Compilation of +440 Craig Wright´s Post, Papers & Books (2019 12 30) chronological order

Compilation of +440 Craig Wright´s Post, Papers & Books (2019 12 30) chronological order

https://ramonquesada.com


  

Date   -   Title - Post & Papers

1988  (18 Years old)

16/09/1988  EDUCATION Engineering, Computer Systems Engineering (incomplete - changed to Comp Sci in 4th year -University of Queensland. 1988 – 1992

1991  (21 Years old)

01/03/1991 BUSINESS Executive Chef C&C Catering. – Nov 1994 (3 years 9 months)

16/02/1991 W&K was founded in Palm Beach County in 2011, with Dave Kleiman as its registered agent.


1994

5/04/1994 "...if the cash system used by you and your bank is such that all money is in-herently traceable, it will be a lot harder to commit robbery, extortion, kidnapping, and all those other horrors which people fear will come with digital cash". Hal Finney


1996  (26 Years old)

16/09/1996 IDEOLOGY Craig Wright is on the cypherpunk mailing lists arguing in favor of capitalism To: Timothy C. May

16/09/1996 Political Risk v. Charity (was: RE: Workers Paradise. /Political rant

1996 When she (Lynn Wright) went to Sydney to visit him, he brought a ring to the airport. ‘He was 26 and I was 44,’ she said. Neither of them had been married before."

The Satoshi afaire.. Andrew O’Hagan Pag. 20


1997  (27 Years old)

01/04/1997 BUSINESS Information Security Australian Stock Exchange ASEApril 1997 – May 1998 (1 year 2 months) Tamaño de ASX 501-1000 empleados

01/11/1997 BUSINESS Managing Director, MD, CTO, CIO and founder. DeMorgan November 1997 – August 2003 (5 years 10 months)

1998  (28 Years old)

16/09/1998  EDUCATION Doctor of Theology, Comparitive Religous and Classical Studies 1998 – 2003


1999

"...The term "proof of work" was first coined and formalized in a 1999 paper by Markus Jakobsson and Ari Juels.[2]" - Wikipedia


2000  (30 Years old)

June 2000 Security in AUSTRALIA  Version 1.0 by A. Ashbury  and Craig S Wright


2001  (31 Years old)

01/02/2001 NT Security: Step-by-Step (Version 3.03) 49 pages

01/02/2001 BUSINESS Chief Research Officer (1-100 Employees, R and D Company)

Ridges Estate. February 2001 – September 2004 (3 years 8 months)


2003  (33 Years old)

24/07/2003- All Dave Kleiman posts on The Cryptography Mailing List . Authors

Craig & Kleiman met online: they visited the same cryptography forums and had interacted since 2003. The Satoshi Affair. Page 16 Dave Kleiman

30/09/2003 BOOK by Peter Wayner. Policing Online Games –  Craig cited the book explaining why “blockchain” based digital money wasn’t Bitcoin’s innovation.

06/11/2003 LEGAL Ryan and Anor v Wright and Anor [2003] NSWSC 1011 Mr Ryan’s case is that he agreed to invest $50,000 in cash in the company.


2004  (34 Years old)

01/10/2004 BUSINESS Associate Director (Risk Services) BDO October 2004 – January 2009 (4 years 4 months) BDO

2005  (35 Years old)

03/04/2005 QUALIFICATION: Certified Since: April 2005 Retired Certifications: GSE

25/04/2005 Implementing an Information Security Management System (ISMS) Training process. G2700  GIAC Gold Papers: 100 Pag.

 03/09/2005 Implementing an Information Security Management System (ISMS)

Global Information Assurance Certification Paper Paper. 60 Pag.

 16/09/2005  QUALIFICATION: Master of Statistics (MSTAT), Quantitative Statistics. University of Newcastle  2005 – 2009

27/10/2005 LEGAL Wright v Ryan & Anor [2005] NSWCA 368 (27 October 2005)

 25/12/2005 Triple Entry Accounting Ian Grigg

2005 VIDEO Interview published with Bernard von Nothaus where he says a mutual friend tells him Satoshi Nakamoto was a fan: min. 7:40  


2006  (36 Years old) (8 Articles & Papers)

2006 Analysis of a Serial Based Digital Voice Recorder. 60 Pag.

09/01/2006 Electronic Contracting, New Wine in Old Bottles. SSRN

7/02/2006 Email Forensic/Cyber Crime Investigator From: "dave kleiman To: Craig

08/02/2006 Forensic/Cyber Crime Investigator. "The facts and only the facts".

13/02/2006 Was Forensic/Cyber Crime Investigator - Now Statistical Analysis of Digital Forensic Sciences. BDO

22/02/2006 Vulnerabilites in new laws on computer hacking. BDO

22/03/2006 Email Signing before Encryption and Signing after Encryption. BDO

31/03/2006 Extending Control, API Hooking. Hakin9

15/06/2006 LEGAL Wright v Ryan & Anor [2006] HCATrans 307 (15 June 2006)

01/09/2006 BOOK Dave Kleiman How to Cheat at Windows System Administration Using Command Line Scripts. September 2006

16/09/2006  QUALIFICATION: LLM, Law (International Commercial Law). Northumbria University 2006 – 2008

01/10/2006 A QUANTITATIVE TIME SERIES ANALYSIS OF MALWARE AND VULNERABILITY TRENDS. BDO

01/11/2006 BOOK Dave Kleiman CD and DVD Forensics. November 2006

01/12/2006 BOOK Dave Kleiman Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures. December 2006

2007  (37 Years old) (9 Articles & Papers)

1- Bitcoin: A Peer-to-Peer Electronic Cash System

8/01/2007 BOOK Complex Social Networks . Fernando Vega Redondo. Professor Universidad de Alicante 1990 – 2007 - Craig confirms Bitcoin is a small-world network.

01/01/2007 BUSINESS Mentor and Stay Sharp Instructor SANS Institute. 2015 (8 years)

01/01/2007 QUALIFICATION: Technical Director. GIAC Ethics Board until (2011)

01/01/2007 BOOK Dave Kleiman Rootkits for Dummies (For Dummies (Computer/Tech)

01/01/2007 Beyond automated tools and Frameworks - the shellcode injection process. Hakin9

03/03/2007 The Psychology of Security Dr Craig Wright • Schneier on Security

31/03/2007 Taking control, Functions to DLL injection. Hakin9

03/07/2017 Overwriting Hard Drive Data: The Great Wiping Controversy. Kleiman

14/04/2007 Concepts: Security and Obscurity. BDO

16/07/2007 A Taxonomy of InformationSystems Audits, Assessmentsand Reviews. . SANS Institute

01/08/2007 The Problem With Document Destruction. Vol 10. The IIA, USA

16/09/2007  EDUCATION Psychology, Psychology. Charles Sturt University – 2010

04/10/2007 . java source code audit. BDO

30/10/2007 . PAYMENTS PROVIDERS AND INTERMEDIARIES AS DEFINED IN THE LAW OF THE INTERNET.

07/11/2007 BOOK Dave Kleiman - The Official CHFI Study Guide

01/12/2007 RELIGION The Uniting Church (NSW) Trust Association Limited. United Financial Services Trustee. December 2007 – Present (2015)

2008  (38 Years old) (17 Articles & Papers)

14/01/2008 ELECTRONIC CONTRACTING IN AN INSECURE WORLD

21/01/2008 Requirements for Record Keeping and Document Destruction in a Digital World SANS RR Oct 2007. 84 Pages  

31/01/2008 The postal acceptance rule

01/02/2008 “Electronic Contracting in an Insecure World” SANS RR Nov 2007.

27/02/2008 ISO 27001 mapping to PCI

05/03/2008 Defamation and the diffculties of law on the Internet.

This post goes to those cowards who sit behind anonymity on the web

4/04/2008 INTERVIEW Craig Wright, Security Hero - GIAC Technical Director

17/04/2008 The Impact of Internet Intermediary Liability. 90 Pages  

19/04/2008 . The application, scope and limits of Letters of Indemnity

21/04/2008 . UCP 500 - successful or not.

22/06/2008 DETECTING HYDANSTATISTICAL METHODS FOR CLASSIFYING THE USE OF HYDANBASED STEGONOGRAPHY IN EXECUTABLE FILES

03/07/2008 Detecting Hydan: Statistical Methods For Classifying The Use Of Hydan Based Stegonagraphy In Executable Files.

04/07/2008 BOOK - "The IT Regulatory and Standards Compliance Handbook:

How to Survive Information Systems Audit and Assessments"

07/07/2008 Statistical Methods to Determine the Authenticity of Data.

15/10/2008 . Wiping a drive: /dev/zero or /dev/urandom better? GSE-Compliance

27/10/2008 . How math can help with forensics. SANS

 31/10/2008  Satoshi Nakamoto was the inventor of the bitcoin protocol, publishing a paper via the Cryptography Mailing List

14/11/2008 BOOK - Mobile Malware Attacks and Defense - 440 Pages

17/11/2008 Satoshi Nakamoto Bitcoin P2P e-cash paper: I believe I've worked through all those little details over the last year and a half while coding it,.... The Cryptography Mailing List To: James A Donald

05/12/2008 Forensic Mining. SANS

15/12/2008 . Destruction of adverse documents . SANS

17-22/12/2008 Searches and the US 4th Amendment . SANS

30/12/2008 Current Issues in DNS. - Sans Technology Inst, USA. 78 Pag

December 2008 BOOK - Overwriting Hard Drive Data: The Great Wiping Controversy.

