kournikova virus, punishing the legions of people who attempt to view what they think to be a sexy photo of the Russian tennis star.
FBI agent Robert Hanssen is arrested and charged with using his computer skills to spy for the Russians.
The FBI tricks two Russian hackers into coming to the US to reveal how they were breaking into US banks.
Tensions between the US and China set off a chain of web defacements by hackers from both countries, dubbed "The Sixth Network War of National Defense".
In the wake of 9/11, new anti-terrorism laws are passed, many defining hackers as terrorists.
As a part of its Trustworthy Computing initiative, Microsoft shuts down Windows development and puts 8,000 programmers through security training.
The Klez.H worm surpasses all other viruses to date in the number of computers it has infected.
The US convicts a Kazakhstan hacker of breaking into Bloomberg's computers and attempted extortion.
To find out what goes on inside a hacker's mind, click here>>