Level Seven (hacking group)

The Level Seven Crew, also known as Level Seven, Level 7 or L7, was a hacking group during the mid to late 1990s. Rumoured to have dispersed in early 2000 when nominal head 'vent' was raided by the FBI on February 25, 2000.

The Level Seven Crew
Level Seven Crew Logo
Formation1994-2000
PurposeHacker groups, Hacker
Location
Origin
North, New Jersey
Founders
foil
vent
AffiliationsGlobal Hell, Hacking for Girliez

Origins

Thought to have been derived from Dante Alighieri’s novel, The Inferno. The group called themselves Level Seven after the seventh level of hell, the violent.

Contained in some of the group’s web defacements, was the quote: "il livello sette posidare la vostra famiglia", which loosely translated from Italian says, "Level Seven owns your family".

The group, spent most of their time on IRC - in the EFnet channel #LevelSeven discussing security, or the lack thereof. The group was also associated with other high-profile hacking groups such as Global Hell and Hacking For Girliez.

Notability

The hacking group was noted in Attrition's Top 20 most active groups of all time by claiming responsibility for over 60 unauthorized penetrations of computer systems in 1999 alone, including The First American National Bank, The Federal Geographic Data Committee, NASA and Sheraton Hotels.[1]

Level Seven is also credited with being the first group to hack a .ma domain and server located in Morocco. The server was owned by the Faculté des Sciences Semlalia, Marrakech

However, the group is most widely known for the September 7, 1999 defacement of (The US Embassy in China's Website), in regards to the 1998 U.S. embassy bombings.

Level Seven typify a group of hackers who exploit or attack computers and networks for more than just the thrill and challenge, and for reasons other than money. During their era, they were activists, and they used their computer skills to make political statements and protest actions by government and industry. Thus, they bridged the realms of hacking and activism, operating in a domain that is now called "hacktivism".[2]

Quotations

"I would be inclined to think that normal hackers would not be able to break into something like the US embassy. The security measures they use are very, very different to those protecting a commercial Web server."
- Ian Jonsten-Bryden (British government security expert of Oceanus Security in Suffolk)

"We embrace technology, we learn from it, we use it, and we exploit it. Technology is a very powerful tool, as is knowledge, but some people go beyond these boundaries, testing limits, finding new ways and ideas... we call these people hackers, and we are one of many.."
- vent, September 1999

gollark: Opus has some sort of turtle builder.
gollark: More mining means more... destroyed end islands? I guess that's good.
gollark: Cøøł¡
gollark: Hmm, I see that you are selling your ChorusFarm™™.
gollark: As I said, unclaimed Chorus City land beside roads is available for free.

References

  1. Attrition (January 2000). "Feds, Felons and Flakes: Reflections on the Attrition Mirror". Archived from the original (ppt) on 2006-07-18. Retrieved 2006-10-06. Cite journal requires |journal= (help)
  2. Denning, Dorothy (September 2002). "Hacktivism: An Emerging Threat to Diplomacy". Archived from the original (doc) on 2006-10-04. Retrieved 2006-10-06. Cite journal requires |journal= (help)
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.