Abstract
This chapter investigates the technological evolution of cyber-crimes from its emergence in the early 1980s to its latest developments in 2013. From this evolution, we draw implications for doctrines, policy, innovation incentives, and roadmaps as we propose the emergence of a new “behavioral intelligence” paradigm, both in the attack and defense arenas.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
«A short history of hack», Ben Yagod, The New Yorker, March 6, 2014 http://www.newyorker.com/tech/elements/a-short-history-of-hack.
- 2.
- 3.
- 4.
Ben Yagoda, op. cit., 2014.
- 5.
- 6.
Cf. Raymond (2000).
- 7.
Katie and Markoff (1995).
- 8.
«Et la France ne créa pas l'Internet», par Laurent Mauriac et Emmanuelle Peyret, dans Libération du 27 mars 1998.
- 9.
- 10.
Ankara (2007).
- 11.
I started the SIM (strategic information management) list and bulletin boards on «Bitnet», the IBM sponsored facsimile and ancestor of the Internet in 1985. Although the group reached more than 500 members very early on, most discussions and sources were drained by US examples. For more details see: Baumard (1991). The first chapter of the book contains a synthesis of the SIM-List experiment.
- 12.
- 13.
See «behavior», in http://virus.wikidot.com/adm.
- 14.
- 15.
- 16.
A «MJ13» hack page example: http://loginz.chez.com/mj13v2.htm or alternatively: http://n8on.free.fr/hackzines/mj13/.
- 17.
- 18.
- 19.
- 20.
Clapes (1993).
- 21.
- 22.
Condat’s interview: http://www.magic.be/InterieurNuit/SiteMars/Condat.html.
- 23.
Guisnel (1995).
- 24.
Warusfel (2000).
- 25.
The actual footage of this show is visible on the video archive website of the Institut national audiovisuel: http://www.ina.fr/video/CPB91012010.
- 26.
Misc Magazine http://www.miscmag.com. The publication contributed to the normalization and the acceptance of “cybersecurity” consultants in France. As humorously put by a French hacker, “Misc was surely the first technical magazine about computer security that you could read wearing a suit”.
- 27.
- 28.
Fred Raynal is, in 2016, the very successful CEO of Quarkslab, a leading French cybersecurity consultancy firm of more than 50 employees. https://www.quarkslab.com.
- 29.
See Stoll (2000).
- 30.
Nathan Thornborough, “The Invasion of the Chinese Cyberspies (and the man who tried to stop them): An Exclusive Look at how the Hackers called TITAN RAIN are Stealing U.S. Secrets,” Time Magazine, September 5, 2005 http://www.cs.washington.edu/education/courses/csep590/05au/readings/titan.rain.htm.
- 31.
Read the retrospective story in Wired: Kevin Poulsen, «Indicted Federal Informant Allegedly Strong-Armed Hacker Into Caper That Drew 9-Year Sentence», 08/12/2008. https://www.wired.com/2008/08/indicted-federa/.
- 32.
References
Ankara N (2007) A Personal view of the French underground 1992–2007. Phrack #64, 27 May 2007 http://phrack.org/issues/64/17.html
Baumard P (1991) Stratégie et surveillance des environnements concurrentiels. Masson, Paris
Clapes AL (1993) Softwars: the legal battles for control of the global software industry. Quorum Books, Westport, Conn
Guisnel J (1995) Guerres dans le cyberespace, La Découverte
Katie H, Markoff J (1995) Cyberpunk: outlaws and hackers on the computer frontier. Simon and Schuster, NY
Raymond ES (2000) A brief history of Hackerdom, Thyrsus Enterprises. http://www.catb.org/esr/writings/homesteading/hacker-history/
Sterling B (1994) Part three: law and order. The hacker crackdown: law and disorder on the electronic frontier. Bantam Books, New York
Stoll C (1988) Stalking the wily hacker. Commun ACM 31(5):484–500
Stoll C(1989) The cuckoo’s egg: tracking a spy through the maze of computer espionage. DoubleBay, New-York
Stoll C (2000) The Cuckoo’s Egg: Tracking a Spy Through the Maze of computer espionage. Simon and Shuster, NY
Warusfel B (2000) Contre-espionnage et protection du secret: Histoire, droit et organisation de la sécurité nationale en France. Panazol, Lavauzelle
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2017 The Author(s)
About this chapter
Cite this chapter
Baumard, P. (2017). A Brief History of Hacking and Cyberdefense. In: Cybersecurity in France. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-54308-6_2
Download citation
DOI: https://doi.org/10.1007/978-3-319-54308-6_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-54306-2
Online ISBN: 978-3-319-54308-6
eBook Packages: Computer ScienceComputer Science (R0)