RedLawList

Straightforward, actionable information for life’s common legal matters

Find an attorney at REDLAWLIST.ORG

Online Directory of Workers' Compensation, Personal Injury,
Consumer Protection and Criminal Defense Attorneys

  • Home
  • Blog
  • Knowledge Center
Home / Criminal Law / 5 Famous Cyber Crime Cases

5 Famous Cyber Crime Cases

March 19, 2021 By RedLawList Editor

famous cyber crime cases

It’s the subject of movies, TV dramas and conspiracy theories. It’s an area of criminal law that’s still evolving. It’s called cyber crime. Even allowing for all the crazy rumors that circulate the Internet, there are plenty of instances when it’s for real.

Here are 5 famous cyber crime cases.

1. Russia hits Yahoo

A pair of Russian agents, Dmitry Dokuchaev and Igor Suschin, hired a hacker to penetrate the Yahoo Network with the aim of getting names, phone numbers and password access. The hacker, Aleksey Belan from the Baltic states that border Russia, began his work in late 2013 and hit his target in 2014.

Belan installed a backdoor on a Yahoo server that allowed him to get access, then stole a backup copy of Yahoo’s database, which he transferred to his own computer. All of Yahoo’s 3 billion accounts were impacted in what was the biggest data breach in history.

Yahoo was in the process of being sold to Verizon at the time the breach was announced. Suffice it to say, Belan’s hack made for a loss of value in the sale, to the tune of $350 million.

2. UFO cover-up?

Gary McKinnon was looking for evidence that would prove there were UFO cover-ups in the United States government. In 2001-02, McKinnon hacked into government-owned systems and ended up infiltrating nearly 100 U.S. military and NASA computers. McKinnon, not lacking in flair, left the message “Your security is crap” on the military websites he penetrated.

The U.S. wanted the Scotland-born McKinnon extradited on charges of terrorism. After he was subsequently diagnosed with Asperger’s syndrome, British Prime Minister Theresa May halted the extradition on human rights grounds. McKinnon stood trial in 2012 and all charges were dropped.

3. America’s most wanted

Kevin David Mitnick began hacking when he was 12 years old, using his skills to get free bus rides in his hometown of Los Angeles all the way back in 1975. By the time he was 16 years old, Mitnick pulled off a $1 million theft of software from the Digital Equipment Corporation.

He spent 1 year in prison for that crime and upon his release, he hacked into the voicemail of Pacific Bell. A warrant was issued and he went on the run for 2 years, earning the title of “the most wanted hacker in America.” Mitnick was eventually caught and did 5 years’ prison time.

4. Hacking the Pentagon

At the tender of age 15, Jonathan James hacked into NASA and the Pentagon back in 1999. Using the name “C0mrade,” James stole software and data valued at nearly $2 million and forced NASA to shut down for 21 days. Not content with being the first person to successfully hack the Defense Department, James went on to breach the security at prominent private firms.

By the age of 16, he was arrested and pleaded guilty. His age kept his sentence at a modest 6-month house arrest and being banned from the computer until he was 18. The story, unfortunately, has a tragic ending. Eight years later, James was accused of stealing credit card information. He denied the charges and took his own life.

5. Mafia Boy

Mafia Boy was the handle for Michael Calce, who was infiltrating Amazon, Dell, CNN, eBay and Yahoo before he was old enough to get a driver’s license. Calce’s breaches were damaging enough to cost these firms over 1 billion dollars. A resident of Canada, Calce was eventually caught.

Calce was a minor, so the sentence was light—8 months of having his movements restricted and monitored, along with limited online access. He has turned his escapades into writing and acting gigs surrounding cyber crime activity.

Filed Under: Criminal Law Tagged With: cybercrimes, fraud

Legal Topics

  • Accidents & Injuries
  • Criminal Law
  • Defective Products
  • Insurance Disputes
  • Legal News
  • Workers' Compensation

Must Reads

  • Understanding the Alternatives to Foreclosure
  • What Can I Expect at a Mediation Session?
  • Why Having a Business Succession Plan is Important
  • 5 Legal Concerns for Owners of Waterfront Property

Blogroll

  • Attorney Web Marketing
  • The Babcock Law Firm
  • Lawteryx: The Legal T-Rex
  • Workers' Comp Lawyers: Gerber & Holder
  • American Bar Association
  • Cornell Legal Encyclopedia
  • The Crime Report
  • SCOTUS Blog
  • Volokn Conspiracy

Legal Directories

  • Enjuris: Directory for Personal Injury Lawyers
  • Martindale
  • RedLawList.org
  • Nolo
  • Find Law
  • Cornell Lawyer Directory

RSS Enjuris Law Blog

  • Colorado Passes Landmark Workers’ Comp Law Giving Injured Workers More Say in Their Care
  • Fraudulent Conveyance: What It Is and How to Fight It
  • Amazon Sued Over Allegedly Toxic Rice: What Consumers Need to Know
  • Breach of Contract Lawsuits: Your Step-by-Step Guide
  • What Is a Victim Impact Statement in a Personal Injury Case?

RSS Legal Week

  • Boar’s Head Faces Lawsuits Amidst Massive Listeria Recall
  • New Study Links Fatal Lung Disease Silicosis to Quartz Countertops
  • What is Strict Liability & How Does It Affect Colorado Personal Injury Cases?
  • Colorado 911 Operators Now Covered by Workers’ Comp for PTSD
  • New Colorado Law Extends Workers’ Comp Reporting Time

RSS Lowering the Bar

  • Please Do Your Best Not to Appear in the “AI Hallucination Database”
  • Idaho Passes Emergency Truck-Nuts Legislation
  • U.S. Supreme Court, 1795: FYI, You Guys Should Be Filing Briefs
  • Assorted Stupidity #168
  • Plaintiffs Allegedly Struck by Prosthetic Leg Flung From Carnival Ride

© 2025 RedLawList. All rights reserved.