10 Mastermind Hackers That Outplayed Everyone (even NASA)

Video Statistics and Information

Video
Captions Word Cloud
Captions
[Music] hackers will they hack your emails phone camera bank account<font color="#E5E5E5"> 50 million Facebook</font> users<font color="#E5E5E5"> data taken over during a</font><font color="#CCCCCC"> cyber</font> <font color="#CCCCCC">attack</font><font color="#E5E5E5"> online security breach is not a</font> new term<font color="#E5E5E5"> in recent years as hackers can</font> break into everything<font color="#CCCCCC"> from your Gmail</font> <font color="#CCCCCC">account and your phone camera to</font> election results as the world is getting <font color="#E5E5E5">increasingly digital everything becomes</font> more<font color="#E5E5E5"> accessible to</font><font color="#CCCCCC"> hackers</font><font color="#E5E5E5"> so as long as</font> <font color="#E5E5E5">the Internet is a thing</font> hackers are here to stay<font color="#CCCCCC"> but some of</font> them outshine others<font color="#E5E5E5"> by applying their</font> <font color="#CCCCCC">skills in the most surprising ways</font><font color="#E5E5E5"> in</font> this video we will explore the most extreme hackers and their stories<font color="#E5E5E5"> which</font> we assure you will make you rethink the idea<font color="#CCCCCC"> of using</font><font color="#E5E5E5"> the same password</font><font color="#CCCCCC"> for</font> several different<font color="#CCCCCC"> accounts so</font><font color="#E5E5E5"> before</font> entering the digital<font color="#E5E5E5"> underworld</font><font color="#CCCCCC"> press</font> those subscribe and<font color="#CCCCCC"> bell buttons</font><font color="#E5E5E5"> so</font><font color="#CCCCCC"> you</font> don't miss any upcoming videos<font color="#E5E5E5"> number 10</font> <font color="#E5E5E5">Kevin Poulsen</font><font color="#CCCCCC"> as harmless as he looks</font> this<font color="#E5E5E5"> is Kevin</font><font color="#CCCCCC"> Paulsen</font><font color="#E5E5E5"> one of the most</font> notorious hackers in USA history he under the alias dark<font color="#CCCCCC"> Daunte</font><font color="#E5E5E5"> raised some</font> <font color="#CCCCCC">Inferno back in his peak days</font> <font color="#E5E5E5">Polson became notorious back in the</font> <font color="#CCCCCC">1990s after hacking telephone company</font> computers in order<font color="#E5E5E5"> to</font><font color="#CCCCCC"> manipulate</font><font color="#E5E5E5"> the</font> phone lines leading<font color="#E5E5E5"> to Los Angeles</font><font color="#CCCCCC"> radio</font> stations so he could be the<font color="#E5E5E5"> winning</font> caller<font color="#E5E5E5"> in phone in radio contests among</font> the<font color="#CCCCCC"> prizes</font><font color="#E5E5E5"> that he got himself this way</font> were<font color="#CCCCCC"> $20,000</font><font color="#E5E5E5"> in cash and a Porsche 944</font> s2<font color="#CCCCCC"> Cabriolet</font><font color="#E5E5E5"> but it's the hacking</font><font color="#CCCCCC"> into</font> the federal investigation<font color="#E5E5E5"> database that</font> really got him into trouble<font color="#CCCCCC"> he attracted</font> the authorities attention<font color="#E5E5E5"> and had to go</font> into<font color="#E5E5E5"> hiding for 18</font><font color="#CCCCCC"> months</font><font color="#E5E5E5"> after</font><font color="#CCCCCC"> which</font><font color="#E5E5E5"> he</font> got arrested <font color="#E5E5E5">and was sentenced to five years</font><font color="#CCCCCC"> in</font> prison<font color="#CCCCCC"> at the time</font><font color="#E5E5E5"> the longest u.s.