Skip to main content

A Brief History of Hacking and Cyberdefense

  • Chapter
  • First Online:
Cybersecurity in France

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

  • 1240 Accesses

Abstract

This chapter investigates the technological evolution of cyber-crimes from its emergence in the early 1980s to its latest developments in 2013. From this evolution, we draw implications for doctrines, policy, innovation incentives, and roadmaps as we propose the emergence of a new “behavioral intelligence” paradigm, both in the attack and defense arenas.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    «A short history of hack», Ben Yagod, The New Yorker, March 6, 2014 http://www.newyorker.com/tech/elements/a-short-history-of-hack.

  2. 2.

    http://www.catb.org/~esr/jargon/html/H/hack-value.html.

  3. 3.

    http://www.catb.org/~esr/faqs/hacker-howto.html.

  4. 4.

    Ben Yagoda, op. cit., 2014.

  5. 5.

    http://www.nytimes.com/1976/06/13/archives/crime-by-computer.html?_r=0.

  6. 6.

    Cf. Raymond (2000).

  7. 7.

    Katie and Markoff (1995).

  8. 8.

    «Et la France ne créa pas l'Internet», par Laurent Mauriac et Emmanuelle Peyret, dans Libération du 27 mars 1998.

  9. 9.

    http://www.textfiles.com/magazines/LOD/lod-1.

  10. 10.

    Ankara (2007).

  11. 11.

    I started the SIM (strategic information management) list and bulletin boards on «Bitnet», the IBM sponsored facsimile and ancestor of the Internet in 1985. Although the group reached more than 500 members very early on, most discussions and sources were drained by US examples. For more details see: Baumard (1991). The first chapter of the book contains a synthesis of the SIM-List experiment.

  12. 12.

    http://virus.wikidot.com/adm.

  13. 13.

    See «behavior», in http://virus.wikidot.com/adm.

  14. 14.

    http://n8on.free.fr/hackzines/hvu/8/HVU8.html.

  15. 15.

    http://probe.20minutes-blogs.fr/tag/bidouille.

  16. 16.

    A «MJ13» hack page example: http://loginz.chez.com/mj13v2.htm or alternatively: http://n8on.free.fr/hackzines/mj13/.

  17. 17.

    http://www.digitalsec.net/stuff/website-mirrors/pHC/60/p60-0x01.txt.

  18. 18.

    http://pdf.textfiles.com/academics/wilyhacker.pdf.

  19. 19.

    http://www.textfiles.com/hacking/modbook4.txt.

  20. 20.

    Clapes (1993).

  21. 21.

    https://www.theguardian.com/environment/earth-insight/2014/jun/19/open-source-revolution-conquer-one-percent-cia-spy.

  22. 22.

    Condat’s interview: http://www.magic.be/InterieurNuit/SiteMars/Condat.html.

  23. 23.

    Guisnel (1995).

  24. 24.

    Warusfel (2000).

  25. 25.

    The actual footage of this show is visible on the video archive website of the Institut national audiovisuel: http://www.ina.fr/video/CPB91012010.

  26. 26.

    Misc Magazine http://www.miscmag.com. The publication contributed to the normalization and the acceptance of “cybersecurity” consultants in France. As humorously put by a French hacker, “Misc was surely the first technical magazine about computer security that you could read wearing a suit”.

  27. 27.

    http://www.miscmag.com.

  28. 28.

    Fred Raynal is, in 2016, the very successful CEO of Quarkslab, a leading French cybersecurity consultancy firm of more than 50 employees. https://www.quarkslab.com.

  29. 29.

    See Stoll (2000).

  30. 30.

    Nathan Thornborough, “The Invasion of the Chinese Cyberspies (and the man who tried to stop them): An Exclusive Look at how the Hackers called TITAN RAIN are Stealing U.S. Secrets,” Time Magazine, September 5, 2005 http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm.

  31. 31.

    Read the retrospective story in Wired: Kevin Poulsen, «Indicted Federal Informant Allegedly Strong-Armed Hacker Into Caper That Drew 9-Year Sentence», 08/12/2008.  https://www.wired.com/2008/08/indicted-federa/.

  32. 32.

    https://www.wired.com/2010/03/gonzalez-salary/.

References

  • Ankara N (2007) A Personal view of the French underground 1992–2007. Phrack #64, 27 May 2007 http://phrack.org/issues/64/17.html

  • Baumard P (1991) Stratégie et surveillance des environnements concurrentiels. Masson, Paris

    Google Scholar 

  • Clapes AL (1993) Softwars: the legal battles for control of the global software industry. Quorum Books, Westport, Conn

    Google Scholar 

  • Guisnel J (1995) Guerres dans le cyberespace, La Découverte

    Google Scholar 

  • Katie H, Markoff J (1995) Cyberpunk: outlaws and hackers on the computer frontier. Simon and Schuster, NY

    Google Scholar 

  • Raymond ES (2000) A brief history of Hackerdom, Thyrsus Enterprises. http://www.catb.org/esr/writings/homesteading/hacker-history/

  • Sterling B (1994) Part three: law and order. The hacker crackdown: law and disorder on the electronic frontier. Bantam Books, New York

    Google Scholar 

  • Stoll C (1988) Stalking the wily hacker. Commun ACM 31(5):484–500

    Article  Google Scholar 

  • Stoll C(1989) The cuckoo’s egg: tracking a spy through the maze of computer espionage. DoubleBay, New-York

    Google Scholar 

  • Stoll C (2000) The Cuckoo’s Egg: Tracking a Spy Through the Maze of computer espionage. Simon and Shuster, NY

    Google Scholar 

  • Warusfel B (2000) Contre-espionnage et protection du secret: Histoire, droit et organisation de la sécurité nationale en France. Panazol, Lavauzelle

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Philippe Baumard .

Rights and permissions

Reprints and permissions

Copyright information

© 2017 The Author(s)

About this chapter

Cite this chapter

Baumard, P. (2017). A Brief History of Hacking and Cyberdefense. In: Cybersecurity in France. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-54308-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-54308-6_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-54306-2

  • Online ISBN: 978-3-319-54308-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics