-
1
-
-
84910875356
-
Cyberpunks and the Constitution
-
April 8
-
Elmer-Dewitt, P. 1991. Cyberpunks and the Constitution. Time, 137, April 8, 1991, p. 81;
-
(1991)
Time
, vol.137
, Issue.1991
, pp. 81
-
-
Elmer-Dewitt, P.1
-
2
-
-
0343001534
-
Why the legion of doom has little to fear of the feds
-
April 15
-
Lewyn, M., & Schwartz, E. I. Why the legion of doom has little to fear of the feds. Business Week, April 15, 1991, p. 31;
-
(1991)
Business Week
, pp. 31
-
-
Lewyn, M.1
Schwartz, E.I.2
-
3
-
-
85023996094
-
-
September 1
-
United States v. Zod, The Economist, 316, September 1, 1990, pp. 23-24.
-
(1990)
The Economist
, vol.316
, pp. 23-24
-
-
-
4
-
-
0005856609
-
-
New York: Random House
-
Mungo, P., & Clough, B. 1992. Approaching zero: The extraordinary underworld of hackers, phreakers, virus writers, and keyboard criminals. New York: Random House.
-
(1992)
Approaching Zero: The Extraordinary Underworld of Hackers, Phreakers, Virus Writers, and Keyboard Criminals
-
-
Mungo, P.1
Clough, B.2
-
6
-
-
85024049674
-
-
Compiled by The Epic Project, July 26
-
Aldrich, J. 1990. Push button felonies. Compiled by The Epic Project, jefrich@well.sf.ca.us, July 26.
-
(1990)
Push Button Felonies
-
-
Aldrich, J.1
-
7
-
-
85024044432
-
-
May 24
-
Attacking the Pentagon. The Commercial Appeal, May 24, 1996, p. 12a.
-
(1996)
The Commercial Appeal
, pp. 12a
-
-
-
8
-
-
85024030104
-
Hackers promote better image
-
June 24
-
Alexander, M. 1991. Hackers promote better image. Computerworld, 25, June 24, p. 124;
-
(1991)
Computerworld
, vol.25
, pp. 124
-
-
Alexander, M.1
-
9
-
-
85023984253
-
Hackers switch sides, offer security package
-
March 1
-
Daly, J. 1993. Hackers switch sides, offer security package. Computerworld, 27, March 1, 1993, p. 6.
-
(1993)
Computerworld
, vol.27
, Issue.1993
, pp. 6
-
-
Daly, J.1
-
11
-
-
85023971770
-
Memoirs of a Cybernaut
-
November
-
Kroupa P., “Memoirs of a Cybernaut,” Wired, 1, November, 1993, p. 59.
-
(1993)
Wired
, vol.1
, pp. 59
-
-
Kroupa, P.1
-
12
-
-
0042755877
-
Street noise
-
Branwyn, G. 1992. Street noise. Mondo 2000, p. 30.
-
(1992)
Mondo 2000
, pp. 30
-
-
Branwyn, G.1
-
13
-
-
11144274068
-
Protecting the crown jewels of the information economy
-
F. W. Rushing & C. G. Brown, Boulder, CO: Westview Press
-
Branscomb, A. W. 1990. Protecting the crown jewels of the information economy. In Intellectual property rights in science, technology, and economic performance, eds. F. W. Rushing & C. G. Brown, p. 48. Boulder, CO: Westview Press.
-
(1990)
Intellectual Property Rights in Science, Technology, and Economic Performance
, pp. 48
-
-
Branscomb, A.W.1
-
14
-
-
85024078296
-
Cyberspace cadets
-
February
-
Kiely, T. 1992. Cyberspace cadets. CIO, February, p. 70.
-
(1992)
CIO
, pp. 70
-
-
Kiely, T.1
-
15
-
-
85024073255
-
The hacker as scapegoat
-
October 23
-
Kelleher, J. 1989. The hacker as scapegoat. Computerworld, October 23, p. 80.
-
(1989)
Computerworld
, pp. 80
-
-
Kelleher, J.1
-
16
-
-
85023978842
-
Portrait of J. Random Hacker
-
Cambridge: MIT Press
-
Raymond, E. “Portrait of J. Random Hacker.” From The new hacker’s dictionary. Cambridge: MIT Press, 1990, pp. 413-420.
