Cybercrimeology

Cybercrime History: Curious Captains are Calling, Pt 3

Episode Summary

This is the third episode in our series of cybercrime histories.We talk with Professor Peter Grabosky, Professor Emeritus at the Australian National University. The history begins with the very origins of computer crime back in the 1960s.

Episode Notes

More about Our Guest

https://researchers.anu.edu.au/researchers/grabosky-pn

Persons of Note:

Abbie Hoffman

https://www.smithsonianmag.com/history/how-new-york-stock-exchange-gave-abbie-hoffman-his-start-guerrilla-theater-180964612/

JoyBubbles, Josef Carl Engressia Jr.

https://en.wikipedia.org/wiki/Joybubbles

Captain Crunch

(VIDEO) 2015: "History of Hacking" by John "Captain Crunch" Draper

https://www.youtube.com/watch?v=DK-352AWaKk

Yan Laura (22 Oct 2019) An Early Hacker Used a Cereal Box Whistle to Take Over Phone Lines

https://www.popularmechanics.com/technology/a20762221/an-early-hacker-used-a-cereal-box-whistle-to-take-over-phone-lines/

CSO, (20 Nov, 2017) Captain Crunch aka John Draper banned from DefCon for sexual misconduct

https://www.csoonline.com/article/3237591/captain-crunch-aka-john-draper-banned-from-defcon-for-sexual-misconduct.html

Captain Zap

Delio, Michelle (Feb 6, 2001) The Greatest Hacks of All Time

https://www.wired.com/2001/02/the-greatest-hacks-of-all-time/

CaptainZap

https://hackstory.net/Captain_Zap

Steve Jobs and Steve Wozniak

Lapsley, Phil (Feb 20, 2013) The Definitive Story of Steve Wozniak, Steve Jobs, and Phone Phreaking

(VIDEO) 1984: "Wozniak Meets Steve Jobs: Blue Box Free Phone Calls Worldwide" by Steve Wozniak

https://www.youtube.com/watch?v=oeVOpDUWwpU

 

Reading

Donn B Parker Crime by Computer (1976)

August Bequai Computer Crime (1978)

Steve Levy Hackers: Heroes of the computer revolution (1984)

Gordon Meyer & Jim Thomas COMPUTER UNDERGROUND DIGEST (1990-2000)

http://www.computer-underground-digest.org/

Clough and Mungo Approaching Zero 1992

C. Stoll Cuckoo’s Egg (1989)

 

Other

A few things that you missed:

You could read this paper from 1977, in which August Bequai attempts to define and illustrate the then 100 million dollar problem of computer crime :

https://heinonline.org/HOL/P?h=hein.journals/polqua6&i=22

The Equity Funding Scam.

https://en.wikipedia.org/wiki/Equity_Funding

Barbash, Fred(Nov 16, 1982) High Court to Review SEC Action on Whistleblower,

https://www.washingtonpost.com/archive/politics/1982/11/16/high-court-to-review-sec-action-on-whistleblower/5d132a9e-f411-4138-acff-19d464c99189/

Initial findings of the SEC on The Equity Funding Corporation

https://www.sec.gov/litigation/aljdec/1978/id19780901djm.pdf

 

MIT still has a Model railway club

http://tmrc.mit.edu/

Rod Stewart (https://en.wikipedia.org/wiki/Rod_Stewart) is a railway enthusiast. I once worked with a guy who had a beer with Rod Stewart and insisted he was a good bloke.

https://www.bbc.com/news/entertainment-arts-50403561

Information wants to be free

https://en.wikipedia.org/wiki/Information_wants_to_be_free

What is a punch card?

https://www.computerhope.com/jargon/p/punccard.htm

DARPA, the group behind the internet infrastructure, still exists

https://www.darpa.mil/