But there have been computer and network hacks for, well, pretty much as long as we've had computers and networks. The motives behind these intrusions have ranged from curiosity to paranoia (see McKinnon, Gary), through today -- when most high-profile hacks are driven by either greed or some form of ideology.
[ Learn how to greatly reduce the threat of malicious attacks with InfoWorld's Insider Threat Deep Dive PDF special report. | Stay up to date on the latest security developments with InfoWorld's Security Adviser blog and Security Central newsletter. ]
[Related slideshow: Rogues Gallery 2: Ten infamous hacks and hackers]
Here are 10 hacking incidents through history that made some of the biggest headlines.
Markus Hess hacks on behalf of the KGB
A German citizen recruited by the KGB to spy for the Soviets in the 1980s, Hess was tasked with breaking into U.S. military computers to obtain classified information.
From the University of Bremen in Germany, Hess used the German Datex-P network via satellite link or transatlantic cable to the Tymnet International Gateway. He was able to eventually attack 400 U.S. military computers, including those at military installations in Germany and Japan, as well as machines at MIT in Cambridge, Massachusetts and the OPTIMIS Database at the Pentagon.
Hess' activity was eventually detected by Clifford Stoll, an astronomer turned systems administrator of the computer center of the Lawrence Berkeley Laboratory (LBL) in California. Hess was found guilty of espionage and sentenced to one to three years in prison.
After Hess' capture, Stoll wrote about the experience in a book titled "The Cuckoo's Egg."
Robert Morris hacks the Internet
As a graduate student at Cornell University in 1988, Robert Morris created what would come to be known as the first worm on the Internet. Morris has said he created the worm not for damage, but to give him an idea of the size of the Web. In order to hide the worms origins at Cornell, Morris released it from MIT, unleashing it to exploit vulnerabilities in Unix sendmail, finger, and rsh/rexec. However, a design flaw caused the worm to replicate itself at higher levels than Morris has intended, overloading systems and causing damage significant damage.
After he was identified as the source of the worm, Robert Morris became the first person convicted under the Computer Fraud and Abuse Act in 1990. Morris was sentenced to three years of probation, 400 hours of community service, a fine of $10,050, and the costs of his supervision.