Matthew Bevan
Encyclopedia
Mathew Bevan is a British
United Kingdom
The United Kingdom of Great Britain and Northern IrelandIn the United Kingdom and Dependencies, other languages have been officially recognised as legitimate autochthonous languages under the European Charter for Regional or Minority Languages...

 hacker
Hacker (computer security)
In computer security and everyday language, a hacker is someone who breaks into computers and computer networks. Hackers may be motivated by a multitude of reasons, including profit, protest, or because of the challenge...

 from Cardiff
Cardiff
Cardiff is the capital, largest city and most populous county of Wales and the 10th largest city in the United Kingdom. The city is Wales' chief commercial centre, the base for most national cultural and sporting institutions, the Welsh national media, and the seat of the National Assembly for...

, Wales
Wales
Wales is a country that is part of the United Kingdom and the island of Great Britain, bordered by England to its east and the Atlantic Ocean and Irish Sea to its west. It has a population of three million, and a total area of 20,779 km²...

. In 1996 he was arrested for hacking into secure US government networks under the handle Kuji. At the age of 21, he hacked into the files of the Griffiss Air Force Base
Griffiss Air Force Base
Griffiss Air Force Base, is a former United States Air Force base, located in Rome, New York, about NW of Utica. Missions at Griffiss AFB included fighter interceptors, electronic research, installation, and support activities, aerial refueling, and bombers...

 Research Laboratory in New York
New York
New York is a state in the Northeastern region of the United States. It is the nation's third most populous state. New York is bordered by New Jersey and Pennsylvania to the south, and by Connecticut, Massachusetts and Vermont to the east...

.
Intent on proving a UFO Conspiracy Theory; his sole tool was a Commodore Amiga loaded with a blueboxing program called Roxbox.

He was one of two hackers said to have "nearly started a third world war" according to Supervisory Special Agent Jim Christy, at the time working for the Air Force Office of Special Investigations
Air Force Office of Special Investigations
The Air Force Office of Special Investigations , is a Field Operating Agency of the United States Air Force that provides professional investigative services to commanders throughout the Air Force...


Background

Bullied by his peers, Mathew had a difficult time with school and turned to the online world at night for an escape. Having been told ways to negate the phone system
Phreaking
Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. As telephone networks have become computerized, phreaking has become closely...

, he could call anywhere in the world without charges appearing on his bill.
Mathew began to lead a double-life, a normal school life during the day followed by his now well publicized nocturnal activities.

On June 21, 1996 he was arrested in connection with hacking incidents relating to several sensitive USAF, NASA
NASA
The National Aeronautics and Space Administration is the agency of the United States government that is responsible for the nation's civilian space program and for aeronautics and aerospace research...

 and NATO establishments. The United States Senate had already misinterpreted the situation and branded Mathew's pseudonym Kuji as a "Foreign Agent, possibly of Eastern European origin".

After 36 hours of interviews with police, he was charged with intent to secure access to computer systems belonging to the US Air Force and defense manufacturer Lockheed
Lockheed Martin
Lockheed Martin is an American global aerospace, defense, security, and advanced technology company with worldwide interests. It was formed by the merger of Lockheed Corporation with Martin Marietta in March 1995. It is headquartered in Bethesda, Maryland, in the Washington Metropolitan Area....

.

A US Air Force investigator summed up the risks and concerns brought about by their hacking, how Bevan's alleged partner Richard Pryce (Datastream Cowboy), then 16 years old, hacked his way into a research facility in Korea
Korea
Korea ) is an East Asian geographic region that is currently divided into two separate sovereign states — North Korea and South Korea. Located on the Korean Peninsula, Korea is bordered by the People's Republic of China to the northwest, Russia to the northeast, and is separated from Japan to the...

, and dumped the contents of the Korean Atomic Research Institute's database on the USAF system. The concern was that if North Korea
North Korea
The Democratic People’s Republic of Korea , , is a country in East Asia, occupying the northern half of the Korean Peninsula. Its capital and largest city is Pyongyang. The Korean Demilitarized Zone serves as the buffer zone between North Korea and South Korea...

 noticed, they would think the transfer of data was an intrusion by the US Air Force, and threaten physical retaliation for the espionage; fortunately it turned out to be South Korea
South Korea
The Republic of Korea , , is a sovereign state in East Asia, located on the southern portion of the Korean Peninsula. It is neighbored by the People's Republic of China to the west, Japan to the east, North Korea to the north, and the East China Sea and Republic of China to the south...

n data, significantly less volatile.

At Woolwich Crown Court, Friday 21 November 1997 some 18 months later, the CPS
Crown Prosecution Service
The Crown Prosecution Service, or CPS, is a non-ministerial department of the Government of the United Kingdom responsible for public prosecutions of people charged with criminal offences in England and Wales. Its role is similar to that of the longer-established Crown Office in Scotland, and the...

 decided that it was no longer in the public interest to pursue the case. They offered 'no evidence' which resulted in a full acquittal
Acquittal
In the common law tradition, an acquittal formally certifies the accused is free from the charge of an offense, as far as the criminal law is concerned. This is so even where the prosecution is abandoned nolle prosequi...

 being recorded. He used to live in Bristol.

Current

Bevan has commented on the Gary McKinnon
Gary McKinnon
Gary McKinnon is a Scottish systems administrator and hacker who has been accused of what one U.S. prosecutor claims is the "biggest military computer hack of all time," although McKinnon himself states that he was merely looking for evidence of free energy suppression and a cover-up of UFO...

 case as being very similar to his own.

He is a holistic therapist trained in NLP
Neuro-linguistic programming
Neuro-linguistic programming is an approach to psychotherapy, self-help and organizational change. Founders Richard Bandler and John Grinder say that NLP is a model of interpersonal communication and a system of alternative therapy which seeks to educate people in self-awareness and effective...

, Reiki
Reiki
is a spiritual practice developed in 1922 by Japanese Buddhist Mikao Usui. The teaching was continued and adapted by various teachers. It uses a technique commonly called palm healing as a form of complementary and alternative medicine and is sometimes classified as oriental medicine by some...

 and clinical hypnotherapy
Hypnotherapy
Hypnotherapy is a therapy that is undertaken with a subject in hypnosis.The word "hypnosis" is an abbreviation of James Braid's term "neuro-hypnotism", meaning "sleep of the nervous system"....

.
The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK