The Hacker Diaries: Confessions of Teenage Hackers

Front Cover
McGraw Hill Professional, Apr 16, 2002 - Computers - 219 pages

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

To many who knew him, there was nothing odd about him. He was a normal kid...

On February 7, 2000, was the first victim of the biggest distributed denial-of-service attack ever to hit the Internet. On May 8th, was battling a massive denial-of-service attack. Later that afternoon, also reported significant outages of service, as did Then CNN's global online news operation started to grind to a crawl. By the following day, Datek and E-Trade entered crisis mode...all thanks to an ordinary fourteen-year-old kid.

Friends and neighbors were shocked to learn that the skinny, dark-haired, boy next door who loved playing basketball--almost as much as he loved computers--would cause millions of dollars worth of damage on the Internet and capture the attention of the online world--and the federal government. He was known online as "Mafiaboy" and, to the FBI, as the most notorious teenage hacker of all time. He did it all from his bedroom PC. And he's not alone.

Computer hacking and Web site defacement has become a national pastime for America's teenagers, and according to the stories you'll read about in The Hacker Diaries--it is only the beginning. But who exactly are these kids and what motivates a hacker to strike? Why do average teenagers get involved in hacking in the first place? This compelling and revealing book sets out to answer these questions--and some of the answers will surprise you. Through fascinating interviews with FBI agents, criminal psychologists, law-enforcement officials--as well as current and former hackers--you'll get a glimpse inside the mind of today's teenage hacker. Learn how they think, find out what it was like for them growing up, and understand the internal and external pressures that pushed them deeper and deeper into the hacker underground. Every hacker has a life and story of his or her own. One teenager's insatiable curiosity as to how the family's VCR worked was enough to trigger a career of cracking into computer systems. This is a remarkable story of technological wizardry, creativity, dedication, youthful angst, frustration and disconnection from society, boredom, anger, and jail time. Teenage hackers are not all indifferent punks. They're just like every other kid and some of them probably live in your neighborhood. They're there. All you have to do is look.

From inside the book

What people are saying - Write a review

User ratings

5 stars
4 stars
3 stars
2 stars
1 star

User Review - Flag as inappropriate

Amazing, it's such an inspiration for a young ethical hacker like myself.

User Review - Flag as inappropriate

your book is rally the best


Genocide From Columbine to Hacking
Joe Magee and Noid
Operation Claymore

9 other sections not shown

Other editions - View all

Common terms and phrases

References to this book

About the author (2002)

Dan Verton is a senior writer at Computerworld, specializing in Internet security, national security, critical infrastructure protection, and corporate information security policies. He has written hundreds of news stories, profiles of government and industry leaders, and feature-length stories related to Internet security, defense, and intelligence matters. He is also the former Associate Editor, Defense, for the trade publication Federal Computer Week. Other publication credits include stories on information warfare and corporate espionage for Business2.0, various Internet security news stories for Information Security Magazine,, The Industry Standard, InfoWorld, and PC World. Dan has been asked to speak at various Internet security conferences, including a recent event at the United Nations in New York, where he moderated an expert panel on security issues. Dan is a former intelligence officer in the U.S. Marine Corps. While in the military, he served as an information systems security officer and training officer for various CIA and DIA database systems. Dan is also a former imagery intelligence analyst with the U.S. Army Reserve.

Bibliographic information