Level Seven (hacking group)

The Level Seven Crew

Level Seven Crew Logo
Formation 1994-2000
Purpose Hacker groups, Hacker
Location
Origin
North, New Jersey
Founders
foil
vent
Affiliations globalHell (gH), HFG

The Level Seven Crew, also known as Level Seven, Level 7 or L7, was a hacking group during the mid to late 90's. Eventually dispersing in early 2000 when nominal head 'vent' was raided by the FBI on February 25, 2000.

Origins

Thought to have been derived from Dante Alighieri’s novel, The Inferno. The group called themselves Level Seven after the seventh level of hell, the violent.

Contained in some of the group’s web defacements, was the quote: "il livello sette posidare la vostra famiglia", which loosely translated from Italian says, "Level Seven owns your family".

The group, spent most of their time on IRC - in the EFnet channel #LevelSeven discussing security, or the lack thereof. The group was also associated with other high-profile hacking groups such as, Global Hell (gH) and Hacking for Girliez (HFG).

Notability

The hacking group was noted in Attrition's Top 20 most active group's of all time by claiming responsibility for over 60 unauthorized penetrations of computer systems in 1999 alone, including The First American National Bank, The Federal Geographic Data Committee, NASA and Sheraton Hotels.[1]

Level Seven is also credited with being the first group to hack a .ma domain and server located in Morocco. The server was owned by the Faculté des Sciences Semlalia, Marrakech

However, the group is most widely known for the September 7, 1999 defacement of (The US Embassy in China's Website), in regards to the 1998 U.S. embassy bombings.

Level Seven typify a group of hackers who exploit or attack computers and networks for more than just the thrill and challenge, and for reasons other than money. During their era, they were activists, and they used their computer skills to make political statements and protest actions by government and industry. Thus, they bridged the realms of hacking and activism, operating in a domain that is now called "hacktivism".[2]

Quotations

"I would be inclined to think that normal hackers would not be able to break into something like the US embassy. The security measures they use are very, very different to those protecting a commercial Web server."
- Ian Jonsten-Bryden (British government security expert of Oceanus Security in Suffolk)

"We embrace technology, we learn from it, we use it, and we exploit it. Technology is a very powerful tool, as is knowledge, but some people go beyond these boundaries, testing limits, finding new ways and ideas... we call these people hackers, and we are one of many.."
- vent, September 1999

References

  1. Attrition (January 2000). "Feds, Felons and Flakes: Reflections on the Attrition Mirror" (ppt). Retrieved 2006-10-06.
  2. Denning, Dorothy (September 2000). "Hacktivism: An Emerging Threat to Diplomacy" (doc). Retrieved 2006-10-06.
This article is issued from Wikipedia - version of the 9/6/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.