1962 AD first hackers at MIT.
1971 AD john draper makes a long distance call for free by blowing a precise tone into a telephone.
1973 AD yippie social movement starts YIPL/TAP magazine to help phone hackers make free long distance calls.
1975 AD 2 members of californias homebrew computer club begin making "blue boxes" a device used to hack into phone systems.
1981 AD william gibson coins the term cyberspace in his novel.
1982 AD one of the first hackers arrested 414 made 60 computer break ins
1983 AD comprehensive crime control act gives secret service jurisdiction over credi card and comuter fraud
1984 AD 2 hacker groups form legion of doom and chaos computer club
1985 AD computer fraud and abuse act gives more clout to authorities.
1986 AD computer emergency response team is formed
1987 AD mellon univ. investigates the attacks on computer networks.
1988 AD kevin mitnick is sent to prison for 1 year
April 11, 1988 AD first national bank of chicago looses 70 million from computer heist.
1989 AD fry guy and some members of legion of doom or caught
1990 AD after AT&T crashes lawinforcement capture hackers
1991 AD raids conducted in 12 cities
1992 AD kevin lee poulsen indicted for stealing military documents.
1993 AD hackers break into griffith air force base
1994 AD hackers hack a professors email
August 20, 1994 AD kevin mitnick tracked down by tsutomu shimomura
1995 AD hackers break into federal websites
1996 AD defense department sustained 250000 attacks by hackers
1997 AD the brotherhood break into CBC and leave a message "the media are liars"
August 20, 1997 AD microsofts NT is hacked into
September 7, 1997 AD hackers claim there is a logic bomb in the yahoo search engine
January 1, 1998 AD anti hacker ads are run during superbowl XXXII
February 2, 1998 AD the FBL was victim of spamming
March 3, 1998 AD hackers claim to have broken into the pentagon
April 4, 1998 AD national infrastructure protection center is unvailed
May 5, 1998 AD l0pht warns it can shut down internet in less than 30 minutes they urge stronger security.