CHAPTER 2

HISTORY OF COMPUTER CRIME

M. E. Kabay

2.1 WHY STUDY HISTORICAL RECORDS?

2.2 OVERVIEW

2.3 1960S AND 1970S: SABOTAGE

2.3.1 Direct Damage to Computer Centers

2.3.2 1970–1972: Albert the Saboteur

2.4 IMPERSONATION

2.4.1 1970: Jerry Neal Schneider

2.4.2 1980–2003: Kevin Mitnick

2.4.3 Credit Card Fraud

2.4.4 Identity Theft Rises

2.5 PHONE PHREAKING

2.5.1 2600 Hz

2.5.2 1982–1991: Kevin Poulsen

2.6 DATA DIDDLING

2.6.1 Equity Funding Fraud (1964–1973)

2.6.2 1994: Vladimir Levin and the Citibank Heist

2.7 SALAMI FRAUD

2.8 LOGIC BOMBS

2.9 EXTORTION

2.10 TROJAN HORSES

2.10.1 1988 Flu-Shot Hoax

2.10.2 Scrambler, 12-Tricks and PC Cyborg

2.10.3 1994: Datacomp Hardware Trojan

2.10.4 Keylogger Trojans

2.10.5 Haephrati Trojan

2.10.6 Hardware Trojans and Information Warfare

2.11 NOTORIOUS WORMS AND VIRUSES

2.11.1 1970–1990: Early Malware Outbreaks

2.11.2 December 1987: Christmas Tree Worm

2.11.3 November 2, 1988: Morris Worm

2.11.4 Malware in the 1990s

2.11.5 March 1999: Melissa

2.11.6 May 2000: I Love You

2.12 SPAM

2.12.1 1994: Green Card Lottery Spam

2.12.2 Spam Goes Global

2.13 DENIAL OF SERVICE

2.13.1 1996: Unamailer

2.13.2 2000: MafiaBoy

2.14 HACKER UNDERGROUND OF THE 1980S AND 1990S

2.14.1 1981: Chaos Computer Club

2.14.2 1982: The 414s

2.14.3 1984: Cult of the Dead Cow

2.14.4 1984: 2600: The Hacker Quarterly

2.14.5 1984: Legion of Doom

2.14.6 1985: Phrack

2.14.7 1989: Masters of Deception

2.14.8 1990: Operation Sundevil

2.14.9 1990: Steve Jackson Games

2.14.10 1992: L0pht Heavy Industries ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.