menu_open Columnists
We use cookies to provide some features and experiences in QOSHE

More information  .  Close

From Creeper to PECA: The Evolution of Cybercrime and Legal Frameworks

23 0
11.06.2025

As the world ages, experienced minds continue to accumulate. As each day evolves, the revolution deepens along the pathways of technology. The existence of AI is spreading like an essential utility. Technology has overtaken daily life, making people dependent on it for both small tasks like calculations and larger responsibilities such as managing a company’s budget. While it is commonly used for everyday purposes—whether trivial or critical—exposure to danger accompanies this dependence.

Bob Thomas, known as the father of cybersecurity, invented the “Creeper” in 1971, which enabled access to another computer through a single system. In today’s era, this technique is referred to as hacking. Although Thomas did not design it to corrupt data, it was misused. Subsequently, Ray Tomlinson developed the “Reaper” to eliminate the Creeper worm, marking the creation of the first known antivirus. The Vienna virus was the first to be destroyed by antivirus software (History of Cybersecurity).

The role of technology is inevitable in the everyday lives of humans. It would not be wrong to say that the smarter the technology, the greater the chance of theft—much like with a rare diamond. The 1990s became an eye-opening era for people unaware of cybercrime. Ian Murphy was the first individual convicted of cybercrime for breaching AT&T’s computers in 1981. In the infamous “Morris Worm” attack of 1988, a company’s billing system was manipulated, resulting in long-distance calls being charged during off-peak hours. Although it seemed harmless, this incident revealed the dangers of internet-based attacks.

In 1994, Vladimir........

© The Spine Times