Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Susan Headley

From Wikipedia, the free encyclopedia
American computer hacker (born 1959)

Susan Headley
Born
Susan Headley

1959 (age 66–67)
Other namesSusy Thunder, Susan Thunder
OccupationsFormerphreaker,hacker,social engineer
Years active1977–1983 (hacking/phreaking)

Susan Headley (born 1959), also known asSusy Thunder orSusan Thunder, is an American formerphreaker and earlycomputer hacker who was active during the late 1970s and early 1980s. Headley specialized in a type of hacking that usespretexting and misrepresentation of oneself in contact with targeted organizations to get information vital to hacking those organizations.[1] She called this "psychological subversion"; it is also calledsocial engineering.[2]

Biography

[edit]

Born inAltona, Illinois, in 1959, Headley said she dropped out of school in the eighth grade after a difficult childhood.[3] She later moved toLos Angeles, California, where she was arock and roll bandgroupie and worked as asex worker.[4][2]

As a young person, she developed interest and expertise intelephone networks and circumventing systems.[5] According toThe Hacker's Handbook (1990), she hacked the United States phone system as a 17-year-old in 1977 and was "one of the earliest of the present generation of hackers".[6] For a while in the late 1970s and early 1980s, she collaborated with computer hackerKevin Mitnick (also known as Condor) and phone phreaker Lewis de Payne (also known as Roscoe) on hacking intoPacific Bell systems and other systems, although there were conflicts between the group members.[7][8] In 1981–1982, she testified against Mitnick and de Payne in a theft case related to Pacific Bell, and provided evidence against de Payne in a case related to hacking U.S Leasing, in exchange forimmunity.[4][7][9]

In 1982, Headley gave an interview on the television show20/20 about circumventing security systems, including the technique of "garbology":dumpster diving to find systemdocumentation and other useful information thrown away by telephone company staff.[10][11] On October 25, 1983, Headley testified in front of theU.S. Senate Committee on Governmental Affairs about the technical capabilities and motivations of hackers and phone phreaks.[12][13][14] On20/20 and in her Senate testimony, she explained that motivations for the hackers she knew included curiosity, challenge, and intense competition with each other, rather than profit.[15][16] In the 1980s, she worked as a security consultant and a professional poker player.[17][5][8] In 1995, Headley presented a talk atDEF CON about "Social Engineering and Psychological Subversion of Trusted Systems", including about usingseduction as part of strategies for social engineering.[18][8]

In 1991, journalistsKatie Hafner andJohn Markoff published a book,Cyberpunk: Outlaws and Hackers on the Computer Frontier, about Headley, Mitnick, de Payne, and other hackers.[19] Later, she was noted as one of only a few women among early phone phreaks and one of the earliest known female hackers.[1][20] WriterClaire L. Evans, who profiled Headley inThe Verge in 2022,[2] described her as "a mythological figure in hacking history".[21] As of 2024, a film based on the profile was in development.[22][23]

Public service

[edit]

Headley was elected to public office in California in 1994, asCity Clerk ofCalifornia City.[2]

Personal life

[edit]

Headley is married and lives in the Midwest.[2] She is acoin collector andcoin expert.[2][20][24]

