#https://ditprofs2011.wordpress.com/2011/12/03/act-2-1-legion-of-doom-hacking/
Explore tagged Tumblr posts
Text
Legion of Doom
1.) What was this case about?
The Legion of Doom (LOD) was a hacker group active from the 1980s to the late 1990s and early 2000. Their name appears to be a reference to the antagonists of Challenge of the Super Friends. LOD was founded by the hacker Lex Luthor (Vincent Louis Gelormine), after a rift with his previous group the Knights of Shadow.
2.) Who were the protagonist and parties involved?
At different points in the group’s history, LOD was split into LOD and LOD/LOH (Legion of Doom/Legion of Hackers) for the members that were more skilled at hacking than pure phreaking. The overall beliefs of LOD and MOD were different, but it can be difficult to untangle the actions of the members since there was a cross-overs between the two groups.
As of 2009 what has happened to each individual member of the Legion of Doom is unknown. A small handful of the higher-profile LOD members who are accounted for includes:Chris Goggans or “Erik Bloodaxe”, Dave Buchwald or “Bill From RNOC”, Patrick K. Kroupa “Lord Digital”, Loyd Blankenshipor “The Mentor”, Bruce Fancher or the “Dead Lord” and Mark Abene or the “Phiber Optik”, who was a member of both LOD and Masters of Deception(MOD) and lots of known hackers including the former member of the group LOD.
3.) Did any prosecutions result?
The Secret Service made some major breakthroughs in Hacking circles in 1989 as three members of the Legion of Doom were arrested (Franklin darden, Adam grant and Robert Riggs). They were charged with hacking into Bell South’s Telephone Networks in 1988.
4.) If so, what were their outcomes?
Franklin darden, Adam grant and Robert Riggs who were charged with hacking into Bell SOuth’s Telephone Network in 1988 would be sentanced to time in Federal prison.
while Secret Service also find out who “Fry Guy” is – the employee who hacked McDonalds mainframe for raises who also member of the Legion of Doom. It was part of the “Hacker Crackdown”.
5.) What ethical issues raised by this case?
One way that people can interpret actions for unethical behavior is considering the legality. In United States for an instance which has Credit Fraud and Abuse Act prohibits intentionally accessing another`s computer system when it threatens the financial well-being of an individual or business to reveal state secrets, upset international communications, defraud, cause damage or aid extortion. States have their own laws as well.
0 notes