-
1
-
-
85189250532
-
-
(cited January 27, 2004). Originally published in IBM Think Research Magazine, 1997
-
Fischetti, M. 1997. "Helpful Hacking. " http://domino.research.ibm.com/comm/wwwr_thinkresearch.nsf7pages/hacking397.html (cited January 27, 2004). Originally published in IBM Think Research Magazine, vol. 35, 1997.
-
(1997)
Helpful Hacking
, vol.35
-
-
Fischetti, M.1
-
2
-
-
33846331870
-
-
(cited January 27, 2004)
-
IBM Research. "Global Security Analysis Lab. " http://domino.research.ibm.com/Comm/bios.nsf/pages/gsal.html (cited January 27, 2004).
-
Global Security Analysis Lab
-
-
-
4
-
-
85189249701
-
Americans Concerned about Cyberattacks
-
September 5, (cited September 5, 2003)
-
"Americans Concerned about Cyberattacks. " The East Carolinian, September 5, 2003. http://www.crime-research.org/eng/news/2003/09/Mess0502.html (cited September 5, 2003).
-
(2003)
The East Carolinian
-
-
-
5
-
-
85189250688
-
Guantanamo Translator Charged with Spying
-
September 24
-
Appleby, T. 2003. "Guantanamo Translator Charged with Spying. " The Globe and Mail, September 24, p. A21.
-
(2003)
The Globe and Mail
, pp. A21
-
-
Appleby, T.1
-
7
-
-
85189250951
-
Hacker Case Called Unique
-
October 10
-
Associated Press. 2003b. "Hacker Case Called Unique. " The Globe and Mail, October 10, p. B8.
-
(2003)
The Globe and Mail
, pp. B8
-
-
-
8
-
-
85189249210
-
FBI Arrests Suspect in Net-Virus Case
-
August 30
-
Bakst, B. 2003. "FBI Arrests Suspect in Net-Virus Case. " The Globe and Mail, August 30, p. A14.
-
(2003)
The Globe and Mail
, pp. A14
-
-
Bakst, B.1
-
9
-
-
84885994609
-
-
(cited January 13, 2003)
-
BBC News. 2003 "Operation Ore: Can the UK Cope?" http://news.bbc.co.uk/1/hi/uk/2652465.stm (cited January 13, 2003).
-
(2003)
Operation Ore: Can the UK Cope?
-
-
-
10
-
-
85189249494
-
Viruses Eat Away at Firms' Productivity
-
August 21
-
Bloom, R. 2003. "Viruses Eat Away at Firms' Productivity. " The Globe and Mail, August 21, p. B6.
-
(2003)
The Globe and Mail
, pp. B6
-
-
Bloom, R.1
-
11
-
-
12344293756
-
Is There Such a Thing as 'Virtual Crime'?
-
(cited September 14, 2003)
-
Brenner, S. 2001. "Is There Such a Thing as 'Virtual Crime'?" California Criminal Law Review. http://www.boalt.org/CCLR/v4/v4brenner.htm (cited September 14, 2003).
-
(2001)
California Criminal Law Review
-
-
Brenner, S.1
-
12
-
-
85189250052
-
California: Legislative Priorities Set for Prevention of Identity Theft
-
3, April 21
-
"California: Legislative Priorities Set for Prevention of Identity Theft. " 2003. Cybercrime Law Report, 3, April 21, p. 3.
-
(2003)
Cybercrime Law Report
, pp. 3
-
-
-
13
-
-
85189249127
-
Chronology of a Nightmare
-
September 12
-
Campbell, M. 2001. "Chronology of a Nightmare. " The Globe and Mail, September 12, p. N6.
-
(2001)
The Globe and Mail
, pp. N6
-
-
Campbell, M.1
-
14
-
-
85189250198
-
Code Red Havoc Reported to Have Cost $2.6 Billion
-
September 6
-
"Code Red Havoc Reported to Have Cost $2.6 Billion. " 2001. The Globe and Mail, September 6, p. B26.
-
(2001)
The Globe and Mail
, pp. B26
-
-
-
15
-
-
3042515152
-
-
(cited December 9, 2001)
-
CyberAngels. 2001. "Cyberstalking. " http://www.cyberangels.org (cited December 9, 2001).
-
(2001)
Cyberstalking
-
-
-
16
-
-
85189250304
-
Ethical Hackers' Test for Weakness
-
August 5
-
Damsell, K. 2003a. "Ethical Hackers' Test for Weakness. " The Globe and Mail, August 5, pp. B1-B2.
-
(2003)
The Globe and Mail
, pp. B1-B2
-
-
Damsell, K.1
-
17
-
-
85189250060
-
Newer, Tougher Bugs Are Swarming Web, Study Finds
-
October 1
-
Damsell, K. 2003b. "Newer, Tougher Bugs Are Swarming Web, Study Finds. " The Globe and Mail, October 1, p. B5.
-
(2003)
The Globe and Mail
, pp. B5
-
-
Damsell, K.1
-
20
-
-
85189251136
-
Dramatic Increase in Complaints Reported
-
3, April 21
-
"Dramatic Increase in Complaints Reported, " 2003. Cybercrime Law Report, 3, April 21, p. 11.
-
(2003)
Cybercrime Law Report
, pp. 11
-
-
-
22
-
-
0142016692
-
-
(cited November 30, 2002)
-
Homeland Security Act, H.R. 5005. 2002. http://www.whitehouse.gov/deptofhomeland/analysis (cited November 30, 2002).
