The document discusses the history of computer crimes from the 1970s to 2020, mentioning early hacks and crimes such as the blue box built by Steve Wozniak and Steve Jobs in 1971 to hack phones, and the first known computer embezzlement case in 1973. It then outlines several high profile hacking incidents and the emergence of computer viruses, Trojans, and organized cybercrime groups over the decades.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
49 views
Assignment #01
The document discusses the history of computer crimes from the 1970s to 2020, mentioning early hacks and crimes such as the blue box built by Steve Wozniak and Steve Jobs in 1971 to hack phones, and the first known computer embezzlement case in 1973. It then outlines several high profile hacking incidents and the emergence of computer viruses, Trojans, and organized cybercrime groups over the decades.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2
“Hussnain Ali” “0002-BS-CS-2017” “BSCS-7th”
Topic: "History of Computer Crimes since 1970 to 2020"
In beginning 1970 some of the highest network in the world included Nokia and Motorola use social engineering scheme, tricking insider into handling over codes and passwords and using passwords and codes to access internal computer systems. He becomes the most wanted computer crime of that time. 1971: Steve Wozniak build a blue box. This box is design to hack phones. He start to sell this product to his classmates with the help of Steve Jobs that was his friend. 1973: A teller in local New York bank use computer to embezzle over $2 million dollars. 1981: Ian Murphy that change the internal clock of AT&T network that charge hour rates at peak time. 1982: CIA control the gas pipeline by embedded code into network that control the pipeline of the Siberian. CIA embedded code into a device that was purchased by Soviet Union a company in Canada. It works like logic bomb. 1984: U.S. Comprehensive Crime Control Act gives Secret Service jurisdiction over computer fraud. 1988: Robert Morris make a worm. Worm is less harmful. When worm infected the PC it spreading very fast and show a message on PC screen. 1988-1991: In 1988 Kevin Poulsen break telephone company trailer. He continues hacking phone lines of Los Angeles radio station to guarantee he is the correct caller. He captured in 1991. 1989: Trojan horse Software is a software that preformed two things. One it complete the need of user and second it performed other PC harmful tasks like key capturing, regular screenshot. 1994: U.S and Rome air development discover a password “sniffer” that installed into networks. Investigators determine two hackers known as DataStream Cowboy and Kuji. 1995: Russian software engineer hacks into Citibank’s New York IT system from his apartment and authorizes a series of fraudulent transactions, eventually wiring an estimated $10 million to accounts worldwide. 1998-2007: Max Butler hacks U.S. government websites in 1998. In 2003 he use Wi-Fi to commit attacks, program malware and steal credit card information. In 2007, he is arrested. 1999: Jonathan James penetrate U.S. Department of Defense division computers and install a backdoor that allowing him to intercept thousands internal emails from different government organizations, NASA system shut down for three weeks. 2000: Mafia boy attack on several websites including Amazon, CNN, eBay and Yahoo! An industry expert estimates the attacks resulted in $1.2 billion dollars in damages. 2002: By targeting the thirteen Domain Name System (DNS) root servers, a DDoS attack assaults the entire Internet for an hour. 2003: U.S. Justice Department arrests for phishing, hacking, spamming and other Internet fraud as part of Operation Cyber Sweep. 2003-2008: Albert Gonzales is arrested in 2003 for stole and sold card numbers online and works with authorities in exchange for his freedom. He again stealing credit and debit card details around 2006 until he is arresting in 2008. 2004: Brian Salcedo is sentenced to 9 years for hacking into Lowe’s home improvement stores and attempting to steal customer credit card information. 2005: Phone Busters 2008: The Church of Scientology 2010: Zeus Trojan Virus