-
(1990)
The New hacker’s Dictionary
, pp. 413-420
-
-
Raymond, E.1
-
18
-
-
85024027387
-
Prison term for first U.S. Hacker-law convict
-
February 20
-
Alexander, M. 1989. Prison term for first U.S. hacker-law convict. Computerworld, 23, February 20, pp. 1, 12.
-
(1989)
Computerworld
, vol.23
-
-
Alexander, M.1
-
19
-
-
84894756654
-
The last hacker
-
September 12
-
Littman, J. 1993. The last hacker. Los Angeles Times, September 12, pp. 18-24, 64-65.
-
(1993)
Los Angeles Times
-
-
Littman, J.1
-
21
-
-
85024005649
-
The goods on hacker hoods
-
September 13
-
Freedman, D. H. 1993. The goods on hacker hoods. Forbes ASAP 152, September 13, pp. 32-40.
-
(1993)
Forbes ASAP
, vol.152
, pp. 32-40
-
-
Freedman, D.H.1
-
22
-
-
85023982684
-
Portrait of hackers as young adventurers not convincing
-
June 22
-
Keefe, P. 1992. Portrait of hackers as young adventurers not convincing. Computerworld 26, June 22, p. 33.
-
(1992)
Computerworld
, vol.26
, pp. 33
-
-
Keefe, P.1
-
23
-
-
85023974497
-
Surfing off the edge
-
February 8
-
Behar, R. 1993. Surfing off the edge. Time 141, February 8, pp. 62-63.
-
(1993)
Time
, vol.141
, pp. 62-63
-
-
Behar, R.1
-
24
-
-
85024061977
-
Inside track on hackers
-
June
-
Bird, J. 1992. Inside track on hackers. Management Today June, pp. 78-82;
-
(1992)
Management Today
, pp. 78-82
-
-
Bird, J.1
-
25
-
-
85024073953
-
Hacker victims heartened by conviction
-
February 20
-
Alexander, M. 1989. Hacker victims heartened by conviction. Computerworld 23, February 20, pp. 1, 12.
-
(1989)
Computerworld
, vol.23
-
-
Alexander, M.1
-
26
-
-
85024064495
-
Experts call for better computer security
-
December 6
-
Johnston, O. 1990. Experts call for better computer security. Los Angeles Times, December 6, p. A29.
-
(1990)
Los Angeles Times
, pp. A29
-
-
Johnston, O.1
-
27
-
-
0039803560
-
Spying and sabotage by computers
-
March 20
-
Peterzell, J. 1989. Spying and sabotage by computers. Time 133, March 20, pp. 25-26.
-
(1989)
Time
, vol.133
, pp. 25-26
-
-
Peterzell, J.1
-
28
-
-
85023988280
-
Computer crime: Ugly secret for business
-
March 12
-
Alexander, M. 1990. Computer crime: Ugly secret for business. Computerworld 24, March 12, p. 1.
-
(1990)
Computerworld
, vol.24
, pp. 1
-
-
Alexander, M.1
-
29
-
-
85023991852
-
Complex crimes stall enforcers
-
March 19
-
Alexander, M. 1990. Complex crimes stall enforcers. Computerworld 24, March 19, p. 4.
-
(1990)
Computerworld
, vol.24
, pp. 4
-
-
Alexander, M.1
-
30
-
-
0011531947
-
The playground bullies are learning how to type
-
December 21
-
Flanagan, W. G., & McMenamin, B. 1992. The playground bullies are learning how to type. Forbes 150, December 21, pp. 184-189.
-
(1992)
Forbes
, vol.150
, pp. 184-189
-
-
Flanagan, W.G.1
McMenamin, B.2
-
31
-
-
85024077442
-
The Terminal Men: Crackdown on the “Legion of Doom” ends an era for computer hackers
-
June 24
-
Schatz, W. 1990. The Terminal Men: Crackdown on the “Legion of Doom” ends an era for computer hackers. Washington Post, June 24, pp. H1, H6.
-
(1990)
Washington Post
, pp. H1-H6
-
-
Schatz, W.1
-
32
-
-
0003706271
-
-
Minneapolis: University of Minnesota Press
-
Campbell, D. 1992. Writing security. Minneapolis: University of Minnesota Press, p. 204.
