-
1
-
-
27644434620
-
Why the FBI should be concerned about the secret service
-
2.04, File 3. 23 September
-
Anonymous (1990) 'Why the FBI Should Be Concerned About the Secret Service'. Computer underground Digest, 2.04, File 3. 23 September.
-
(1990)
Computer Underground Digest
-
-
-
3
-
-
0041450577
-
-
URL (consulted 3 June 2005)
-
Barlow, John Perry (1990b) 'Crime and Puzzlement', URL (consulted 3 June 2005): http://www.eff.org/Publications/John_Perry_Barlow/HTML/ crime_and_puzzlement_1.html
-
(1990)
Crime and Puzzlement
-
-
Barlow, J.P.1
-
4
-
-
0039248599
-
The economy of ideas: A framework for patents and copyrights in the digital age (everything you know about intellectual property is wrong)
-
issue 2.03, March, URL (consulted 3 June 2005)
-
Barlow, John Perry (1994) 'The Economy of Ideas: A Framework for Patents and Copyrights in the Digital Age (Everything You Know About Intellectual Property Is Wrong)' Wired, issue 2.03, March, URL (consulted 3 June 2005): http://www.wired.com/wired/archive/2.03/economy.ideas_pr.html
-
(1994)
Wired
-
-
Barlow, J.P.1
-
5
-
-
0343609948
-
-
URL (consulted 3 June 2005)
-
Barlow, John Perry (1996) 'A Cyberspace Independence Declaration', URL (consulted 3 June 2005): http://archives.theconnection.org/archive/category/ technology/-barlow.shtml
-
(1996)
A Cyberspace Independence Declaration
-
-
Barlow, J.P.1
-
7
-
-
84861267456
-
-
URL (consulted 3 June 2005)
-
BBSLIST (2003) 'BBSes listed on bbslist.textfile.com By Year', URL (consulted 3 June 2005): http://bbslist.textfiles.com/support/statistics.html
-
(2003)
BBSes Listed on Bbslist.textfile.com by Year
-
-
-
8
-
-
0011599920
-
-
Lexington, MA: Lexington
-
Bequai, August (1987) Technocrimes. Lexington, MA: Lexington.
-
(1987)
Technocrimes
-
-
Bequai, A.1
-
9
-
-
84861257698
-
-
URL (consulted 3 June 2005)
-
Bickford, Robert (1990) 'Are You a Hacker?', URL (consulted 3 June 2005): http://www.daft.com/~rab/ayah.html
-
(1990)
Are You A Hacker?
-
-
Bickford, R.1
-
10
-
-
27644466112
-
-
interview, NBC television, 23 November
-
Bloombecker, Jay (1988) interview, Hour Magazine, NBC television, 23 November.
-
(1988)
Hour Magazine
-
-
Bloombecker, J.1
-
11
-
-
27644500866
-
Woman indicted as computer hacker mastermind
-
21 June
-
Camper, John (1989) 'Woman Indicted as Computer Hacker Mastermind', Chicago Tribune, 21 June, p. II-4.
-
(1989)
Chicago Tribune
-
-
Camper, J.1
-
13
-
-
27644577205
-
Civil liberties hacked to pieces: Jolyon Jenkins refuses to panic over computer crime
-
9 February
-
'Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to Panic over Computer Crime' (1990) New Statesman & Society, 9 February, p. 27.
-
(1990)
New Statesman & Society
, pp. 27
-
-
-
14
-
-
27644533117
-
Computer hacker says it's his constitutional right
-
3 August
-
Clark, Kenneth R. (1992) 'Computer Hacker Says it's His Constitutional Right', Chicago Tribune, 3 August, p. 12.
-
(1992)
Chicago Tribune
, pp. 12
-
-
Clark, K.R.1
-
16
-
-
27644560763
-
Computer hacker ring with a bay area link
-
9 May
-
'Computer Hacker Ring with a Bay Area Link' (1990) San Francisco Chronicle, 9 May, p. A-30.
