CHAPTER 2
HISTORY OF COMPUTER CRIME
M. E. Kabay
2.1 WHY STUDY HISTORICAL RECORDS?
2.3.1 Direct Damage to Computer Centers
2.3.2 1970–1972: Albert the Saboteur
2.4.1 1970: Jerry Neal Schneider
2.4.2 1980–2003: Kevin Mitnick
2.5.2 1982–1991: Kevin Poulsen
2.6.1 Equity Funding Fraud (1964–1973)
2.6.2 1994: Vladimir Levin and the Citibank Heist
2.10.2 Scrambler, 12-Tricks and PC Cyborg
2.10.3 1994: Datacomp Hardware Trojan
2.10.6 Hardware Trojans and Information Warfare
2.11 NOTORIOUS WORMS AND VIRUSES
2.11.1 1970–1990: Early Malware Outbreaks
2.11.2 December 1987: Christmas Tree Worm
2.11.3 November 2, 1988: Morris Worm
2.12.1 1994: Green Card Lottery Spam
2.14 HACKER UNDERGROUND OF THE 1980S AND 1990S
2.14.1 1981: Chaos Computer Club
2.14.3 1984: Cult of the Dead Cow
2.14.4 1984: 2600: The Hacker Quarterly
2.14.7 1989: Masters of Deception
2.14.8 1990: Operation Sundevil
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.