Cybercrimeology

Cybercrime History: Managing a Manifest Mitnick, Part 4

Episode Summary

This is the third episode in our series of cybercrime histories.We talk with Professor Peter Grabosky, Professor Emeritus at the Australian National University. The history continues from the 1980s and the growing problem of international crime.

Episode Notes

More about Our Guest

https://researchers.anu.edu.au/researchers/grabosky-pn

From this Episode:

Michael A. Sussmann, (1999) The Critical Challenges from International High-Tech and Computer-Related Crime at the Millennium, 9 Duke Journal of Comparative & International Law 451-489

https://scholarship.law.duke.edu/djcil/vol9/iss2/5/

Kim Dotcom

https://en.wikipedia.org/wiki/Kim_Dotcom

Malaysian Cybercrime Law

Yew, Wong Malaysian Law and Computer Crime (SANS Reading Room Whitepaper)

https://www.sans.org/reading-room/whitepapers/legal/malaysian-law-computer-crime-670

Appudurai, J., & Ramalingam, C. L. (2007). Computer Crimes: A Case Study of What Malaysia Can Learn from Others?. Journal of Digital Forensics, Security and Law, 2(2), 1.

https://commons.erau.edu/cgi/viewcontent.cgi?article=1020&context=jdfsl

Drink or Die

https://en.wikipedia.org/wiki/DrinkOrDie

Sanger, David E. (2018)The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Bruce Sterling The Hacker Crackdown: Law and Disorder on the Electronic Frontier (1992)