- Jonathan James
Jonathan Joseph James (
December 12 ,1983 -May 18 ,2008 ), a.k.a. "c0mrade", was an American hacker who was the first juvenile incarcerated forcybercrime in the United States.cite book |last= Newton |first= Michael |title=The Encyclopedia of High-Tech Crime and Crime-Fighting |publisher=Checkmark Books , an imprint ofFacts on File Inc. |year= 2004 |id= ISBN 0-8160-4979-3 ] TheSouth Florida native was 15 years old at the time of the first offense and 16 years old on the date of his sentencing. He died on May 18th, 2008. [cite news | last = | first = | coauthors = | title = Obituary: Jonathan Joseph James | work = | pages = | language =The Miami Herald | publisher = | date = 2008-05-21 | url = http://www.legacy.com/herald/DeathNotices.asp?Page=LifeStory&PersonID=110095968 | accessdate = 2008-05-21] [http://bp3.blogger.com/_RHlbb7bCY0E/SEFYlNo06tI/AAAAAAAAAOs/dn638NQg4Sw/s1600-h/jon.jpg]Initial Department of Defense intrusion
Between August 23, 1999, and October 27, 1999, James committed a series of intrusions into various systems, including those of
BellSouth and the Miami-Dade school system. [Grossman, M. [http://www.infosecnews.org/hypermail/0010/2885.html "Computer crime: Changing the public's perception"] . "The Miami Herald", October 12, 2000.] What brought him to the attention of federal authorities, however, was his intrusion into the computers of theDefense Threat Reduction Agency , a division of theUnited States Department of Defense , the primary function of which is to analyze potential threats to the United States of America, both at home and abroad. James later admitted to authorities that he had installed an unauthorized backdoor in acomputer server in Dulles,Virginia , which he used to install asniffer that allowed him to intercept over three thousand messages passing to and from DTRA employees, along with numerous usernames and passwords of other DTRA employees, including at least 10 on official military computers. It was this use of the sniffer that would later earn him a charge of illegal wiretapping (although he would later plead out of it).NASA intrusion
After these system intrusions were detected, a previous intrusion was also traced back to James, into
NASA computers this time. These attacks occurred on June 29-30, 1999, during which James targeted a number of computers at theMarshall Space Flight Center in Huntsville,Alabama . NASA alleged that James had downloaded proprietary software worth $1.7 million dollars. This intrusion, when detected, caused NASA to shut down its computers for three weeks that July, costing $41,000 to check and fix its systems.It was later revealed that the precise software obtained was the
International Space Station 'ssource code controlling critical life-sustaining elements. According to NASA, "the software supported the International Space Station's physical environment, including control of the temperature and humidity within the living space." [ [http://www.itsecurity.com/features/top-10-famous-hackers-042407/ Top 10 Most Famous Hackers of All Time] at ITsecurity.com]Arrest, conviction and sentencing
James' house was raided around six o'clock on the morning of
January 26 ,2000 , by agents from the Department of Defense,NASA and local police. James was formally indicted six months later. On September 21, 2000, he entered into an agreement with the U.S. Attorney Guy Lewis: he would plead guilty to two counts ofjuvenile delinquency in exchange for a lenient sentence.James was sentenced to six months in prison and probation until the age of eighteen, and was required to write letters of apology to
NASA and the Department of Defense. He was also banned from using computers for recreational purposes.Lynch, I. [http://www.iwr.co.uk/vnunet/news/2114114/nasa-hacker-gets-six-months-downtime "Nasa hacker gets six months downtime"] . "Information World Review", November 21, 2000. Retrieved March 4, 2007.] However, the judge in the case later reversed her decision and allowed James to serve his six months under house arrest, with probation until the age of twenty one. James later violated that probation and was then subsequently taken into custody by theUnited States Marshals Service and flown to anAlabama federal correctional facility where he ultimately served his six months.Fact|date=March 2007Legal experts said that, given the extent of his intrusions, he would have served at least ten years if he had been an adult. Both
Attorney General Janet Reno and prosecuting attorney Guy Lewis issued statements claiming the James case was proof the Justice Department was willing to get tough with juvenile offenders accused ofcybercrime . [Stout, D. (2000). [http://select.nytimes.com/gst/abstract.html?res=FA091FFE3D5E0C708EDDA00894D8404482&n=Top%2fReference%2fTimes%20Topics%2fOrganizations%2fN%2fNational%20Aeronautics%20And%20Space%20Administration%20 "Youth Sentenced in Government Hacking Case"] . "The New York Times", September 23, 2000. Retrieved March 4, 2007.]Although the case was sealed due to his age, he did speak to the media about the charges as part of his plea agreement.Fact|date=March 2007
Tactics
Although the specific details aren't clear, it has been said that on his Gateway Pentium 266Harrison, L. [http://www.theregister.co.uk/2000/09/22/bedroom_nasa_hacker_set/ "Bedroom NASA hacker set to bite pillow in choky"] . "
The Register ", September 22, 2000. Retrieved March 4, 2007.] he used the popularnmap port scan to scan hosts for, among other things, then-largely unknown flaws in several ofSun Microsystems 'remote procedure call services in order to gain unauthorized access to the computer systems. Once on a system, he would search for information on it, and try to branch out. He would usually set up a sniffer to get further access to the network.ee also
*
List of convicted computer criminals References
External links
* [http://www.pbs.org/wgbh/pages/frontline/shows/hackers/interviews/anon.html Anonymous interview] with Jonathan James for Frontline, on PBS.org
* [http://www.usdoj.gov/opa/pr/2000/September/555crm.htm Document detailing the Indictment]
* [http://www.attrition.org/mirror/attrition/1999/05/02/www.bellsouth.com/ Defaced BellSouth Website]
Wikimedia Foundation. 2010.