243 Pages (Dave Kleiman and Craig Pages 243–257)


2009  (39 Years old) (16 Articles & Papers)

01/01/2009 BUSINESS Director Information Defense Pty Ltd January 2009 – June 2011 (2 years 6 months)

03/01/2009 The genesis block is dated to 3rd January, 2009. The first mined block occurred on 9th January.

12/01/2009 Hal Finney, who would receive the first bitcoin transaction, on block 9. 10 btc

15/01/2009 . Overwriting Hard Drive Data. (Dave Kleiman) . SANS

28/01/2009 . Data Recovery: ECC Data and recovery. (Dave Kleiman) . SANS

28/01/2009 . Spin-Stand Microscopy of Hard Disk Data (Dave Kleiman) . SANS

04/02/2009 What happens when you overwrite data? (Dave Kleiman) . SANS

11/02/2009 Overwriting can occur anytime, as long as it is done once after . SANS

18/02/2009 Free Windows Drive tools . SANS

23/02/2009 Starting a Drive Repair/Recovery Lab . SANS

11/03/2009 SQL, Databases and Forensics. SANS

15/03/2009 Forensics and Data Access Auditing . SANS

21/03/2009 Judge orders defendant to decrypt PGP-protected laptop - CNET News

27/03/2009 SQL Rootkits . SANS

01/04/2009 Code in a Flash . SANS

24/04/2009 Code skills make better Forensic Analysts . SANS

27/04/2009 Using HELIX LIVE for Windows . SANS

29/04/2009 System Scanner . SANS

01/05/2009 BUSINESS Vice President, Forensics Services. iVolution Security (6 years)

11/05/2009 A Step-by-Step introduction to using the AUTOPSY Forensic Browser .SANS

22/05/2009 BOOK Official (ISC)2 Guide to the CISSP(R)-ISSMP(R) CBK

"Law, Investigations, Forensics and Ethics".

22/06/2009 Live Investigations .SANS

29/06/2009 . Hard Drive Errors and Replacements . SANS

 16/09/2009  EDUCATION PhD, Computer Science. Charles Sturt University – 2012

28/09/2009 . Reverse Enginnering Java . SANS

03/11/2009 An Analysis of SpyKing . SANS


2010  (40 Years old) (16 Articles & Papers)

9/02/2010 Modelling Risk. blog personal 

9/02/2010 how about accepting a challenge to an open debate on the subject at Defcon?

12/02/2010 . Risk measurements. "Risk and economics matter to security."

09/03/2010 . Building a UNIX/Linux Incident response / Forensic Disk . SANS

10/03/2010 . Unix Logging . SANS

12/03/2010 . Unix Network and System profiling . SANS

15/03/2010 . Finding out about other users on a Linux system . SANS

22/03/2010 . Finer Points of Find . SANS

24/03/2010 . Unix System Accounting and Process Accounting . SANS

09/04/2010 . Undersanding *NIX File Linking (ln) . SANS

13/04/2010 . An anti-forensics dd primer . SANS

28/05/2010 Criminal Specialization as a corollary of Rational Choice.” ICBIFE, HK

24/06/2010 . NDIFF for incident detection . SANS

13/07/2010 . Linux Programming Tools . SANS

24/08/2010 Packer Analysis Report – Debugging and unpacking the NsPack 3.4 and 3.7 packer. Sans Technology Inst, USA

16/10/2010 PERSONAL My first marriage ended in October 2010 Lynn   The story of Bitcoin.

30/11/2010 The Economics of Developing Security Embedded Software. 12 Pages

Charles Sturt University

01/12/2010 Software, Vendors and Reputation: an analysis of the dilemma in creating secure software” Intrust 2010 China

13/12/2010 Software, vendors and reputation: An analysis of the dilemma in creating secure software. Charles Sturt University

2nd International Conference on Trusted Systems, INTRUST 2010 - Beijing, China

22/12/2010 PERSONAL Trip to china (With Lynn Wright  )

2010 BUSINESS Wright began working for Bodog in 2010, Ayre featured in the 2006 “billionaires” issue of Forbes magazine.


2011 (41 Years old) (23 Articles & Papers)

2011 BUSINESS http://www.ncrypt.com Sector Servicios financieros international remittance, bitcoin, bitcoin exchange, Vancouver

2011 Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls. CISIS Spain

08/01/2011 A Quantitative Analysis into the Economics of Correcting Software . CISIS Spain 2010

25/01/2011 . Erasing drives should be quick and easy. SANS

26/01/2011 Using checklists to make better best Craig S. Wright, Tanveer A. Zia

09/02/2011 VIDEO Computer Forensics Expert Dave Kleiman on ABC News.