-
(1992)
Writing Security
, pp. 204
-
-
Campbell, D.1
-
35
-
-
84916820356
-
Charges dropped against alleged BellSouth hacker
-
August 6
-
Karpinski, R. 1990. Charges dropped against alleged BellSouth hacker. Telephony 219, August 6, pp. 12-13.
-
(1990)
Telephony
, vol.219
, pp. 12-13
-
-
Karpinski, R.1
-
36
-
-
85024083979
-
Morris case impact slight
-
January 21
-
Alexander, M. 1991. Morris case impact slight. Computerworld 25, January 21, pp. 1, 4.
-
(1991)
Computerworld
, vol.25
-
-
Alexander, M.1
-
37
-
-
85023963561
-
A superhacker meets his match
-
February 27
-
Hafner, K. 1995. A superhacker meets his match. Newsweek, February 27, pp. 61-63.
-
(1995)
Newsweek
, pp. 61-63
-
-
Hafner, K.1
-
39
-
-
85024001170
-
Famed hacker pleads guilty to 1 federal charge
-
April 23
-
Smith, D. 1996. Famed hacker pleads guilty to 1 federal charge. Los Angeles Times, April 23, p. 4.
-
(1996)
Los Angeles Times
, pp. 4
-
-
Smith, D.1
-
41
-
-
85023979957
-
Swarming your sites
-
April 8
-
Higgins, K. J. 1996. Swarming your sites. Communications Week, April 8, p. 37.
-
(1996)
Communications Week
, pp. 37
-
-
Higgins, K.J.1
-
42
-
-
85024057913
-
Pentagon caught in its own net
-
May 27
-
Violino, B. 1996. Pentagon caught in its own net. Information Week, May 27, p. 32.
-
(1996)
Information Week
, pp. 32
-
-
Violino, B.1
-
44
-
-
85023977274
-
Computer invasions growing with Internet
-
April 17
-
Kehoe, L., & Stephens, S. 1996. Computer invasions growing with Internet. The Financial Post, April 17, p. 54.
-
(1996)
The Financial Post
, pp. 54
-
-
Kehoe, L.1
Stephens, S.2
-
45
-
-
85024020830
-
Companies challenge computer hackers to break codes
-
Transcript 313-4, April 13
-
Wice, N. 1996. Companies challenge computer hackers to break codes. CNN News, Transcript 313-4, April 13.
-
(1996)
CNN News
-
-
Wice, N.1
-
46
-
-
85023970412
-
Computer-savvy buddies hack their way into federal prision
-
April 14
-
Weise, E. 1996. Computer-savvy buddies hack their way into federal prision. Los Angeles Times, April 14, p. 1.
-
(1996)
Los Angeles Times
, pp. 1
-
-
Weise, E.1
-
47
-
-
85024062195
-
Suspect arrested in library hacking
-
April 10
-
Bjorhus, J. 1996. Suspect arrested in library hacking. The Seattle Times, April 10, p. A1.
-
(1996)
The Seattle Times
, pp. A1
-
-
Bjorhus, J.1
-
48
-
-
85024053634
-
Hacker attacks just tip of the iceberg
-
April 10
-
Bjorhus, J. 1996. Hacker attacks just tip of the iceberg. The Seattle Times, April 10, p. A9.
-
(1996)
The Seattle Times
, pp. A9
-
-
Bjorhus, J.1
-
49
-
-
85024023394
-
Hacking goes legit
-
February 7
-
Steffora, A., & Cheek, M. 1994. Hacking goes legit. Industry Week, 243, February 7, pp. 43-45.
-
(1994)
Industry Week
, vol.243
, pp. 43-45
-
-
Steffora, A.1
Cheek, M.2
-
50
-
-
0011043171
-
-
November 27
-
FBI braces for hackers. Information Week, November 27, 1995, p. 24.
-
(1995)
Information Week
, pp. 24
-
-
-
51
-
-
85024034699
-
In search of computer security
-
January 2
-
Markoff, J. 1996. In search of computer security. The New York Times, January 2, p. 15.
-
(1996)
The New York Times
, pp. 15
-
-
Markoff, J.1
-
52
-
-
85023984863
-
Fallen hacker
-
June 20
-
McMenamin, B. 1994. Fallen hacker. Forbes 153, June 20, p. 12.