-
(1990)
San Francisco Chronicle
-
-
-
17
-
-
27644534770
-
Computer saboteur gets probation
-
22 October
-
'Computer Saboteur gets Probation' (1988) Chicago Tribune, 22 October, p. 4.
-
(1988)
Chicago Tribune
, pp. 4
-
-
-
18
-
-
84861256526
-
Excerpts from 'mad hacker's key party
-
19 October, URL (consulted 3 June 2005)
-
Computer underground Digest (1991) 'Excerpts from 'Mad Hacker's Key Party', 3(37), 19 October, URL (consulted 3 June 2005): http://venus.soci.niu. edu/~cudigest/CUDS3/cud337.txt
-
(1991)
Computer Underground Digest
, vol.3
, Issue.37
-
-
-
19
-
-
27644445008
-
ComSec press release
-
3.24, File 3. July 3
-
ComSec (1991) 'ComSec Press Release', Computer Underground Digest, 3.24, File 3. July 3.
-
(1991)
Computer Underground Digest
-
-
-
20
-
-
27644451248
-
RICO: Modern weaponry against software pirates
-
Cooley, Ronald B. (1984) 'RICO: Modern Weaponry Against Software Pirates', Computer Law Journal, 5(2-3): 143-62.
-
(1984)
Computer Law Journal
, vol.5
, Issue.2-3
, pp. 143-162
-
-
Cooley, R.B.1
-
21
-
-
27644508581
-
Hacktivism and how it got here
-
URL (consulted 3 June 2005)
-
Delio, Michelle (2004) 'Hacktivism and How It Got Here', Wired, URL (consulted 3 June 2005): http://www.wired.com/news/infostructure/0,1377,64193, 00.html
-
(2004)
Wired
-
-
Delio, M.1
-
22
-
-
0346466624
-
Concerning hackers who break into computers systems
-
paper presented, Washington, DC, 1-4 October
-
Denning, Dorothy E. (1990) 'Concerning Hackers Who Break into Computers Systems', paper presented at the National Computer Security Conference, Washington, DC, 1-4 October.
-
(1990)
National Computer Security Conference
-
-
Denning, D.E.1
-
23
-
-
79957404988
-
The techno-revolution
-
'Doctor Crash'
-
'Doctor Crash' (1986) The Techno-Revolution', Phrack 1(6): Phile 3.
-
(1986)
Phrack
, vol.1
, Issue.6
, pp. 3
-
-
-
24
-
-
84861259287
-
-
19 March, URL (consulted 3 June 2005)
-
EFFector Online (1993) 'Steve Jackson Games Wins Lawsuit Against US Secret Service', 5(4), 19 March, URL (consulted 3 June 2005): http://www.eff.org/EFF/Newsletters/EFFector/effect05.04
-
(1993)
Steve Jackson Games Wins Lawsuit Against US Secret Service
, vol.5
, Issue.4
-
-
-
25
-
-
84970268737
-
In pursuit of the postmodern: An introduction
-
Featherstone, Mike (1988) 'In Pursuit of the Postmodern: An Introduction', Theory, Culture and Society 2-3(June): 195-215.
-
(1988)
Theory, Culture and Society
, vol.2-3
, Issue.JUNE
, pp. 195-215
-
-
Featherstone, M.1
-
26
-
-
84861267099
-
Forgotten victims
-
files 4-5, 4(21), URL (consulted 3 June 2005)
-
'Forgotten Victims' (1992) Computer Underground Digest, files 4-5, 4(21), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS4/cud421. txt
-
(1992)
Computer Underground Digest
-
-
-
27
-
-
0003954001
-
-
New York: New York Press
-
Gibson, William (1984) Neuromancer. New York: New York Press.
