Jump to content

Level Seven (hacker group): Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
m →‎Notability: Remove redundant |year= parameter from CS1 citations; using AWB
Rescuing 1 sources, flagging 0 as dead, and archiving 0 sources. #IABot
Line 103: Line 103:
*{{cite web | title=Hackers put racist, anti-government slogans on embassy site| publisher=CNN| date=1999-09-07 | work=Insurgency on the Internet | url=http://www.cnn.com/TECH/computing/9909/07/embassy.hack | accessdate=2005-07-06 }}
*{{cite web | title=Hackers put racist, anti-government slogans on embassy site| publisher=CNN| date=1999-09-07 | work=Insurgency on the Internet | url=http://www.cnn.com/TECH/computing/9909/07/embassy.hack | accessdate=2005-07-06 }}


*{{cite web | title=Embassy site hackers aimed to show its vulnerability| publisher=CNN| date=1999-09-08 | work=Insurgency on the Internet | url=http://www.cnn.com/TECH/computing/9909/08/hack.folo | accessdate=2005-07-06 }} {{Dead link|date=October 2010|bot=H3llBot}}
*{{cite web|1= |title=Embassy site hackers aimed to show its vulnerability |publisher=CNN |date=1999-09-08 |work=Insurgency on the Internet |url=http://www.cnn.com/TECH/computing/9909/08/hack.folo |accessdate=2005-07-06 |deadurl=yes |archiveurl=https://web.archive.org/20030206011937/http://www.cnn.com:80/TECH/computing/9909/08/hack.folo/ |archivedate=February 6, 2003 }}


*{{cite web | title=Embassy cracker may be playing government's game| author=Will Knight |publisher=ZDNet UK| date=1999-09-10 | work=The response to crackers invading a US embassy site: It's just what the US wants.| url=http://news.zdnet.co.uk/internet/0,39020369,2073628,00.htm | accessdate=2006-03-05 }}
*{{cite web | title=Embassy cracker may be playing government's game| author=Will Knight |publisher=ZDNet UK| date=1999-09-10 | work=The response to crackers invading a US embassy site: It's just what the US wants.| url=http://news.zdnet.co.uk/internet/0,39020369,2073628,00.htm | accessdate=2006-03-05 }}

Revision as of 02:50, 14 February 2016


The Level Seven Crew
Formation1994-2000
PurposeHacker groups, Hacker
Location
Origin
North, New Jersey
Founders
foil
vent
AffiliationsglobalHell (gH), HFG

The Level Seven Crew, also known as Level Seven, Level 7 or L7, was a hacking group during the mid to late 90's. Eventually dispersing in early 2000 when nominal head 'vent' was raided by the FBI on February 25, 2000.

Origins

Thought to have been derived from Dante Alighieri’s novel, The Inferno. The group called themselves Level Seven after the seventh level of hell, the violent.

Contained in some of the group’s web defacements, was the quote: "il livello sette posidare la vostra famiglia", which loosely translated from Italian says, "Level Seven owns your family".

The group, spent most of their time on IRC - in the EFnet channel #LevelSeven discussing security, or the lack thereof. The group was also associated with other high-profile hacking groups such as, Global Hell (gH) and Hacking for Girliez (HFG).

Notability

The hacking group was noted in Attrition's Top 20 most active group's of all time by claiming responsibility for over 60 unauthorized penetrations of computer systems in 1999 alone, including The First American National Bank, The Federal Geographic Data Committee, NASA and Sheraton Hotels.[1]

Level Seven is also credited with being the first group to hack a .ma domain and server located in Morocco. The server was owned by the Faculté des Sciences Semlalia, Marrakech

However, the group is most widely known for the September 7, 1999 defacement of (The US Embassy in China's Website), in regards to the 1998 U.S. embassy bombings.

Level Seven typify a group of hackers who exploit or attack computers and networks for more than just the thrill and challenge, and for reasons other than money. During their era, they were activists, and they used their computer skills to make political statements and protest actions by government and industry. Thus, they bridged the realms of hacking and activism, operating in a domain that is now called "hacktivism".[2]

Quotations

"I would be inclined to think that normal hackers would not be able to break into something like the US embassy. The security measures they use are very, very different to those protecting a commercial Web server."
- Ian Jonsten-Bryden (British government security expert of Oceanus Security in Suffolk)

"We embrace technology, we learn from it, we use it, and we exploit it. Technology is a very powerful tool, as is knowledge, but some people go beyond these boundaries, testing limits, finding new ways and ideas... we call these people hackers, and we are one of many.."
- vent, September 1999

References

  1. ^ Attrition (January 2000). "Feds, Felons and Flakes: Reflections on the Attrition Mirror" (ppt). Retrieved 10/06/2006. {{cite journal}}: Check date values in: |accessdate= (help); Cite journal requires |journal= (help)
  2. ^ Denning, Dorothy (September 2000). "Hacktivism: An Emerging Threat to Diplomacy" (doc). Retrieved 6/10/2004. {{cite journal}}: Check date values in: |accessdate= (help); Cite has empty unknown parameter: |quotes= (help); Cite journal requires |journal= (help)