-
(1994)
Forbes
, vol.153
, pp. 12
-
-
McMenamin, B.1
-
53
-
-
84866794562
-
Computer hacker in Britain said to enter U.S. Systems
-
October 24
-
Markhoff, J. 1988. Computer hacker in Britain said to enter U.S. systems. New York Times, October 24, p. D1.
-
(1988)
New York Times
, pp. D1
-
-
Markhoff, J.1
-
54
-
-
85023990709
-
Hacker may have penetrated Pentagon
-
September 16
-
Alexander, M. 1991. Hacker may have penetrated Pentagon. Computerworld 25, September 16, p. 14.
-
(1991)
Computerworld
, vol.25
, pp. 14
-
-
Alexander, M.1
-
55
-
-
0345965222
-
Netherlands, Mexico chase after hackers
-
July 13
-
Daly, J. 1992. Netherlands, Mexico chase after hackers. Computerworld 26, July 13, p. 14.
-
(1992)
Computerworld
, vol.26
, pp. 14
-
-
Daly, J.1
-
56
-
-
84948194066
-
Arrests in computer break-ins show a global peril
-
April 4
-
Markhoff, J. 1990. Arrests in computer break-ins show a global peril. New York Times, April 4, pp. A1, A16.
-
(1990)
New York Times
, pp. A1-A16
-
-
Markhoff, J.1
-
57
-
-
85024087679
-
US agents pursue hacker of secrets across cyberspace
-
April 1
-
Brodie, I., & Gamini, G. 1996. US agents pursue hacker of secrets across cyberspace. The Times, April 1.
-
(1996)
The Times
-
-
Brodie, I.1
Gamini, G.2
-
58
-
-
85023998822
-
Argentine, 22, charged with hacking computer networks
-
March 30
-
Thomas, P., & Corcoran, E. 1996. Argentine, 22, charged with hacking computer networks. The Washington Post, March 30, p. A4.
-
(1996)
The Washington Post
, pp. A4
-
-
Thomas, P.1
Corcoran, E.2
-
59
-
-
85025520560
-
Hacker’s paradise?
-
August 12
-
Alexander, M. 1991. Hacker’s paradise? Computerworld Supplement 25, August 12, pp. S26-S27.
-
(1991)
Computerworld Supplement
, vol.25
, pp. S26-S27
-
-
Alexander, M.1
-
60
-
-
0011411404
-
Online theft—Trade in black-market data is growing problem for both business and the law
-
August 28
-
Wilder, C., & Miolino, B. 1995. Online theft—Trade in black-market data is growing problem for both business and the law. Information Week, August 28, p. 30.
-
(1995)
Information Week
, pp. 30
-
-
Wilder, C.1
Miolino, B.2
-
63
-
-
0003706271
-
-
Minneapolis: University of Minnesota Press
-
Campbell, D. 1992. Writing security. Minneapolis: University of Minnesota Press.
-
(1992)
Writing Security
-
-
Campbell, D.1
-
64
-
-
0002383265
-
Why we will soon miss the Cold War
-
August
-
Mearsheimer, J. J. 1990. Why we will soon miss the Cold War. The Atlantic Monthly, August, pp. 35-50.
-
(1990)
The Atlantic Monthly
, pp. 35-50
-
-
Mearsheimer, J.J.1
-
65
-
-
0001866519
-
Living on border lines: Man, poststructuralism, and war
-
J. Der Derian & M. J. Shapiro, Lexington, MA: Lexington Books
-
Ashley, R. K. 1989. Living on border lines: Man, poststructuralism, and war. In International/intertextual relations: Postmodern readings of world politics, eds. J. Der Derian & M. J. Shapiro, p. 303. Lexington, MA: Lexington Books.
-
(1989)
International/Intertextual Relations: Postmodern Readings of World Politics
, pp. 303
-
-
Ashley, R.K.1
-
66
-
-
85024085906
-
In defense of hackers
-
April 21
-
Bromberg, C. 1991. In defense of hackers. The New York Times, April 21, p. 45.
-
(1991)
The New York Times
, pp. 45
-
-
Bromberg, C.1
-
67
-
-
0011590121
-
Objects of property and subjects of politics: Intellectual property laws and democratic dialogue
-
Coombe, R. J. 1991. Objects of property and subjects of politics: Intellectual property laws and democratic dialogue. Texas Law Review 69:1853-1880.
-
(1991)
Texas Law Review
, vol.69
, pp. 1853-1880
-
-
Coombe, R.J.1
|