2314 lines
104 KiB
Plaintext
2314 lines
104 KiB
Plaintext
|
|
90021932
|
|
Title: Is Computer Hacking a Crime?
|
|
Authors: Anonymous
|
|
Journal: Harper's Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57
|
|
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
|
|
Abstract: A round-table discussion on the ethics of computer hacking is
|
|
presented. The panelists include computer hackers, scientists,
|
|
activists and media members.
|
|
Subjects: Computer crime; Ethics; Social life & customs
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90008297
|
|
Title: Computer Hacking Goes on Trial
|
|
Authors: Allman, William F
|
|
Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990
|
|
pp: 25
|
|
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
|
|
Abstract: The trial of Robert Morris, a graduate student who unleashed a
|
|
"worm" that caused computers around the US to grind to a halt on Nov
|
|
2, 1988, is discussed. Photograph; Illustration
|
|
Subjects: Trials; Computer crime
|
|
Names: Morris, Robert
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89121419
|
|
Title: Hackers: Is a Cure Worse Than the Disease?
|
|
Authors: Lewyn, Mark
|
|
Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Because of computer hacking, Pentagon officials would like to add
|
|
more layers of security to protect their networks. But this would
|
|
limit access to university and government scientists, who use the
|
|
information the most. Photograph
|
|
Subjects: Computer crime; Security systems; Computer networks
|
|
Names: Morris, Robert Jr
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89059272
|
|
Title: Let's Get Reckless
|
|
Authors: Gaines, Donna
|
|
Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15
|
|
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
|
|
Abstract: The developing social importance of computer viruses is explored.
|
|
Computer hacking and computer viruses have penetrated the
|
|
consciousness of the mainstream media and are being countered by
|
|
federal legislation. Illustration
|
|
Subjects: Computer crime; Social conditions & trends
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90144244
|
|
Title: Risky Business: Tackling Computer Security
|
|
Authors: Peterson, Ivars
|
|
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
|
|
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
|
|
Abstract: In response to concerns about the security of US computer systems, a
|
|
National Research Council panel issued a report detailing the
|
|
extreme vulnerability of present-day systems. The report is
|
|
discussed.
|
|
Subjects: Computer crime; Computers & computer technology; National Research
|
|
Council
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90142863
|
|
Title: Law: Breaking and Entering
|
|
Authors: Lawren, Bill
|
|
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: The US government's efforts to crack down on computer crime may
|
|
violate the constitutional rights of hackers. The Electronic
|
|
Frontier Foundation (EFF) has been formed to fight for those rights.
|
|
Illustration
|
|
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90128169
|
|
Title: Balancing the Books: Spectacular Computer Crimes
|
|
Journal: Barron's Date: Oct 1, 1990 pp: 55
|
|
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
|
|
Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck
|
|
BloomBecker about computer crime and the danger it poses to
|
|
industry.
|
|
Subjects: Computer crime
|
|
Names: BloomBecker, Buck
|
|
Type: Book Review-Unfavorable
|
|
Length: Long (19+ col inches)
|
|
|
|
90125761
|
|
Title: Print Queue: Stomping the Nasties
|
|
Authors: Kenner, Hugh
|
|
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
|
|
Programs, and Other Threats to Your System," by John McAfee and
|
|
Colin Haynes. Illustration
|
|
Subjects: Nonfiction; Computer crime; Computer programming & languages;
|
|
Computers & computer technology
|
|
Names: McAfee, John; Haynes, Colin
|
|
Type: Book Review-Favorable
|
|
Length: Long (31+ col inches)
|
|
|
|
90118815
|
|
Title: Apple Ad Arresting, but Will Stay in Can
|
|
Authors: Johnson, Bradley
|
|
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
|
|
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
|
|
Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV
|
|
commercial before it was aired. Apparently the company thought the
|
|
commercial might encourage the theft of Macintosh computers.