-
(1984)
Neuromancer
-
-
Gibson, W.1
-
28
-
-
27644500752
-
Hacker, 18, gets prison for fraud
-
15 February
-
'Hacker, 18, Gets Prison for Fraud' (1989) Chicago Tribune, 15 February, p. III-1.
-
(1989)
Chicago Tribune
-
-
-
30
-
-
27644529910
-
Is computer hacking a crime? A debate from the electronic underground
-
Harper's Forum (1990) 'Is Computer Hacking a Crime? A Debate from the Electronic Underground', Harper's, 280(March): 45-57.
-
(1990)
Harper's
, vol.280
, Issue.MARCH
, pp. 45-57
-
-
-
31
-
-
0003897909
-
-
[1821] New York: Oxford University Press
-
Hegel, Georg Wilhelm Friedrich (1973[1821]) Hegel's Philosophy of Right. New York: Oxford University Press.
-
(1973)
Hegel's Philosophy of Right
-
-
Hegel, G.W.F.1
-
35
-
-
0242595962
-
Cybercrime's scope: Interpreting "access" and "authorization" in computer misuse statutes
-
Kerr, Orin S. (2003) 'Cybercrime's Scope: Interpreting "Access" and "Authorization" in Computer Misuse Statutes', New York University Law Review 78(5): 1596-1668.
-
(2003)
New York University Law Review
, vol.78
, Issue.5
, pp. 1596-1668
-
-
Kerr, O.S.1
-
39
-
-
0007198927
-
The German ideology
-
Karl Marx and Frederick Engels, Moscow: Progress Publishers
-
Marx, Karl (1976) 'The German Ideology', in Karl Marx and Frederick Engels, Collected Works. Vol. 5 1845-1847. Moscow: Progress Publishers.
-
(1976)
Collected Works. Vol. 5 1845-1847
, vol.5
-
-
Marx, K.1
-
42
-
-
27644561637
-
Hackers, phreakers and pirates: The semantics of the computer age
-
P. Kane (ed.). New York: Bantam
-
Meyer, Gordon R. (1989b) 'Hackers, Phreakers and Pirates: The Semantics of the Computer Age', in P. Kane (ed.), V.I.R.US Protection: Vital Information Resources Under Siege, pp. 74-82. New York: Bantam.
-
(1989)
V.I.R.US Protection: Vital Information Resources under Siege
, pp. 74-82
-
-
Meyer, G.R.1
-
43
-
-
84861268597
-
Fear and loathing in the secret service: A synopsis of GURPS Cyperpunk
-
URL (consulted 3 June 2005)
-
Meyer, Gordon R. (1990) 'Fear and Loathing in the Secret Service: A Synopsis of GURPS Cyperpunk', Computer underground Digest 1(25), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS1/cud126.txt.
-
(1990)
Computer Underground Digest
, vol.1
, Issue.25
-
-
Meyer, G.R.1
-
44
-
-
4043097445
-
The baudy world of the byte bandit: A postmodernist interpretation of the computer underground
-
F. Schmalleger (ed.). Bristol, IN: Wyndham Hall
-
Meyer, Gordon and Jim Thomas (1990) 'The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground', in F. Schmalleger (ed.) Computers in Criminal Justice, pp. 31-67. Bristol, IN: Wyndham Hall.
-
(1990)
Computers in Criminal Justice
, pp. 31-67
-
-
Meyer, G.1
Thomas, J.2
-
45
-
-
84934563444
-
Overcoming the absurd: Prisoner litigation as primitive rebellion
-
Milovanovic, Dragan and Jim Thomas (1989) 'Overcoming the Absurd: Prisoner Litigation as Primitive Rebellion', Social Problems 36(1): 48-60.
-
(1989)
Social Problems
, vol.36
, Issue.1
, pp. 48-60
-
-
Milovanovic, D.1
Thomas, J.2
-
46
-
-
1842435111
-
Hackers and the contested ontology of cyberspace
-
Nissenbaum, Helen (2004) 'Hackers and the Contested Ontology of Cyberspace', New Media and Society 6(2): 195-217.
-
(2004)
New Media and Society
, vol.6
, Issue.2
, pp. 195-217
-
-
Nissenbaum, H.1
-
47
-
-
0013359311
-
-
URL (consulted 3 June 2005)
-
NUA Internet Surveys (2002a) 'How Many Online', URL (consulted 3 June 2005): http://www.nua.ie/surveys/how_many_online/world.html
-
(2002)
How Many Online
-
-
-
48
-
-
84861261651
-
-
URL (consulted 3 June 2005)
-
NUA Internet Surveys (2002b) 'How Many Online (US and Canada)', URL (consulted 3 June 2005): http://www.nua.ie/surveys/how_many_online/n_america. html
-
(2002)
How Many Online (US and Canada)
-
-
-
49
-
-
27644555875
-
Computer hackers seeking to rectify public image
-
4 December
-
O'Connor, Rory J. (1989) 'Computer Hackers Seeking to Rectify Public Image', Chicago Tribune, 4 December, p. 10.
-
(1989)
Chicago Tribune
, pp. 10
-
-
O'Connor, R.J.1
-
50
-
-
84886230072
-
-
(nd) URL (consulted 3 June 2005)
-
Oikarinen, Jarkko (nd) 'IRC History', URL (consulted 3 June 2005): http://www.irc.org/history_docs/jarkko.html
-
IRC History
-
-
Oikarinen, J.1
-
52
-
-
84861256270
-
-
URL (consulted 3 June 2005)
-
PIRATE (1989) 'So You Want to be a Pirate?' 1(June), URL (consulted 3 June 2005): http://www.etext.org/CuD/Pirate/pirate-1
-
(1989)
So You Want to Be A Pirate?
, vol.1
, Issue.JUNE
-
-
-
53
-
-
0010875498
-
-
New York: Black Sheep Books
-
Platt, Charles (1996) Anarchy Online. New York: Black Sheep Books.
-
(1996)
Anarchy Online
-
-
Platt, C.1
-
54
-
-
0025385983
-
Deterring computer crime
-
Rosenblatt, Kenneth (1990) 'Deterring Computer Crime', Technology Review 93(2): 34-40.
-
(1990)
Technology Review
, vol.93
, Issue.2
, pp. 34-40
-
-
Rosenblatt, K.1
-
55
-
-
84861256489
-
From here to there
-
'Ruffin, Oxblood' text#384, 3 June. URL(consulted 24 December 2004)
-
'Ruffin, Oxblood' (2004) 'From Here to There', Cult of the Dead Cow, text#384, 3 June. URL(consulted 24 December 2004): http://www.cultcow.com/ cDc_files/cDc-0384.html
-
(2004)
Cult of the Dead Cow
-
-
-
56
-
-
27644595002
-
The night of the hackers
-
12 November
-
Sandza, Richard (1984) The Night of the Hackers', Newsweek, 12 November, pp. 17-18.
-
(1984)
Newsweek
, pp. 17-18
-
-
Sandza, R.1
-
58
-
-
84861270861
-
Special on "computer hacking"
-
27 September
-
Schwartz, Eddie (1988) 'Special on "Computer Hacking'", WGN Radio, 27 September.
-
(1988)
WGN Radio
-
-
Schwartz, E.1
-
59
-
-
27644465090
-
The hacker dragnet: The feds put a tail on computer crooks - and sideswipe a few innocent bystanders
-
30 April
-
Schwartz, John (1990) 'The Hacker Dragnet: The Feds Put a Tail on Computer Crooks - and Sideswipe a Few Innocent Bystanders', Newsweek, 30 April, p. 50.
-
(1990)
Newsweek
, pp. 50
-
-
Schwartz, J.1
-
61
-
-
27644579370
-
-
URL (consulted 3 June 2005)
-
Stallman, Richard (2001) 'Science Must Push Copyright Aside', URL (consulted 3 June 2005): http://www.nature.com/nature/debates/e-access/Articles/ stallman.html
-
(2001)
Science Must Push Copyright Aside
-
-
Stallman, R.1
-
63
-
-
84861263322
-
B. Sterling and W. Gibson comments on cyberspace and education
-
5.54, 20 July, URL (consulted 3 June 2005)
-
Sterling, Bruce (1993) 'B. Sterling and W. Gibson Comments on Cyberspace and Education', Computer underground Digest. 5.54, 20 July, URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS5/cud554.txt
-
(1993)
Computer Underground Digest
-
-
Sterling, B.1
-
66
-
-
27644460817
-
Hollywood hacker: More media and le abuse?
-
#3.09. File 2, March 20
-
Thomas, Jim (1990a) 'Hollywood Hacker: More Media and LE Abuse?' Computer Underground Digest #3.09. File 2, March 20.
-
(1990)
Computer Underground Digest
-
-
Thomas, J.1
-
67
-
-
84861264455
-
The secret service, E911 and legal rhetoric: Malice in wonderland, part one
-
URL (consulted 3 June 2005)
-
Thomas, Jim (1990b) The Secret Service, E911 and Legal Rhetoric: Malice in Wonderland, Part One', Computer underground Digest 1(19), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS1/cud119.txt
-
(1990)
Computer Underground Digest
, vol.1
, Issue.19
-
-
Thomas, J.1
-
69
-
-
27644526338
-
Joe McCarthy in a leisure suit: (Witch)hunting for the computer underground
-
Thomas, Jim and Gordon Meyer (1990) 'Joe McCarthy in a Leisure Suit: (Witch)Hunting for the Computer Underground', The Critical Criminologist 2(September): 7-8, and 19-20.
-
(1990)
The Critical Criminologist
, vol.2
, Issue.SEPTEMBER
, pp. 7-8
-
-
Thomas, J.1
Meyer, G.2
-
71
-
-
84861258191
-
"Good" hackers being recruited for front line of computer security
-
22 June
-
Trigaux, Robert (1998) '"Good" Hackers being Recruited for Front Line of Computer Security', Chicago Tribune, 22 June, p. 7.
-
(1998)
Chicago Tribune
, pp. 7
-
-
Trigaux, R.1
-
72
-
-
84861262332
-
Information release
-
(Chicago), 6 February, reprinted URL (consulted 3 June 2005)
-
US Department of Justice (1990) 'Information Release' (Chicago), 6 February, reprinted in Computer underground Digest 1(1), URL (consulted 3 June 2005): http://venus.soci.niu.edu/~cudigest/CUDS1/cud100.txt
-
(1990)
Computer Underground Digest
, vol.1
, Issue.1
-
-
-
73
-
-
27644459333
-
Oddballs no more, hackers are now a threat
-
5 March
-
Van, John (1989) 'Oddballs no More, Hackers Are Now a Threat', Chicago Tribune, 5 March, p. IV-4.
-
(1989)
Chicago Tribune
-
-
Van, J.1
-
74
-
-
27644537378
-
-
Channel 5, Chicago, 6 February
-
WMAQ Evening News (1990) Channel 5, Chicago, 6 February.
-
(1990)
WMAQ Evening News
-
-
-
75
-
-
27644523952
-
Worm case outlined
-
10 January
-
'Worm Case Outlined' (1990) Chicago Tribune, 10 January, p. 5.
-
(1990)
Chicago Tribune
, pp. 5
-
-
-
76
-
-
27644576354
-
Fraud sweep nabs 2 Michigan teens in computer ring
-
25 May
-
Zablit, Jocelyne (1989) 'Fraud Sweep Nabs 2 Michigan Teens in Computer Ring', Detroit Free Press, 25 May, p. 1.
-
(1989)
Detroit Free Press
, pp. 1
-
-
Zablit, J.1
|