</font> sentencing for hacking number<font color="#E5E5E5"> nine</font> <font color="#E5E5E5">Jorge Potts</font><font color="#CCCCCC"> George</font><font color="#E5E5E5"> Hotz also known as</font> <font color="#CCCCCC">Gio</font><font color="#E5E5E5"> had started building his</font><font color="#CCCCCC"> reputation</font> as a serious<font color="#E5E5E5"> hacker he became the first</font> reported person in history<font color="#E5E5E5"> to</font><font color="#CCCCCC"> be able</font><font color="#E5E5E5"> to</font> <font color="#E5E5E5">say this this event was so huge</font><font color="#CCCCCC"> that</font> <font color="#CCCCCC">George Hotz was contacted by a</font> millionaire and given an offer<font color="#E5E5E5"> that he</font> <font color="#CCCCCC">simply couldn't refuse to trade an</font> unlocked<font color="#CCCCCC"> iphone for three new iPhones</font> and a Nissan 350z<font color="#E5E5E5"> at the time to buy a</font> <font color="#E5E5E5">new car like this you must have had a</font> spare<font color="#E5E5E5"> 28,000</font><font color="#CCCCCC"> dollars lying around</font><font color="#E5E5E5"> or an</font> unlocked<font color="#CCCCCC"> iphone this was only the start</font> for<font color="#E5E5E5"> hots because in the following years</font> <font color="#E5E5E5">he hacked the Sony</font><font color="#CCCCCC"> Playstation 3</font><font color="#E5E5E5"> and got</font> in legal trouble for doing<font color="#CCCCCC"> it</font> <font color="#CCCCCC">sues by Sony</font><font color="#E5E5E5"> and in 2015</font><font color="#CCCCCC"> he picked yet</font> another fight this time with the man himself<font color="#CCCCCC"> Elon Musk</font><font color="#E5E5E5"> Potts was offered a</font> position with<font color="#CCCCCC"> the</font><font color="#E5E5E5"> multi-million dollar</font> business to develop<font color="#CCCCCC"> autopilot software</font> but he<font color="#E5E5E5"> declined</font> instead<font color="#E5E5E5"> Potts tried achieving this</font> ambition himself<font color="#E5E5E5"> number 8</font><font color="#CCCCCC"> Jonathan</font><font color="#E5E5E5"> James</font> some 15<font color="#CCCCCC"> year-olds play fortnight in</font> their free time<font color="#E5E5E5"> while others hack into</font> NASA<font color="#CCCCCC"> and the Pentagon just because why</font> <font color="#CCCCCC">not this was the case for</font><font color="#E5E5E5"> Jonathan James</font> who went under the name comrade<font color="#E5E5E5"> he was the first juvenile in the</font> USA to be sentenced for computer hacking <font color="#CCCCCC">back in 2000</font> <font color="#E5E5E5">James intruded on government systems and</font> obtained<font color="#E5E5E5"> the source code for the</font> International<font color="#E5E5E5"> Space</font><font color="#CCCCCC"> Station this means</font> he<font color="#E5E5E5"> got access to the software which was</font> responsible<font color="#CCCCCC"> for controlling the physical</font> environment<font color="#CCCCCC"> of the</font><font color="#E5E5E5"> station once NASA</font> detected the intrusion they had to shut <font color="#CCCCCC">down their computers for</font><font color="#E5E5E5"> three weeks</font><font color="#CCCCCC"> in</font> <font color="#E5E5E5">order to fix this</font> even though James didn't get away<font color="#CCCCCC"> with</font> <font color="#CCCCCC">it one can</font><font color="#E5E5E5"> say that he did them a favor</font> <font color="#E5E5E5">because he</font><font color="#CCCCCC"> revealed huge security</font><font color="#E5E5E5"> flaws</font> as he explained it<font color="#E5E5E5"> they lack some</font> serious computer security and the hard <font color="#E5E5E5">part is learning it</font><font color="#CCCCCC"> you can't say that</font> he's wrong<font color="#CCCCCC"> since he did all this by</font> using<font color="#E5E5E5"> only an old-school Pentium</font> computer number<font color="#E5E5E5"> seven kevin Mitnick from</font> the way this guy looks it's almost impolite<font color="#CCCCCC"> to say that he's</font> <font color="#E5E5E5">the most wanted computer criminal in</font> United States history<font color="#CCCCCC"> as the US</font> Department of<font color="#E5E5E5"> Justice</font><font color="#CCCCCC"> once called him</font> kevin<font color="#CCCCCC"> Mitnick skills were visible from a</font> very young age<font color="#CCCCCC"> at age</font><font color="#E5E5E5"> 13 his</font> <font color="#CCCCCC">entertainment was</font><font color="#E5E5E5"> hacking into phone</font> systems<font color="#E5E5E5"> little did he know that some</font> years<font color="#CCCCCC"> later he would receive a five-year</font> prison sentence with eight months in a <font color="#E5E5E5">confinement cell law enforcement</font> officers were so afraid of his hacking