|
|
Subjects: Advertising; Television; Computers & computer technology; Theft
|
|
Companies: Apple Computer Inc
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90109601
|
|
Title: Rights and Wrongs of Software
|
|
Authors: Charles, Dan
|
|
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: Software copyrights have received much attention as software piracy
|
|
proliferates. Some experts believe software restrictions will
|
|
inhibit the development of better products and the growth of small
|
|
firms. Photograph; Illustration
|
|
Subjects: Software; Copyright; Computer programming & languages; Computer
|
|
crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90108876
|
|
Title: Eternal Plague: Computer Viruses
|
|
Authors: Cipra, Barry
|
|
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
|
|
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
|
|
Abstract: Recent findings indicate that there is no way to protect a computer
|
|
against all possible viral attacks. Two basic types of computer
|
|
viruses, the type that reproduces and the type that infects and
|
|
alters an operating system, are described.
|
|
Subjects: Computer programming & languages; Software; Operating systems;
|
|
Computer crime
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90099926
|
|
Title: Computer Center Certifies First Secure Network
|
|
Authors: Anonymous
|
|
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
|
|
Date: Sep 3, 1990 pp: 42
|
|
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
|
|
Abstract: The National Computer Center recently certified the first
|
|
multi-level secure computer network, the Verdix Secure Local Area
|
|
Network (VSLAN).
|
|
Subjects: Computer networks; Computer crime; Security systems; National
|
|
Computer Center
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90099517
|
|
Title: Computer Hackers: United States v Zod
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: The incompetence involved in the dramatic raids on computer hackers
|
|
by the Secret Service is discussed. The question of whether its
|
|
seizure of computers is constitutional is addressed. Photograph
|
|
Subjects: Computer crime; Computer networks; Law enforcement; Search &
|
|
seizure; Secret Service-US
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90099086
|
|
Title: Computers, Crime, and the Law
|
|
Authors: Branwyn, Gareth
|
|
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
|
|
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
|
|
Socio/Environmental
|
|
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
|
|
part of an investigation into data piracy and computer crime.
|
|
Computer professional's battle for free speech and privacy rights
|
|
are detailed.
|
|
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
|
|
Companies: Steve Jackson Games
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90144244
|
|
Title: Risky Business: Tackling Computer Security
|
|
Authors: Peterson, Ivars
|
|
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
|
|
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
|
|
Abstract: In response to concerns about the security of US computer systems, a
|
|
National Research Council panel issued a report detailing the
|
|
extreme vulnerability of present-day systems. The report is
|
|
discussed.
|
|
Subjects: Computer crime; Computers & computer technology; National Research
|
|
Council
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90142863
|
|
Title: Law: Breaking and Entering
|
|
Authors: Lawren, Bill
|
|
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: The US government's efforts to crack down on computer crime may
|
|
violate the constitutional rights of hackers. The Electronic
|
|
Frontier Foundation (EFF) has been formed to fight for those rights.
|
|
Illustration
|
|
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90128169
|
|
Title: Balancing the Books: Spectacular Computer Crimes
|
|
Journal: Barron's Date: Oct 1, 1990 pp: 55
|
|
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
|
|
Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck
|
|
BloomBecker about computer crime and the danger it poses to
|
|
industry.
|
|
Subjects: Computer crime
|
|
Names: BloomBecker, Buck
|
|
Type: Book Review-Unfavorable
|
|
Length: Long (19+ col inches)
|
|
|
|
90125761
|
|
Title: Print Queue: Stomping the Nasties
|
|
Authors: Kenner, Hugh
|
|
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
|
|
Programs, and Other Threats to Your System," by John McAfee and
|
|
Colin Haynes. Illustration
|
|
Subjects: Nonfiction; Computer crime; Computer programming & languages;
|
|
Computers & computer technology
|
|
Names: McAfee, John; Haynes, Colin
|
|
Type: Book Review-Favorable
|
|
Length: Long (31+ col inches)
|
|
|
|
90118815
|
|
Title: Apple Ad Arresting, but Will Stay in Can
|
|
Authors: Johnson, Bradley
|
|
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
|
|
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
|
|
Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV
|
|
commercial before it was aired. Apparently the company thought the
|
|
commercial might encourage the theft of Macintosh computers.
|
|
Subjects: Advertising; Television; Computers & computer technology; Theft
|
|
Companies: Apple Computer Inc
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90109601
|
|
Title: Rights and Wrongs of Software
|
|
Authors: Charles, Dan
|
|
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: Software copyrights have received much attention as software piracy
|
|
proliferates. Some experts believe software restrictions will
|
|
inhibit the development of better products and the growth of small
|
|
firms. Photograph; Illustration
|
|
Subjects: Software; Copyright; Computer programming & languages; Computer
|
|
crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90108876
|
|
Title: Eternal Plague: Computer Viruses
|
|
Authors: Cipra, Barry
|
|
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
|
|
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
|
|
Abstract: Recent findings indicate that there is no way to protect a computer
|
|
against all possible viral attacks. Two basic types of computer
|
|
viruses, the type that reproduces and the type that infects and
|
|
alters an operating system, are described.
|
|
Subjects: Computer programming & languages; Software; Operating systems;
|
|
Computer crime
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90099926
|
|
Title: Computer Center Certifies First Secure Network
|
|
Authors: Anonymous
|
|
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
|
|
Date: Sep 3, 1990 pp: 42
|
|
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
|
|
Abstract: The National Computer Center recently certified the first
|
|
multi-level secure computer network, the Verdix Secure Local Area
|
|
Network (VSLAN).
|
|
Subjects: Computer networks; Computer crime; Security systems; National
|
|
Computer Center
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90099517
|
|
Title: Computer Hackers: United States v Zod
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: The incompetence involved in the dramatic raids on computer hackers
|
|
by the Secret Service is discussed. The question of whether its
|
|
seizure of computers is constitutional is addressed. Photograph
|
|
Subjects: Computer crime; Computer networks; Law enforcement; Search &
|
|
seizure; Secret Service-US
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90099086
|
|
Title: Computers, Crime, and the Law
|
|
Authors: Branwyn, Gareth
|
|
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
|
|
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
|
|
Socio/Environmental
|
|
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
|
|
part of an investigation into data piracy and computer crime.
|
|
Computer professional's battle for free speech and privacy rights
|
|
are detailed.
|
|
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
|
|
Companies: Steve Jackson Games
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90144244
|
|
Title: Risky Business: Tackling Computer Security
|
|
Authors: Peterson, Ivars
|
|
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
|
|
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
|
|
Abstract: In response to concerns about the security of US computer systems, a
|
|
National Research Council panel issued a report detailing the
|
|
extreme vulnerability of present-day systems. The report is
|
|
discussed.
|
|
Subjects: Computer crime; Computers & computer technology; National Research
|
|
Council
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90142863
|
|
Title: Law: Breaking and Entering
|
|
Authors: Lawren, Bill
|
|
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: The US government's efforts to crack down on computer crime may
|
|
violate the constitutional rights of hackers. The Electronic
|
|
Frontier Foundation (EFF) has been formed to fight for those rights.
|
|
Illustration
|
|
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90128169
|
|
Title: Balancing the Books: Spectacular Computer Crimes
|
|
Journal: Barron's Date: Oct 1, 1990 pp: 55
|
|
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
|
|
Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck
|
|
BloomBecker about computer crime and the danger it poses to
|
|
industry.
|
|
Subjects: Computer crime
|
|
Names: BloomBecker, Buck
|
|
Type: Book Review-Unfavorable
|
|
Length: Long (19+ col inches)
|
|
|
|
90125761
|
|
Title: Print Queue: Stomping the Nasties
|
|
Authors: Kenner, Hugh
|
|
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
|
|
Programs, and Other Threats to Your System," by John McAfee and
|
|
Colin Haynes. Illustration
|
|
Subjects: Nonfiction; Computer crime; Computer programming & languages;
|
|
Computers & computer technology
|
|
Names: McAfee, John; Haynes, Colin
|
|
Type: Book Review-Favorable
|
|
Length: Long (31+ col inches)
|
|
|
|
90118815
|
|
Title: Apple Ad Arresting, but Will Stay in Can
|
|
Authors: Johnson, Bradley
|
|
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
|
|
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
|
|
Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV
|
|
commercial before it was aired. Apparently the company thought the
|
|
commercial might encourage the theft of Macintosh computers.
|
|
Subjects: Advertising; Television; Computers & computer technology; Theft
|
|
Companies: Apple Computer Inc
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90109601
|
|
Title: Rights and Wrongs of Software
|
|
Authors: Charles, Dan
|
|
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: Software copyrights have received much attention as software piracy
|
|
proliferates. Some experts believe software restrictions will
|
|
inhibit the development of better products and the growth of small
|
|
firms. Photograph; Illustration
|
|
Subjects: Software; Copyright; Computer programming & languages; Computer
|
|
crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90108876
|
|
Title: Eternal Plague: Computer Viruses
|
|
Authors: Cipra, Barry
|
|
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
|
|
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
|
|
Abstract: Recent findings indicate that there is no way to protect a computer
|
|
against all possible viral attacks. Two basic types of computer
|
|
viruses, the type that reproduces and the type that infects and
|
|
alters an operating system, are described.