References

[edit]
  1. ^abBarth, Bradley (July 10, 2017)."Female blackhats".SC Media. RetrievedDecember 11, 2018.
  2. ^abcdefEvans, Claire L. (January 26, 2022)."Searching for Susy Thunder".The Verge. RetrievedNovember 14, 2025.
  3. ^Thorton, Mary (May 21, 1984)."Hackers Ignore Consequences Of Their High-Tech Joy Rides".The Washington Post. RetrievedNovember 15, 2025.
  4. ^abHafner, Katie;Markoff, John (1991).Cyberpunk: Outlaws and Hackers on the Computer Frontier. New York:Simon & Schuster. pp. 16–17, 51, 56.ISBN 0-671-68322-5.
  5. ^abRosenfeld, Megan (December 18, 1989)."At Surveillance Expo, Sneak Peeks at the Sweet Spy and Buy".The Washington Post.ISSN 0190-8286. RetrievedNovember 15, 2025.
  6. ^Cornwall, Hugo; Gold, Steve (1990).Hugo Cornwall's New Hacker's Handbook (4th ed.). London: Century. pp. vii, 65.ISBN 978-0-7126-3454-0.
  7. ^abHafner, Katie (August 1995)."Kevin Mitnick, unplugged".Esquire.124 (2): 80(9). RetrievedJanuary 17, 2026.
  8. ^abcGehl, Robert W.; Lawson, Sean T (March 8, 2022). "Penetrating: The Desire to Control Media and Minds".Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication. The MIT Press. pp. 145, 147, 150.doi:10.7551/mitpress/12984.003.0011.ISBN 978-0-262-36892-6.
  9. ^Markoff, John (July 26, 1982)."Sentence meted out to 'phreak'".InfoWorld.4 (29). InfoWorld Media Group, Inc.: 1 – via Google Books.
  10. ^Gehl, Robert W."Trashing the Phone Company with Suzy Thunder".Hack_Curio. RetrievedJanuary 17, 2026.
  11. ^Gehl, Robert W.; Lawson, Sean T. (March 8, 2022). "Trashing: From Dumpster Diving to Data Dumps".Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication. The MIT Press. pp. 70–83.doi:10.7551/mitpress/12984.003.0008.ISBN 978-0-262-36892-6. RetrievedJanuary 17, 2026.
  12. ^Computer Security in the Federal Government and the Private Sector: Hearings before the Subcommittee on Oversight of Government Management of the Committee on Governmental Affairs, United States Senate, Ninety-eighth Congress, first session, October 25 and 26, 1983. U.S. Government Printing Office. 1983. pp. 22–29.
  13. ^Len, Ackland (October 30, 1983)."Lawmakers hear tales of computerized capones".Chicago Tribune. p. 3. RetrievedNovember 15, 2025.
  14. ^Kluepfel, H.M. (October 1989)."Foiling the wiley hacker: more than analysis and containment".Proceedings. International Carnahan Conference on Security Technology:15–21.doi:10.1109/CCST.1989.751947 – via IEEE Explore.
  15. ^Scherling, Laura S. (July 10, 2025). "Hacker History/Hacker Culture: A Complicated History".The Future of Hacking: The Rise of Cybercrime and the Fight to Keep Us Safe. Bloomsbury Publishing USA.ISBN 978-1-5381-8662-6.
  16. ^Crose, Emily (October 25, 2024). "Electronic Delinquents".Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers. John Wiley & Sons.ISBN 978-1-394-16983-2.
  17. ^Day, John S. (October 26, 1983)."'Hackers' crack secret data banks".The Bangor Daily News. p. 25. RetrievedNovember 15, 2025.
  18. ^"DEF CON III Archives".DEF CON. July 28, 1999 [1995]. RetrievedNovember 15, 2025.
  19. ^Mosley, Walter (August 11, 1991)."All the Bright Young Criminals".The New York Times. RetrievedNovember 15, 2025.
  20. ^abWatkins, Stephen; Mays, George; Bandes, Ronald M.; Franklin, Brandon; Gregg, Michael; Ries, Chris (November 6, 2006).Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network. Elsevier. p. 369.ISBN 978-0-08-050774-3.
  21. ^Chiotakis, Steve (February 17, 2022)."Phone 'phreakers' in 1980s LA: Digging up the forgotten era".KCRW. RetrievedJanuary 17, 2026.
  22. ^Phillips, Michael (December 20, 2023)."Chicagoan of the Year in Film: Screenwriter and director Minhal Baig has been finding new stories to tell".Chicago Tribune. RetrievedJanuary 19, 2026.
  23. ^Kit, Borys (April 22, 2024)."Lindsey Anderson Beer and Her Lab Brew Banner Re-Up at Paramount (Exclusive)".The Hollywood Reporter. RetrievedJanuary 19, 2026.
  24. ^Zupek, Rachel (April 26, 2009)."10 Creative Ways to Earn Extra Money".Florida Today. p. 49. RetrievedJanuary 17, 2026.

External links

[edit]
Retrieved from "https://en.wikipedia.org/w/index.php?title=Susan_Headley&oldid=1337113066"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2026 Movatter.jp