15/02/2011 Modeling System Audit as a Sequential test with Discovery as a Failure Time Endpoint” ICBIFE, HK. Wright, C & Via, T (2011)

11/04/2011 BOOK Official (ISC)2® Guide to the ISSMP® CBK® ((ISC)2 Press)- 470 Pag.

11/04/2011 BUSINESS Asia Pacific Director, VP GICSR | Global Institute for Cyber Security + Research – February 2012 (11 months)

23/04/2011 Satoshi disappeared from the Bitcoin Talk forums "I've moved on to other things. It's in good hands with Gavin and everyone". said to Mike Hearn

01/06/2011 Scanning for Malware Offline is Essential

10/06/2011 Rationally Opting for the Insecure Alternative: Negative Externalities and the Selection of Security Controls . Charles Sturt University 8 Pages

10/06/2011 A Quantitative Analysis into the Economics of Correcting Software Bugs

4th International Conference on Computational Intelligence in Security for Information Systems: CISIS 2011 - Hotel Melia Costa del Sol, Torremolinos, Málaga, Spain

Chapter 4: Securing Software. Pages 198-205

20/06/2011 A comparative study of attacks against Corporate IIS and Apache Web Servers. 34 Pages

22/06/2011 NEWS Tougher cybercrime laws hit parliament. The Federal Government will today introduce tougher cybercrime laws into parliament that will require internet service providers to retain data on customers when requested by authorities across the globe. By Josh Taylor 

14/07/2011 What makes an expert?

26/07/2011 Why didn’t Google catch the Norway killer?

29/07/2011 Are Anonymous and LulzSec about to hack PayPal for WikiLeaks?

4/08/2011 World’s biggest-ever cyber attacks uncovered – and it’s only the beginning

9/08/2011 LulzSec, Anonymous … freedom fighters or the new face of evil? Craig S Wright

24/08/2011 Starting to Write Your Own Shellcode 4 Pages

24/08/2011 A preamble into aligning Systems engineering and Information security risk measures” ICBIFE, HK

24/08/2011 Exploiting format Strings with Python. Hakin9

24/08/2011 Starting to write your own shellcode. Hakin9

31/08/2011  BOOK - Check Point NGX R65 Security Administration- 800 Pages

105/09/2011 Rationally opting for the insecure alternative: Negative externalities and the selection of security controls. 20 pag

20/09/2011 the Law Says about Distributing a Virus or Malware

26/09/2011 SCADA: Air Gaps Do Not Exist

11/10/2011 A Preamble into Aligning Systems Engineering and Information Security Risk 38 Pages

30/10/2011 BOOK - A quantitative analysis into the economics of correcting software bugs. 12 Pages (Pages 198–205)

01/11/2011 Of Black Swans, Platypii and Bunyips. The outlier and normal incident in risk management. CACS2011 Australia

01/12/2011 A comparative study of attacks against Corporate IIS and Apache Web Servers. Sans Technology Inst, USA

07/12/2011 Using checklists to make better best. Charles Sturt University

13/12/2011 Modeling system audit as a sequential test with discovery as a failure time endpoint. 2011 International Conference on Business Intelligence and Financial Engineering: ICBIFE 2011 - Hong Kong, Craig W, Tanveer Zia. Charles Sturt University

23/12/2011 BUSINESS Eventually, later in 2011, I started working on a company called PanopticryptThe story of Bitcoin, 


2012 (42 Years old)

01/01/2012 BUSINESS Executive Vice President, Strategic Development CSCSS / Centre for Strategic Cyberspace + Security Science. – July 2015 (3 years) London, UK

02/03/2012 Cybercrime legislation a backward step. Legislation to help foreign nations cooperate on fighting cybercrime is misguided and misses the point, according to the Asia-Pacific director of the Global Institute for Cyber Security and Research, Dr Craig Wright. By Michael Lee

24/08/2012 Group Selection and Cyber Terror. 5 Pages  

18/10/2012 BUSINESS Denariuz Ltd is a Private Company Limited. Doncaster, South Yorkshire.

05/12/2012 . Territorial behavior and the economics of Botnets

2013 (43 Years old)

23/01/2013 Cyber Security Centre planned to target growing threat.

26/04/2013 Kleiman died in his home in April 2013 seemingly of natural causes related to complications from a MRSA infection.

29/04/2013  VIDEO "Craig Wright tribute video to friend Dave Kleiman (some say this pair is "Satoshi"). RIP (1967-2013)"

02/05/2013 . Today's manifesto...

01/06/2013 BUSINESS Chief Executive Officer. Hotwire Pre-Emptive Intelligence Group. June 2013 – Present (2 years 7 months) Sydney, Australia

12/06/2013 Self-education cap risks cyber-security. Charles Sturt University

17/07/2013 Huge interest in CSU cyber security course. Australia Charles Sturt University

23/11/2013 Craig marries for the second time, Ramona WATTS


Ramon Quesada - Links

https://ramonquesada.com


Report Page