Back to dashboard Read module

Quiz reading view

Quiz 01V — Hackers Who Got Caught: 50 Years of Doctrine

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Hackers Who Got Caught: 50 Years of Prosecutions, Verdicts, and Doctrine as learned.

Use this quiz to check whether you can spot the controlling doctrine, procedural hinge, and practical move before treating Hackers Who Got Caught: 50 Years of Prosecutions, Verdicts, and Doctrine as learned.

Type Quiz
Updated 2026-04-17
Reading time 11 min read
Questions 10

Check the reading before you move on.

01v-hackers-hall-of-fame.md | Last updated: 2026-04-17

**DISCLAIMER:** Educational purposes only. Not legal advice.

Question 1

In United States v. Morris (2d Cir. 1991), Robert Tappan Morris released the first Internet worm. He did not intend to cause the widespread damage that resulted. The Second Circuit nonetheless affirmed his CFAA § 1030(a)(5) conviction. What is the controlling doctrine this case established regarding intent?

Question 2

Kevin Mitnick's sentence included a condition banning him from using computers without probation officer approval until 2003. What does this aspect of the Mitnick case establish for researchers?

Question 3

Albert Gonzalez was an FBI informant while simultaneously operating the largest credit card theft ring in history. His cooperation credit was "effectively nullified" at sentencing. What specific sentencing doctrine does the Gonzalez case illustrate?

Question 4

United States v. Auernheimer (3d Cir. 2014) is frequently cited by security researchers as a case vindicating CFAA research into publicly accessible systems. Which statement accurately describes what the Third Circuit actually held?

Question 5

Hector Monsegur (Sabu) led LulzSec attacks on Sony, PBS, the CIA, and Senate.gov. He secretly began cooperating with the FBI after his arrest and recorded over 300 hours of co-conspirator communications. His sentence was 7 months time served on charges carrying 10+ years. What does the Sabu case establish about cooperation in hacking prosecutions?

Question 6

Paige Thompson (erratic) exploited a misconfigured AWS WAF via SSRF to access Capital One's S3 buckets, exfiltrating data on 106 million customers. She was convicted of CFAA § 1030(a)(2) and wire fraud but received no prison time. What factor most directly explains the light sentence, and what broader doctrine does the case establish about cloud SSRF attacks?

Question 7

Arion Kurtaj of Lapsus$ was convicted of Computer Misuse Act offenses in the UK for hacking Microsoft, Okta, Nvidia, Rockstar Games, and others — including while on bail after a prior arrest. The jury found him guilty but he was found not criminally responsible due to mental disorder. What disposition did the court impose?

Question 8

Vladislav Klyushin was extradited from Switzerland to the United States and convicted of hacking filing agents (Donnelley Financial Solutions, Toppan Merrill) to steal pre-release corporate earnings reports, generating $93 million in illegal trading profits. He was sentenced to 9 years. What legal doctrine combination makes this case unique in cybercrime history?

Question 9

Joseph Sullivan, Uber's Chief Information Security Officer, was convicted of obstruction of justice and misprision of felony. He did not hack anyone. His conviction arose from actions taken after a 2016 breach. What conduct formed the basis of the conviction, and what is the most significant precedent it sets?

Question 10

Marcus Hutchins (MalwareTech) created and sold the Kronos banking trojan in 2014–2015, before he became globally known for registering the WannaCry kill-switch domain in May 2017, stopping the worldwide ransomware outbreak. He pleaded guilty to two CFAA counts and received time served plus supervised release — no additional prison. What is the most legally precise lesson this case establishes?