Diffie's Crime, What Crime?
Many uses of computers are beneficial to some people and
injurious to others. What makes some of these uses crimes?
Perhaps it is the political power of either the injured
parties or those who stand to profit from investigating,
prosecuting, or protecting us against the crimes.
Markoff's Kevin and Me
My twenty years of reporting on computer crime and trying to avoid the computer crime beat at a variety of newspapers.
Neumann's What's Really Happening In Computer Crime?
I will address the evolution of computer security and of computer related crime, as they relate to each other, and what is needed in the future.
Stoll's Stalking the Wily Hacker ... Looking Back with a Grin
Someone breaks into your computer. What do you do? Slam the door? Call the police? Ignore the problem?
A decade and a half ago, I detected a hacker in my computer. We caught the guy, who turned out to be a German, spying for the Soviet KGB. It was amongst the first of the known cybercrimes.
What techniques did my adversary use to crack into computers? Which ones still work? Where are the holes in our systems? How do you trace someone across the worldwide computer networks? Who was willing to help -- and who wasn't? What's changed since then?
Lots has changed since then: the Arpanet morphed into the Internet. The FBI, which then took six months to respond to a network crime, can now issue a press release within hours.
2400 baud modems, which were then a rarity, have now become a rarity. And high technology, then considered a great way to make money, is now seen as a great way to make money.
Come hear Stalking the Wily Hacker ... A fun time is guaranteed for all.
Reception following at
Computer History Museum
visible storage warehouse (Bldg 126)
NASA Ames Research Center
Auditorium, Building 201, Moffett Field
Mountain View,
CA,