skills<font color="#E5E5E5"> that during his trial</font><font color="#CCCCCC"> the judge</font> was told that he<font color="#E5E5E5"> could start a nuclear</font> war<font color="#E5E5E5"> by whistling into a payphone</font> <font color="#CCCCCC">Mitnick built such a reputation by</font> breaking<font color="#E5E5E5"> into the networks of companies</font> <font color="#E5E5E5">like IBM Nokia and Motorola</font><font color="#CCCCCC"> but today</font> Mitnick<font color="#E5E5E5"> is free and no longer feared by</font> these<font color="#CCCCCC"> companies in fact chances are they</font> are<font color="#E5E5E5"> now his clients because he</font> reinvented himself<font color="#E5E5E5"> by switching sides</font> <font color="#CCCCCC">he's also written several books about</font> his<font color="#E5E5E5"> wild online days he is</font><font color="#CCCCCC"> no longer</font><font color="#E5E5E5"> a</font> security<font color="#CCCCCC"> braking intruder but a white</font> hat hacker who helps companies to solve their security issues<font color="#E5E5E5"> number</font><font color="#CCCCCC"> six</font> Xbox Underground<font color="#E5E5E5"> gamers will understand</font> <font color="#E5E5E5">when the</font><font color="#CCCCCC"> games good</font><font color="#E5E5E5"> you just have to</font> explore every<font color="#CCCCCC"> map</font><font color="#E5E5E5"> in every level of it</font> and then<font color="#E5E5E5"> hack into the systems of the</font> company<font color="#E5E5E5"> that</font><font color="#CCCCCC"> developed the game</font><font color="#E5E5E5"> right</font> <font color="#CCCCCC">well that's</font><font color="#E5E5E5"> what an international hacker</font> <font color="#E5E5E5">group the Xbox Underground did not only</font> <font color="#E5E5E5">did they intrude on systems of such</font> companies<font color="#CCCCCC"> as</font><font color="#E5E5E5"> Activision valve or Epic</font> <font color="#E5E5E5">Games they reportedly broke into</font> Microsoft's<font color="#E5E5E5"> Network and stole secret</font> credentials<font color="#E5E5E5"> so they could physically</font> <font color="#E5E5E5">walk into the Microsoft headquarters in</font> Redmond USA<font color="#E5E5E5"> they got into this place and</font> <font color="#E5E5E5">took</font><font color="#CCCCCC"> 3 not yet released versions of the</font> Xbox<font color="#E5E5E5"> one console with them as they</font> <font color="#E5E5E5">themselves explained they were driven by</font> a strong curiosity<font color="#CCCCCC"> number</font><font color="#E5E5E5"> 5</font><font color="#CCCCCC"> Gary</font> <font color="#E5E5E5">McKinnon</font><font color="#CCCCCC"> a</font><font color="#E5E5E5"> Scottish hacker who raised</font> havoc under the name of<font color="#E5E5E5"> solo will not be</font> forgiven<font color="#CCCCCC"> any time soon</font><font color="#E5E5E5"> by NASA working</font> <font color="#CCCCCC">as a system administrator by day and a</font> hacker at night<font color="#E5E5E5"> solo was accused of</font> hacking into 97 NASA computers in the early 2000s<font color="#E5E5E5"> not only did he hack into</font> them he found<font color="#E5E5E5"> and allegedly deleted</font> <font color="#E5E5E5">critically important data and other</font> files that<font color="#E5E5E5"> were stored on these</font> computers your security system is crap I am<font color="#CCCCCC"> solo</font><font color="#E5E5E5"> I will continue to disrupt at</font> the highest<font color="#E5E5E5"> levels was the message that</font> <font color="#E5E5E5">the hacker left yet once he was caught</font> <font color="#CCCCCC">he was accused of causing 700,000</font> <font color="#E5E5E5">dollars worth of damage</font> but Gary McKinnon<font color="#E5E5E5"> is famous not only for</font> <font color="#CCCCCC">that</font><font color="#E5E5E5"> allegedly what he found in those</font> computers consisted of<font color="#CCCCCC"> top-secret</font> <font color="#CCCCCC">information about UFO cover-ups and</font> similar government secrets he managed to reveal all<font color="#CCCCCC"> of these while hacking from</font> <font color="#E5E5E5">his girlfriend's aunt's house number</font> <font color="#CCCCCC">four hey