Astounding War Stories from
the World of Computer Crime

The FBI Computer Crime Squad
estimates that 85 to 97 per cent of all computer break-ins are not detected, and of
those that are, only 10 per cent are reported, probably because the owners of the
databases do not want to scare their customers.
Below is a list of some of the more imaginative crimes of the past few years:
The Great Arpanet Worm. In November 1988, Robert T.
Morris, Jr.
wrote a program that penetrated the country's poorly defended computer
networks, replicating itself so fast that it created nationwide network
gridlock in a matter of days. It turns out that Robert T.
Morris, Sr., his father, is an expert in Unix viruses. He had little
to say about his son's achievement which, incidentally, resulted in the creation
of the nationwide Computer
Emergency Response Team.
The
New California Gold Rush. A bank employee simply e-mailed Brinks to tell
them to deliver 44 kilos of gold to a P.O. box number in remote California. Someone
picked up the gold--and disappeared.
The Cuckoo's Egg by Clifford Stoll. This
book details how the author, intrigued by a 75 cent accounting discrepancy
on a system in California, tracked down an East German spy, hacking into our
defense system. The book reads like a fictional detective story.
Garbage Dump.
Angered by a piece Newsday journalist Josh Quittner had written
about hackers, the article's subjects hacked their way into
the root directories of IBM, Sprint and a small Internet provider
called Pipeline to fire thousands of abusive junk e-mail items to
his personal address, effectively preventing him from accessing
the Internet.

Return to top of page
Back to "Security
on the Internet" home page.
Back to "Getting Started on the WWW".

This page was designed and developed in partial fulfillment of the
requirements for Baruch College, Graduate Course "Networks and
Telecommunications" -- CIS 9350. The information provided in these
pages is accurate and up to date (as of December 1995) to the best
of our knowledge and abilities. The page was designed and created
for educational purposes only. Any opinions represented on this
page are from the students' perspective as they researched the
opinions of the faculty or the Baruch College School of Business.
Security Project Members.
Please send comments about this page to Sue Young at ysue@echonyc.com.

Last modified 16 Dec 95
