Penetrating an Operating System - Seminal Paper on Hacking
Security Accomplishment | 1976
Where the work was done: IBM T.J. Watson Research Center
What we accomplished: Excerpt from paper: "A team of penetrator-analysts was formed to attempt to penetrate v~/370, with the objective of obtaining information to which they were not entitled, such as passwords or data that belonged to other users. Lesser goals were to acquire an unreasonably large share of resources in order to deny service to other users, and to obtain resources but escape accountability."