Jeanne</font><font color="#E5E5E5"> Oh Oh Cho</font><font color="#CCCCCC"> ah</font><font color="#E5E5E5"> this is</font> something other<font color="#E5E5E5"> than what</font><font color="#CCCCCC"> you might</font> think<font color="#E5E5E5"> it's the signature of</font><font color="#CCCCCC"> that Texan</font> hacker <font color="#CCCCCC">hey Jeanne</font><font color="#E5E5E5"> Oh Oh Cho ah under the</font> <font color="#E5E5E5">nickname of</font><font color="#CCCCCC"> wormer would leave behind</font> him in<font color="#E5E5E5"> systems that he hacked into</font> ironically<font color="#E5E5E5"> the</font><font color="#CCCCCC"> same picture would</font> eventually become his own downfall <font color="#CCCCCC">wormer and his hacker buddies formed a</font> group called<font color="#CCCCCC"> cabin crew</font> together<font color="#E5E5E5"> they hacked into the police and</font> other US<font color="#E5E5E5"> law</font><font color="#CCCCCC"> enforcement agencies online</font> databases<font color="#E5E5E5"> where they gained access to</font> <font color="#E5E5E5">secret</font><font color="#CCCCCC"> information</font><font color="#E5E5E5"> one time</font><font color="#CCCCCC"> after</font> hacking into<font color="#E5E5E5"> a certain database and</font> leaving<font color="#CCCCCC"> behind the signature bikini</font> picture<font color="#E5E5E5"> the FBI saw it as an opportunity</font> <font color="#E5E5E5">to</font><font color="#CCCCCC"> capture him they tracked down</font><font color="#E5E5E5"> the GPS</font> coordinates<font color="#CCCCCC"> from</font><font color="#E5E5E5"> the very same bikini</font> photo<font color="#E5E5E5"> it led to warmers girlfriend's</font> house<font color="#E5E5E5"> and it served as evidence against</font> the hacker in his trial<font color="#E5E5E5"> three years in</font> prison<font color="#CCCCCC"> was not</font><font color="#E5E5E5"> enough to punish him his</font> <font color="#E5E5E5">parole agreement includes a prohibition</font> for him from<font color="#E5E5E5"> connecting</font><font color="#CCCCCC"> to the internet</font> <font color="#CCCCCC">so that's how</font><font color="#E5E5E5"> he lives today offline</font> <font color="#E5E5E5">that must be rather bizarre because that</font> <font color="#E5E5E5">still doesn't stop him from</font><font color="#CCCCCC"> working as a</font> programmer<font color="#E5E5E5"> number three</font><font color="#CCCCCC"> yawn Crisler</font> fingerprints<font color="#CCCCCC"> a feature that</font><font color="#E5E5E5"> makes each</font> one<font color="#CCCCCC"> of us unique</font><font color="#E5E5E5"> since even identical</font> <font color="#CCCCCC">twins have</font><font color="#E5E5E5"> different fingerprints yet</font> <font color="#E5E5E5">this German hacker</font><font color="#CCCCCC"> Yan Crisler also</font> known as the star bug decided to prove that it's not<font color="#CCCCCC"> that</font><font color="#E5E5E5"> difficult to get</font><font color="#CCCCCC"> a</font> hold of someone else's<font color="#E5E5E5"> fingerprints and</font> not<font color="#E5E5E5"> just anyone</font><font color="#CCCCCC"> else's</font><font color="#E5E5E5"> but the</font> fingerprints of the<font color="#E5E5E5"> German defense</font> <font color="#E5E5E5">minister he found some</font><font color="#CCCCCC"> high-resolution</font> photos online<font color="#CCCCCC"> which were enough for him</font> to<font color="#CCCCCC"> be able to</font><font color="#E5E5E5"> successfully recreate her</font> fingerprints<font color="#E5E5E5"> not only that in 2013 when</font> the<font color="#CCCCCC"> iPhone 5s was released</font> starbug defeated<font color="#CCCCCC"> apple's thumbprint</font> verification system<font color="#E5E5E5"> within 24 hours of</font> <font color="#CCCCCC">the release number</font><font color="#E5E5E5"> two John Kane while</font> most hackers<font color="#E5E5E5"> can press their computer</font> keyboards faster than Beethoven could play his piano<font color="#E5E5E5"> other ackers indeed play</font> piano<font color="#E5E5E5"> faster than they pressed their</font> computer keyboards<font color="#E5E5E5"> one such was John</font> Kane<font color="#CCCCCC"> a pianist