-
(2002)
Homeland Security Act, H.R. 5005
-
-
-
24
-
-
85189249278
-
Identity Theft: FTC Hampered by Lack of Funds, Power
-
3, April
-
"Identity Theft: FTC Hampered by Lack of Funds, Power. " 2003. Cybercrime Law Report, 3, April 21.
-
(2003)
Cybercrime Law Report
, pp. 21
-
-
-
25
-
-
33845675893
-
Angels On-Line
-
Karp, H. 2000. "Angels On-Line. " Reader's Digest, 157, pp. 50-56.
-
(2000)
Reader's Digest
, vol.157
, pp. 50-56
-
-
Karp, H.1
-
26
-
-
85189251255
-
-
(cited May 7, 2002)
-
Karp, J. 2002. "Get Help Fighting Fraud Online. " http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3370664,00.html (cited May 7, 2002).
-
(2002)
Get Help Fighting Fraud Online
-
-
Karp, J.1
-
27
-
-
84966901392
-
9/11/03: He Taunts Us Still
-
September 11
-
Koring, P. 2003. "9/11/03: He Taunts Us Still. " The Globe and Mail, September 11, p. A1.
-
(2003)
The Globe and Mail
, pp. A1
-
-
Koring, P.1
-
31
-
-
0035474501
-
Code Red for the Web
-
(October)
-
Meinel, C. 2001. "Code Red for the Web. " Scientific American, 285 (October), pp. 42-51.
-
(2001)
Scientific American
, vol.285
, pp. 42-51
-
-
Meinel, C.1
-
34
-
-
0030660808
-
Where Have All the Hackers Gone? Part 1: Introduction and Methodology
-
Mulhall, T. 1997a. "Where Have All the Hackers Gone? Part 1: Introduction and Methodology. " Computers and Security, 16, pp. 277-284.
-
(1997)
Computers and Security
, vol.16
, pp. 277-284
-
-
Mulhall, T.1
-
35
-
-
0030678927
-
Where Have All the Hackers Gone? Part 3: Motivation and Deterrence
-
MIT News. 1997b. "Where Have All the Hackers Gone? Part 3: Motivation and Deterrence. " Computers and Security, 16, p. 292.
-
(1997)
Computers and Security
, vol.16
, pp. 292
-
-
-
36
-
-
3042515152
-
-
(cited December 9, 2001)
-
National Center for Victims of Crime. 2001. "Cyberstalking. " http://www.ncvc.org/ (cited December 9, 2001).
-
(2001)
Cyberstalking
-
-
-
41
-
-
30344482000
-
Secrets of the Little Box
-
(October)
-
Rosenbaum, R. 1971. "Secrets of the Little Box. " Esquire (October): pp. 116-125.
-
(1971)
Esquire
, pp. 116-125
-
-
Rosenbaum, R.1
-
42
-
-
21244489423
-
-
Westport, CT: Quorum
-
Schell, B. H., J. L. Dodge, and S. Moutsatsos. 2002. The Hacking of America: Who's Doing It, Why, and How. Westport, CT: Quorum.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.3
-
43
-
-
0002754091
-
-
Westport, CT: Quorum
-
Schell, B. H., and N. M. Lanteigne. 2000. Stalking, Harassment, and Murder in the Workplace: Guidelines for Protection and Prevention. Westport, CT: Quorum.
-
(2000)
Stalking, Harassment, and Murder in the Workplace: Guidelines for Protection and Prevention
-
-
Schell, B.H.1
Lanteigne, N.M.2
-
46
-
-
85189251163
-
Mastermind Depicts Al-Qaeda Executing Plots with Fluidity
-
September 23
-
Solomon, J. 2003. "Mastermind Depicts Al-Qaeda Executing Plots with Fluidity. " The Globe and Mail, September 23, p. A19.
-
(2003)
The Globe and Mail
, pp. A19
-
-
Solomon, J.1
-
47
-
-
0006938522
-
The Doomsday Click
-
May 28
-
Specter, M. 2001. "The Doomsday Click. " The New Yorker, May 28, pp. 101-107.
-
(2001)
The New Yorker
, pp. 101-107
-
-
Specter, M.1
-
48
-
-
85189249735
-
Al-Qaeda Declares Holy War
-
October 10
-
Stackhouse, J. 2001. "Al-Qaeda Declares Holy War. " The Globe and Mail, October 10, p. A1.
-
(2001)
The Globe and Mail
, pp. A1
-
-
Stackhouse, J.1
-
49
-
-
85189250117
-
-
(cited August 28, 2003)
-
Symantec Security Response. 2003. "Top Virus Threats. " http://www.symantec.com/avcenter/index.html (cited August 28, 2003).
-
(2003)
Top Virus Threats
-
-
-
50
-
-
85189251023
-
Texas: Bill Would Authorize Attorney General to Prosecute ID Thieves
-
3, April 21
-
"Texas: Bill Would Authorize Attorney General to Prosecute ID Thieves. " 2003. Cybercrime Law Report, 3, April 21, p. 4.
-
(2003)
Cybercrime Law Report
, pp. 4
-
-
-
51
-
-
85189251981
-
-
United Press International. 2003. "Easy Visas Made Saudis Best Bet for 9/11. " http://www.newsmax.com/archives/articles/2003/9/10/143556.shtml.
-
(2003)
Easy Visas Made Saudis Best Bet for 9/11
-
-
-
54
-
-
85189250975
-
Chapter 2: Hackers!
-
Translated by Nirgendwo, a.k.a. Daniel Arnrup. (cited August 23, 2000)
-
Walleij, Linus. 1999a. "Chapter 2: Hackers!" in Copyright Does Not Exist. Translated by Nirgendwo, a.k.a. Daniel Arnrup. http://home.c2i.net/nirgendwo/cdne/ch2web.htm (cited August 23, 2000).
-
(1999)
Copyright Does Not Exist
-
-
Walleij, L.1
-
55
-
-
85189251160
-
Chapter 14: Female Hackers?
-
Translated by Nirgendwo, a.k.a. Daniel Arnrup. (cited August 23, 2000)
-
Walleij, Linus. 1999b. "Chapter 14: Female Hackers?" in Copyright Does Not Exist. Translated by Nirgendwo, a.k.a. Daniel Arnrup. http://home.c2i.net/nirgendwo/cdne/ch14web.htm (cited August 23, 2000).
-
(1999)
Copyright Does Not Exist
-
-
Walleij, L.1
-
56
-
-
85189250391
-
War on Iraq: The First Strike
-
(cited April 29, 2003)
-
"War on Iraq: The First Strike. " 2003. Time. http://www.time.com/time/photoessays/war_firststrike (cited April 29, 2003).
-
(2003)
Time
-
-
-
57
-
-
85189250839
-
-
(cited January 28, 2004)
-
Welch, M. 2003. "Get Ready for Patriot II. " http://alternet.org/print.html?StoryID=15541 (cited January 28, 2004).
-
(2003)
Get Ready for Patriot II
-
-
Welch, M.1
-
61
-
-
85189251889
-
-
Congressional Research Service Report for Congress: The Library of Congress. (cited April 26, 2002)
-
Archik, K. 2002. "Cybercrime: The Council of Europe Convention. " Congressional Research Service Report for Congress: The Library of Congress. http://www.fas.org/irp/crs/RS21208.pdf (cited April 26, 2002).
-
(2002)
Cybercrime: The Council of Europe Convention
-
-
Archik, K.1
-
62
-
-
84979827103
-
-
Associated Press. 2003. "Handbag Maker Vuitton Sues Google. " http://www.cnn.com/2003/TECH/biztech/10/24/france.google.ap/
-
(2003)
Handbag Maker Vuitton Sues Google
-
-
-
63
-
-
85189250187
-
Student's 'Tedious' Thesis Is Terrorist's Treasure Map
-
July 9
-
Blumenfeld, L. 2003. "Student's 'Tedious' Thesis Is Terrorist's Treasure Map. " Toronto Star, July 9, p. A3.
-
(2003)
Toronto Star
, pp. A3
-
-
Blumenfeld, L.1
-
64
-
-
85189251437
-
-
(January 18, 2001)
-
Bonisteel, S. 2001. "Mafiaboy Takes Rap on 55 Counts. " http://articles.findarticles.com/p/articles/mi_m0NEW/is_2001_Jan_18/ai_69296380 (January 18, 2001).
-
(2001)
Mafiaboy Takes Rap on 55 Counts
-
-
Bonisteel, S.1
-
65
-
-
85189250545
-
-
(cited December 17, 2002)
-
Borland, J. 2002. "Elcomsoft Verdict: Not Guilty. " http://news.com.com/2100-1023-978176.html (cited December 17, 2002).
-
(2002)
Elcomsoft Verdict: Not Guilty
-
-
Borland, J.1
-
66
-
-
85189249818
-
But They Told Us XP Was All New
-
(September 16, 2003)
-
"But They Told Us XP Was All New. " 2003. The Scobleizer Weblog, http://paulbeard.no-ip.org/movabletype/archives/001131.html (September 16, 2003).
-
(2003)
The Scobleizer Weblog
-
-
-
67
-
-
24944574614
-
-
(updated January 22, 2004)
-
Computer Emergency Response Team Coordination Center (CERT/CC). 2004. "CERT/CC Statistics 1988-2003. " http://www.cert.org/stats/cert_stats.html (updated January 22, 2004).
-
(2004)
CERT/CC Statistics 1988-2003
-
-
-
68
-
-
85189251561
-
-
(Version 2.1.1 cited May 31, 2004)
-
Computer Emergency Response Team Coordination Center (CERT/CC). 2004. "CERT Coordination Center Incident Reporting System. " https://irf.cc.cert.org/ (Version 2.1.1 cited May 31, 2004).
-
(2004)
CERT Coordination Center Incident Reporting System
-
-
-
69
-
-
85189249060
-
-
CBS News.: (December 28, 2001)
-
"Bin Laden Targets U.S. Economy. " CBS News. 2001: http://www.cbsnews.com/stories/2001/12/26/attack/main322433.shtml (December 28, 2001).
-
(2001)
Bin Laden Targets U.S. Economy
-
-
-
72
-
-
85189249208
-
Hackers under Attack over Copyrights
-
August 2
-
Dixon, G. 2001. "Hackers under Attack over Copyrights. " The Globe and Mail, August 2, p. B22.
-
(2001)
The Globe and Mail
, pp. B22
-
-
Dixon, G.1
-
73
-
-
85189252004
-
-
cited May 26, 2002
-
"Dmitry-Status. " 2002. http://www.freesklyarov.org/ (cited May 26, 2002).
-
(2002)
Dmitry-Status
-
-
-
74
-
-
84930423666
-
-
IDC News Service, (cited January 24, 2001)
-
Evans, J. 2001. "Mafiaboy's Story Points to Net Weaknesses. " IDC News Service, http://www.pcworld.com/news/article/0, aid,39142,00.asp (cited January 24, 2001).
-
(2001)
Mafiaboy's Story Points to Net Weaknesses
-
-
Evans, J.1
-
75
-
-
85189249706
-
HMV Asks RCMP to Probe Web Attack
-
February 12
-
Evans, M. 2000. "HMV Asks RCMP to Probe Web Attack. " The Globe and Mail, February 12, p. B9.
-
(2000)
The Globe and Mail
, pp. B9
-
-
Evans, M.1
-
76
-
-
84901537202
-
Dragnet Targets Internet Vandals
-
February 10
-
Evans, M., and B. McKenna. 2000. "Dragnet Targets Internet Vandals. " The Globe and Mail, February 10, pp. A1, A10.
-
(2000)
The Globe and Mail
-
-
Evans, M.1
McKenna, B.2
-
81
-
-
85189250901
-
Google Loses French Lawsuit
-
October 20
-
"Google Loses French Lawsuit. " 2003. The Globe and Mail, October 20, p. B7.
-
(2003)
The Globe and Mail
, pp. B7
-
-
-
83
-
-
85189249259
-
-
cited October 10, 2003
-
"Hacker Suspect Says His PC Was Hijacked. " 2003. http://www.asianlaws.org/infosec/archives/10_03_hacker.htm (cited October 10, 2003).
-
(2003)
Hacker Suspect Says His PC Was Hijacked
-
-
-
84
-
-
24144435430
-
-
(cited November 17, 2003)
-
Honeynet Project. 2003. "Know Your Enemy: Sebek 2. " http://www.honeynet.org/papers/sebek.pdf. (cited November 17, 2003).
-
(2003)
Know Your Enemy: Sebek 2
-
-
-
85
-
-
85189250692
-
Hospital Hacked: Computer Data Stolen from Rural Nevada Facility
-
"Hospital Hacked: Computer Data Stolen from Rural Nevada Facility. " 2003. Cybercrime Law Report, 3, pp. 6-7.
-
(2003)
Cybercrime Law Report
, vol.3
, pp. 6-7
-
-
-
86
-
-
85189250260
-
-
(cited October 21, 1999)
-
Ingles-le Nobel, J. 1999. "Cyberterrorism Hype. " http://seclists.org/lists/isn/1999/Dec/0029.html (cited October 21, 1999).
-
(1999)
Cyberterrorism Hype
-
-
Ingles-Le Nobel, J.1
-
87
-
-
85189249104
-
Insufficient Evidence: No Proof of Unauthorized Access
-
"Insufficient Evidence: No Proof of Unauthorized Access. " 2003. Cybercrime Law Report, 3, pp. 8-9.
-
(2003)
Cybercrime Law Report
, vol.3
, pp. 8-9
-
-
-
88
-
-
85189250323
-
-
(cited November 13, 2003)
-
Internet Engineering Task Force. 2003. "Active IETF Working Groups. " http://www.ietf.org/html.charters/wg-dir.html (cited November 13, 2003).
-
(2003)
Active IETF Working Groups
-
-
-
89
-
-
85189249713
-
-
(cited June 19, 2003)
-
Jupitermedia Corporation. 2003. "Senate Panel Overwhelmingly Passes Anti-Spam Bill. " http://dc.internet.com/news/print.php/2224681 (cited June 19, 2003).
-
(2003)
Senate Panel Overwhelmingly Passes Anti-Spam Bill
-
-
-
90
-
-
85189251672
-
Linux Is Favourite Hacker Target: Study
-
(cited September 11, 2003)
-
Kapica, J. 2003. "Linux Is Favourite Hacker Target: Study. " The Globe and Mail. http://www.theglobeandmail.com (cited September 11, 2003).
-
(2003)
The Globe and Mail
-
-
Kapica, J.1
-
92
-
-
85189251255
-
-
(cited May 7, 2002)
-
Karp, J. 2002a. "Get Help Fighting Fraud Online. " http://www.aafcil.com/articles/fightonlinefraud.asp (cited May 7, 2002).
-
(2002)
Get Help Fighting Fraud Online
-
-
Karp, J.1
-
93
-
-
85189251854
-
-
(cited May 31, 2004)
-
Karp, J. 2002b. "Techtv: Viruses Explained. " http://www.crime-research.org/eng/news/2002/10/Mess1102.htm (cited May 31, 2004).
-
(2002)
Techtv: Viruses Explained
-
-
Karp, J.1
-
95
-
-
85189251089
-
Think Like an Attacker
-
(July)
-
Lindstrom, P. 2003. "Think Like an Attacker. " Information Security, 6 (July), p. 38.
-
(2003)
Information Security
, vol.6
, pp. 38
-
-
Lindstrom, P.1
-
96
-
-
85189251741
-
Man Who Exposed County's Wireless Insecurity Found Innocent
-
(February 21, 2003)
-
"Man Who Exposed County's Wireless Insecurity Found Innocent. " 2003. 2600: The Hacker Quarterly, http://www.2600.com/news/view/article/1546 (February 21, 2003).
-
(2003)
2600: The Hacker Quarterly
-
-
-
97
-
-
85189250840
-
Lawsuits Hit Net Music Downloaders
-
September 9
-
McKenna, B., and P. Waldie. 2003. "Lawsuits Hit Net Music Downloaders. " The Globe and Mail, September 9, pp. B1, B10.
-
(2003)
The Globe and Mail
-
-
McKenna, B.1
Waldie, P.2
-
98
-
-
85189250996
-
-
(p 39. cited May 31, 2004)
-
Mi2G 2004. "Digital Attacks Report. " http://www.mi2g.net/cgi/mi2g/frameset.php?pageid=http%3A//www.mi2g.net/cgi/mi2g/home_page.php (p 39. cited May 31, 2004)
-
(2004)
Digital Attacks Report
-
-
-
99
-
-
79960068291
-
-
(August 1, 2003)
-
Microsoft. 2003. "Internet Piracy. " http://www.microsoft.com/piracy/ (August 1, 2003).
-
(2003)
Internet Piracy
-
-
-
101
-
-
0030678927
-
Where Have All the Hackers Gone? Part 3: Motivation and Deterrence
-
Mulhall, T. 1997. "Where Have All the Hackers Gone? Part 3: Motivation and Deterrence. " Computers and Security, 16, pp. 291-297.
-
(1997)
Computers and Security
, vol.16
, pp. 291-297
-
-
Mulhall, T.1
-
102
-
-
0344559509
-
-
(cited September 19, 2003)
-
The National Strategy to Secure Cyberspace. 2003. http://www.whitehouse.gov/pcipb/cyberspace:strategy.pdf (cited September 19, 2003).
-
(2003)
The National Strategy to Secure Cyberspace
-
-
-
103
-
-
85189250641
-
-
(November 3, 2003)
-
Netcraft. 2003. "Webserver Survey. " http://news.netcraft.com/archives/2003/11/03/november_2003_web_server_survey.html (November 3, 2003).
-
(2003)
Webserver Survey
-
-
-
106
-
-
85189251909
-
-
cited October 19, 2003
-
"PC Whiz Cleared in Houston Hacking. " 2003. http://hightechmagazine.com/managearticle.asp?C=290&A=171 (cited October 19, 2003).
-
(2003)
PC Whiz Cleared in Houston Hacking
-
-
-
111
-
-
85189252002
-
Avoiding Sticky Legal Traps
-
(July 3, 2003)
-
Salgado, R. 2003. "Avoiding Sticky Legal Traps. " Information Security Magazine, www.infosecuritymag.com (July 3, 2003).
-
(2003)
Information Security Magazine
-
-
Salgado, R.1
-
112
-
-
21244489423
-
-
Westport, CT: Quorum
-
Schell, B. H., J. L. Dodge, and S. Moutsatsos. 2002. The Hacking of America: Who's Doing It, Why, and How. Westport, CT: Quorum.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.3
-
113
-
-
85189250387
-
-
(January 2001)
-
Shaw, E. D. 2001. "The Insider Problem. " http://www.infosecuritymag.com/articles/january01/features4.shtml (January 2001).
-
(2001)
The Insider Problem
-
-
Shaw, E.D.1
-
114
-
-
85189249601
-
Hitting the Sweet Spot
-
(July 2003)
-
Spitzner, L. 2003. "Hitting the Sweet Spot. " Information Security Magazine. http://infosecuritymag.techtarget.com/2003/jul/honeypots.shtml (July 2003).
-
(2003)
Information Security Magazine
-
-
Spitzner, L.1
-
115
-
-
85189249282
-
Spreader of Multinational Virus Faces Fines, Prison
-
(April 21)
-
"Spreader of Multinational Virus Faces Fines, Prison. " 2003. Cybercrime Law Report, 3, (April 21), p. 10.
-
(2003)
Cybercrime Law Report
, vol.3
, pp. 10
-
-
-
117
-
-
33750493944
-
Behind the Hack Attack
-
February 21
-
Taylor, C. 2000. "Behind the Hack Attack. " Time, February 21, pp. 19-21.
-
(2000)
Time
, pp. 19-21
-
-
Taylor, C.1
-
120
-
-
84901541561
-
Hackers Tough to Prosecute, FBI Says
-
February 10
-
Walton, D. 2000. "Hackers Tough to Prosecute, FBI Says. " The Globe and Mail, February 10, p. B5.
-
(2000)
The Globe and Mail
, pp. B5
-
-
Walton, D.1
-
121
-
-
85189251601
-
Canadian COOs Wary of Terrorism: Survey
-
October 21
-
Won, S. 2003. "Canadian COOs Wary of Terrorism: Survey. " The Globe and Mail, October 21, p. B10.
-
(2003)
The Globe and Mail
, pp. B10
-
-
Won, S.1
-
123
-
-
85189251985
-
MyDoom Virus Targets Utah Firm
-
January 28
-
Akin, D. 2004a. "MyDoom Virus Targets Utah Firm. " The Globe and Mail, January 28, p. B6.
-
(2004)
The Globe and Mail
, pp. B6
-
-
Akin, D.1
-
124
-
-
85189249789
-
MyDoom Virus Variant Has Dangerous Quirks
-
January 29
-
Akin, D. 2004b. "MyDoom Virus Variant Has Dangerous Quirks. " The Globe and Mail, January 29.
-
(2004)
The Globe and Mail
-
-
Akin, D.1
-
125
-
-
85189249701
-
Americans Concerned about Cyberattacks
-
(cited September 5, 2003)
-
"Americans Concerned about Cyberattacks. " 2003. The East Carolinian. http://www.crime-research.org/eng/news/2003/09/Mess0502.html (cited September 5, 2003).
-
(2003)
The East Carolinian
-
-
-
127
-
-
85189250930
-
MyDoom E-Mail Virus Spreads Fast
-
January 27
-
Bloom, R. 2004. "MyDoom E-Mail Virus Spreads Fast. " The Globe and Mail, January 27, pp. A1, A4.
-
(2004)
The Globe and Mail
-
-
Bloom, R.1
-
128
-
-
85189250187
-
Student's 'Tedious' Thesis Is Terrorist's Treasure Map
-
July 9
-
Blumenfeld, L. 2003. "Student's 'Tedious' Thesis Is Terrorist's Treasure Map. " Toronto Star, July 9, p. A3.
-
(2003)
Toronto Star
, pp. A3
-
-
Blumenfeld, L.1
-
129
-
-
85189250198
-
Code Red Havoc Reported to Have Cost $2.6 Billion
-
September 6
-
"Code Red Havoc Reported to Have Cost $2.6 Billion. " 2001. The Globe and Mail, September 6, p. B26.
-
(2001)
The Globe and Mail
, pp. B26
-
-
-
130
-
-
85189250692
-
Hospital Hacked: Computer Data Stolen from Rural Nevada Facility
-
(April 21)
-
Cybercrime Law Report. 2003a. "Hospital Hacked: Computer Data Stolen from Rural Nevada Facility. " Cybercrime Law Report, 3 (April 21), pp. 6-7.
-
(2003)
Cybercrime Law Report
, vol.3
, pp. 6-7
-
-
-
131
-
-
85189249104
-
Insufficient Evidence: No Proof of Unauthorized Access
-
(April 21)
-
Cybercrime Law Report. 2003b. "Insufficient Evidence: No Proof of Unauthorized Access, " Cybercrime Law Report, 3 (April 21), pp. 8-9.
-
(2003)
Cybercrime Law Report
, vol.3
, pp. 8-9
-
-
-
132
-
-
85189249282
-
Spreader of Multinational Virus Faces Fines, Prison
-
(April 21)
-
Cybercrime Law Report. 2003c. "Spreader of Multinational Virus Faces Fines, Prison. " Cybercrime Law Report, 3 (April 21), p. 10.
-
(2003)
Cybercrime Law Report
, vol.3
, pp. 10
-
-
-
133
-
-
85189251426
-
Microsoft Has Price on Hackers' Heads
-
November 6
-
Damsell, K. 2003. "Microsoft Has Price on Hackers' Heads. " The Globe and Mail, November 6, pp. B1, B10.
-
(2003)
The Globe and Mail
-
-
Damsell, K.1
-
134
-
-
85189250747
-
Jury Finds Elcomsoft Not Guilty
-
(cited December 17, 2002)
-
Glasner, J. 2002. "Jury Finds Elcomsoft Not Guilty. " Wired News. http://www.wired.com/news/business/0,1367,56894,00.html (cited December 17, 2002).
-
(2002)
Wired News
-
-
Glasner, J.1
-
135
-
-
85189250901
-
Google Loses French Lawsuit
-
October 20
-
"Google Loses French Lawsuit. " 2003. The Globe and Mail, October 20, p. B7.
-
(2003)
The Globe and Mail
, pp. B7
-
-
-
136
-
-
85189249259
-
-
Asian School of Cyberlaws. (cited October 10, 2003)
-
"Hacker Suspect Says His PC Was Hijacked. " 2003. Asian School of Cyberlaws. http://www.asianlaws.org/infosec/archives/10_03_hacker.htm (cited October 10, 2003).
-
(2003)
Hacker Suspect Says His PC Was Hijacked
-
-
-
138
-
-
85189250275
-
Man Who Exposed County's Wireless Insecurity Found Innocent
-
(cited February 21, 2003)
-
"Man Who Exposed County's Wireless Insecurity Found Innocent, " 2600: The Hacker Quarterly. http://www.2600.com/news/view/article/1546 (cited February 21, 2003).
-
2600: The Hacker Quarterly
-
-
-
139
-
-
85189250840
-
Lawsuits Hit Net Music Downloaders
-
September 9
-
McKenna, B., and P. Waldie. 2003. "Lawsuits Hit Net Music Downloaders. " The Globe and Mail, September 9: pp. B1, B10.
-
(2003)
The Globe and Mail
-
-
McKenna, B.1
Waldie, P.2
-
140
-
-
85189250996
-
-
(cited May 31, 2004)
-
mi2g. 2004. "Digital Attacks Report. " http://www.mi2g.net/cgi/mi2g/frameset.php?pageid=http%3A//www.mi2g.net/cgi/mi2g/home_page.php. p 39. (cited May 31, 2004)
-
(2004)
Digital Attacks Report
, pp. 39
-
-
-
142
-
-
85189251606
-
-
CNN Online. (cited January 21, 2004)
-
Rogers, J. 2004. "U.S. Suing 532 Song Swappers. " CNN Online. http://cnn.com/2004/TECH/intemet/01/22/online.music/index.html (cited January 21, 2004).
-
(2004)
U.S. Suing 532 Song Swappers
-
-
Rogers, J.1
-
143
-
-
21244489423
-
-
Westport, CT: Quorom
-
Schell, B. H., J. L. Dodge, and S. Moutsatsos. 2002. The Hacking of America: Who's Doing It, Why, and How. Westport, CT: Quorom.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.3
-
144
-
-
0004110133
-
-
Cambridge, MA: O'Reilley
-
Schwartz, Randal. 1993. Learning Perl. Cambridge, MA: O'Reilley.
-
(1993)
Learning Perl
-
-
Schwartz, R.1
-
149
-
-
85189249159
-
Music Industry Hails $2,000 Win over Child
-
September 10
-
Waldie, P. 2003. "Music Industry Hails $2,000 Win over Child. " The Globe and Mail, September 10, pp. A1-2.
-
(2003)
The Globe and Mail
, pp. A1-A2
-
-
Waldie, P.1
-
150
-
-
85189251601
-
Canadian COOs Wary of Terrorism: Survey
-
October 21, 2003
-
Won, S. 2003. "Canadian COOs Wary of Terrorism: Survey. The Globe and Mail, October 21, p. B10, 2003.
-
(2003)
The Globe and Mail
, pp. B10
-
-
Won, S.1
-
151
-
-
85189250187
-
Student's 'Tedious' Thesis Is Terrorist's Treasure Map
-
July 9
-
Blumenfeld, L. 2003. "Student's 'Tedious' Thesis Is Terrorist's Treasure Map. " Toronto Star, July 9, p. A3.
-
(2003)
Toronto Star
, pp. A3
-
-
Blumenfeld, L.1
-
153
-
-
27944466951
-
Is Cyber Terror Next?
-
In Craig Calhoun, Paul Price, and Ashley Timmer, eds. New York: New Press
-
Denning, Dorothy. 2002. "Is Cyber Terror Next?" In Craig Calhoun, Paul Price, and Ashley Timmer, eds. Understanding September 11. New York: New Press.
-
(2002)
Understanding September 11
-
-
Denning, D.1
-
154
-
-
85189251496
-
-
cited November 19, 2003
-
"Dennis Ritchie and Ken Thompson. " 2003. http://tlc.discovery.com/convergence/hackers/bio/bio_02.html (cited November 19, 2003).
-
(2003)
Dennis Ritchie and Ken Thompson
-
-
-
155
-
-
85189252019
-
-
cited December 1, 2003
-
"Dorothy Denning. " 2003. http://www.nps.navy.mil/ctiw/stafl/denning.html (cited December 1, 2003).
-
(2003)
Dorothy Denning
-
-
-
156
-
-
85189250747
-
Jury Finds Elcomsoft Not Guilty
-
(cited December 17, 2002)
-
Glasner, J. 2002. "Jury Finds Elcomsoft Not Guilty. " Wired News. http://www.wired.com/news/business/0,1367,56894,00.html (cited December 17, 2002).
-
(2002)
Wired News
-
-
Glasner, J.1
-
157
-
-
85189249259
-
-
Asian School of Cyber Laws. (cited October 10, 2003)
-
"Hacker Suspect Says His PC Was Hijacked. " 2003. Asian School of Cyber Laws. http://www.asianlaws.org/infosec/archives/10_03_hacker.htm (cited October 10, 2003).
-
(2003)
Hacker Suspect Says His PC Was Hijacked
-
-
-
158
-
-
85189250862
-
-
(cited December 1, 2003)
-
Jobs, S. 2003. "Resume. " http://homepage.mac.com/steve/Resume.html (cited December 1, 2003).
-
(2003)
Resume
-
-
Jobs, S.1
-
159
-
-
85189250139
-
-
cited November 19, 2003
-
"John Draper. " 2003. http://tlc.discovery.com/convergence/hackers/bio/bio_03.html (cited November 19, 2003).
-
(2003)
John Draper
-
-
-
160
-
-
85189249062
-
-
cited November 19, 2003
-
"Kevin Poulsen. " 2003. http://tlc.discovery.com/convergence/hackers/bio/bio_07.html (cited November 19, 2003).
-
(2003)
Kevin Poulsen
-
-
-
161
-
-
85189249737
-
-
cited November 19, 2003
-
"Mark Abene. " 2003. http://tlc.discovery.com/convergence/hackers/bio/bio_04.html (cited November 19, 2003).
-
(2003)
Mark Abene
-
-
-
162
-
-
85189249737
-
-
cited November 21, 2003
-
"Mark Abene. " 2003. http://www.Livinginternet.com/i/ia_hackers_abene.htm (cited November 21, 2003).
-
(2003)
Mark Abene
-
-
-
167
-
-
21244489423
-
-
Westport, CT: Quorum
-
Schell, B. H., J. L. Dodge, and S. Moutsatsos. 2002. The Hacking of America: Who's Doing It, Why, and How. Westport, CT: Quorum.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.3
-
170
-
-
85189250360
-
-
(cited November 20, 2003)
-
Stallman, Richard. 2003. "Personal Home Page. " http://www.stallman.org/ (cited November 20, 2003).
-
(2003)
Personal Home Page
-
-
Stallman, R.1
-
172
-
-
85189249149
-
-
(cited December 1, 2003)
-
TangINAyan (real name unknown). 2003b. "Greatest Hackers in the Whole World: Robert Morris. " http://www.geocities.com/vienna/4345/robert.htm (cited December 1, 2003).
-
(2003)
Greatest Hackers in the Whole World: Robert Morris
-
-
-
174
-
-
85189251269
-
-
cited November 19, 2003
-
"Tsutomu Shimomura. " 2003. http://tlc.discovery.com/convergence/hackers/bio/bio_11.html (cited November 19, 2003).
-
(2003)
Tsutomu Shimomura
-
-
-
175
-
-
85189250003
-
-
cited November 19, 2003
-
"Vladimir Levin. " 2003. http://tlc.discovery.com/convergence/hackers/bio/bio_09.html (cited November 19, 2003).
-
(2003)
Vladimir Levin
-
-
-
176
-
-
33744940893
-
-
(cited November, 2003)
-
Webcrunchers International. 2003. "The Story So Far. " http://www.webcrunchers.com/crunch/story.html (cited November, 2003).
-
(2003)
The Story So Far
-
-
-
177
-
-
85189249480
-
-
(cited December 1, 2003)
-
Wozniak, S. 2003 "Short Bio for Steve Wozniak. " http://www.woz.org/wozscape/wozbio.html (cited December 1, 2003).
-
(2003)
Short Bio for Steve Wozniak
-
-
Wozniak, S.1
-
178
-
-
85189250567
-
-
(cited January 29, 2004.)
-
"The Can-Spam Act. " 2004. http://www.spamlaws.com/federal/108s877.html (cited January 29, 2004.)
-
(2004)
The Can-Spam Act
-
-
-
180
-
-
85189249174
-
-
(cited September 10, 2003)
-
CNNmoney. 2003. "Profiling the Music Pirates. " http://money.cnn.com/2003/09/10/technology/pirates/index.htm?cnn=yes (cited September 10, 2003).
-
(2003)
Profiling the Music Pirates
-
-
-
182
-
-
12344300052
-
-
(cited January 23, 2004)
-
Homeland Security Act of 2002. 2002. http://www.whitehouse.gov/deptofhomeland/analysis (cited January 23, 2004).
-
(2002)
Homeland Security Act of 2002
-
-
-
183
-
-
85189250818
-
Social Studies: Hackers from Outer Space?
-
November 18
-
Kesterton, M. 2003. "Social Studies: Hackers from Outer Space?" The Globe and Mail, November 18, p. A 24.
-
(2003)
The Globe and Mail
, pp. A24
-
-
Kesterton, M.1
-
184
-
-
85085400138
-
Women Bump into Tech Glass Ceiling
-
August 25
-
Lancaster, H. 2001. "Women Bump into Tech Glass Ceiling. " The Globe and Mail, August 25, p. S7.
-
(2001)
The Globe and Mail
, pp. S7
-
-
Lancaster, H.1
-
185
-
-
84992985969
-
-
(cited December 29, 2003)
-
U.S. Department of Justice. 2004. "Computer Crime and Intellectual Property Section. " http://www.usdoj.gov/criminal/cybercrime/cccases.html (cited December 29, 2003).
-
(2004)
Computer Crime and Intellectual Property Section
-
-
-
186
-
-
0003968659
-
-
Santa Monica, CA: Rand
-
Arguilla, J., and David F. Ronfeldt. Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: Rand, 2001.
-
(2001)
Networks and Netwars: The Future of Terror, Crime, and Militancy
-
-
Arguilla, J.1
Ronfeldt, D.F.2
-
197
-
-
0042456767
-
-
Sebastopol, CA: O'Reilly and Associates
-
Garfinkel, W., G. Spafford, and Debby Russell. Web Security, Privacy, and Commerce. Sebastopol, CA: O'Reilly and Associates, 2001.
-
(2001)
Web Security, Privacy, and Commerce
-
-
Garfinkel, W.1
Spafford, G.2
Russell, D.3
-
212
-
-
85189250504
-
-
Chicago: Heinemann Library
-
McIntosh, N. Cybercrime. Chicago: Heinemann Library, 2002.
-
(2002)
Cybercrime
-
-
McIntosh, N.1
-
213
-
-
85019108263
-
-
4th ed. Tuscon, AZ: American Eagle
-
Meinel, C. P. The Happy Hacker, 4th ed. Tuscon, AZ: American Eagle, 2001.
-
(2001)
The Happy Hacker
-
-
Meinel, C.P.1
-
221
-
-
3442888100
-
-
Boca Raton, FL: CRC
-
Richards, J. R. Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators. Boca Raton, FL: CRC, 1998.
-
(1998)
Transnational Criminal Organizations, Cybercrime, and Money Laundering: A Handbook for Law Enforcement Officers, Auditors, and Financial Investigators
-
-
Richards, J.R.1
-
223
-
-
21244489423
-
-
New York: Quorum
-
Schell, Bernadette H., J. L. Dodge, with Steve S. Moutsatsos. The Hacking of America: Who's Doing It, Why, and How. New York: Quorum, 2002.
-
(2002)
The Hacking of America: Who's Doing It, Why, and How
-
-
Schell, B.H.1
Dodge, J.L.2
Moutsatsos, S.S.3
-
231
-
-
84898294592
-
-
Washington, DC: Taylor and Francis
-
Thomas, D. Cybercrime. Washington, DC: Taylor and Francis, 2000.
-
(2000)
Cybercrime
-
-
Thomas, D.1
-
232
-
-
85189251152
-
-
(CD-ROM). Washington, DC: U.S. Department of Justice
-
U.S. Department of Justice. 21st Century Guide to Cybercrime (CD-ROM). Washington, DC: U.S. Department of Justice, 2003.
-
(2003)
21st Century Guide to Cybercrime
-
-
|