who</font><font color="#E5E5E5"> after</font><font color="#CCCCCC"> having</font> discovered a minor glitch<font color="#CCCCCC"> in a video</font> poker machine<font color="#CCCCCC"> the</font><font color="#E5E5E5"> game king</font><font color="#CCCCCC"> in Las</font><font color="#E5E5E5"> Vegas</font> <font color="#CCCCCC">made sure not to miss</font><font color="#E5E5E5"> the opportunity</font> <font color="#CCCCCC">together with his friend Andre Nestor</font> they exploited<font color="#E5E5E5"> this glitch and made half</font> a million dollars<font color="#CCCCCC"> also they got into big</font> legal<font color="#E5E5E5"> trouble</font><font color="#CCCCCC"> all</font><font color="#E5E5E5"> these guys did is</font> simply push a sequence<font color="#E5E5E5"> of buttons that</font> <font color="#CCCCCC">they were legally entitled</font><font color="#E5E5E5"> to push their</font> lawyer argued and they won<font color="#E5E5E5"> the case</font> number one<font color="#CCCCCC"> seven Chan org hackers</font> obviously hackers can be dangerous<font color="#CCCCCC"> but</font> some of them<font color="#E5E5E5"> can be literally</font><font color="#CCCCCC"> dangerous</font> as they are<font color="#E5E5E5"> able to inflict physical</font> damage<font color="#CCCCCC"> on</font><font color="#E5E5E5"> to their victims</font><font color="#CCCCCC"> the first</font> <font color="#E5E5E5">computer attack of this kind happened</font> back<font color="#CCCCCC"> in 2008</font><font color="#E5E5E5"> when a group of Anonymous</font> hackers<font color="#CCCCCC"> hacked into</font><font color="#E5E5E5"> the</font><font color="#CCCCCC"> website of the</font> Epilepsy Foundation of America where they spammed the support forum with numerous flashing animated gifs<font color="#E5E5E5"> keeping</font> in mind that<font color="#CCCCCC"> people with epilepsy are</font> very sensitive<font color="#CCCCCC"> to bright imagery this</font> attack caused users to get<font color="#CCCCCC"> a headache</font> <font color="#E5E5E5">and even have seizures the attack was</font> <font color="#CCCCCC">planned</font><font color="#E5E5E5"> on 7 Chan org</font><font color="#CCCCCC"> a website</font><font color="#E5E5E5"> that is</font> <font color="#E5E5E5">known</font><font color="#CCCCCC"> to be a</font><font color="#E5E5E5"> fortress</font><font color="#CCCCCC"> for these kind of</font> hackers<font color="#E5E5E5"> even though all these hackers</font> indeed sound menacing it's important to remember that<font color="#E5E5E5"> most of them have either</font> been stopped<font color="#E5E5E5"> or switched sides</font><font color="#CCCCCC"> meaning</font> <font color="#CCCCCC">that they are</font><font color="#E5E5E5"> applying their genius to</font> track and stop<font color="#E5E5E5"> other criminal activity</font> <font color="#CCCCCC">therefore as long</font><font color="#E5E5E5"> as your password is</font> more difficult than something<font color="#CCCCCC"> like</font><font color="#E5E5E5"> this</font> you should<font color="#E5E5E5"> be fine like this video press</font> <font color="#CCCCCC">though</font><font color="#E5E5E5"> subscribe notification and like</font> buttons to make it easier for<font color="#E5E5E5"> us to make</font> <font color="#E5E5E5">more</font><font color="#CCCCCC"> videos for you</font><font color="#E5E5E5"> in the near future</font> <font color="#E5E5E5">so</font><font color="#CCCCCC"> we can continue fighting boredom</font> together you [Music]
Info
Channel: Bored Panda
Views: 1,752,412
Rating: 4.6418386 out of 5
Keywords: Hackers, famous hackers, dangerous hackers, top hackers, hacker stories, hackers caught, hackers who got caught, crafty hackers, hacker, best hackers, government hackers, nasa hackers, nasa, xbox undeground, xbox hackers, xbox hacked, cyber security, what hackers can do, mastermind, mastermind hacker, hackers famous, pentagon hacking, nasa hacking, computer genius, first hacked iphone, famous hacker in the world, hacking the government, hacking the fbi, bored panda
Id: cypeCErr0Ac
Channel Id: undefined
Length: 12min 16sec (736 seconds)
Published: Wed Nov 07 2018
Reddit Comments
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.