|
|
Subjects: Computer programming & languages; Software; Operating systems;
|
|
Computer crime
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90099926
|
|
Title: Computer Center Certifies First Secure Network
|
|
Authors: Anonymous
|
|
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
|
|
Date: Sep 3, 1990 pp: 42
|
|
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
|
|
Abstract: The National Computer Center recently certified the first
|
|
multi-level secure computer network, the Verdix Secure Local Area
|
|
Network (VSLAN).
|
|
Subjects: Computer networks; Computer crime; Security systems; National
|
|
Computer Center
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90099517
|
|
Title: Computer Hackers: United States v Zod
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: The incompetence involved in the dramatic raids on computer hackers
|
|
by the Secret Service is discussed. The question of whether its
|
|
seizure of computers is constitutional is addressed. Photograph
|
|
Subjects: Computer crime; Computer networks; Law enforcement; Search &
|
|
seizure; Secret Service-US
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90099086
|
|
Title: Computers, Crime, and the Law
|
|
Authors: Branwyn, Gareth
|
|
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
|
|
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
|
|
Socio/Environmental
|
|
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
|
|
part of an investigation into data piracy and computer crime.
|
|
Computer professional's battle for free speech and privacy rights
|
|
are detailed.
|
|
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
|
|
Companies: Steve Jackson Games
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90098358
|
|
Title: Artificial Intelligence: Computerized Breaking and Entering
|
|
Authors: Goldberg, Jeff
|
|
Journal: Omni Vol: 12 Iss: 12 Date: Sep 1990 pp: 18
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: To combat computer "worms," such as the one created by Robert Tappan
|
|
Morris, software vendors are offering enhanced security programs.
|
|
The pros and cons of security are discussed. Illustration
|
|
Subjects: Computer crime; Software; Security systems
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90096176
|
|
Title: Spring Books: Guardian of the Gates
|
|
Authors: Dickman, Steven
|
|
Journal: Nature Vol: 344 Iss: 6269 Date: Apr 26, 1990 pp: 895-896
|
|
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech
|
|
Abstract: Steven Dickman reviews "The Cuckoo's Egg," by Clifford Stoll.
|
|
Photograph
|
|
Subjects: Nonfiction; Espionage; Computer crime
|
|
Names: Stoll, Clifford
|
|
Type: Book Review-Favorable
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90095224
|
|
Title: Science and the Citizen: Digital Desperados
|
|
Authors: Wallich, Paul
|
|
Journal: Scientific American Vol: 263 Iss: 3 Date: Sep 1990 pp: 34-38
|
|
Jrnl Code: GSCA ISSN: 0036-8733 Jrnl Group: SciTech
|
|
Abstract: Many computer experts feel that the government is acting
|
|
overzealousy in its effort to crack down on computer crime. The
|
|
definition of computer crime has come into question.
|
|
Subjects: Computer crime; Law enforcement
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90094490
|
|
Title: Off the Hook
|
|
Authors: Dibbell, Julian
|
|
Journal: Village Voice Vol: 35 Iss: 34 Date: Aug 21, 1990 pp: 8
|
|
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
|
|
Abstract: Federal prosecutors dropped charges against Craig M. Neidorf,
|
|
better known as the Knight Lightning computer hacker, on Jul 24,
|
|
1990. Neidorf had published a document detailing Bellsouth's
|
|
emergency 911 system, although corporate officials agreed that the
|
|
information was not sensitive.
|
|
Subjects: Computer crime; Publishing; Telecommunications industry
|
|
Names: Neidorf, Craig M
|
|
Companies: BellSouth Corp
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90091236
|
|
Title: Sending a Signal
|
|
Authors: Denning, Peter J
|
|
Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990
|
|
pp: 11, 13
|
|
Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic
|
|
Abstract: An editorial discusses Robert Morris Jr's criminal sentence. Morris
|
|
was convicted in Jan 1990 of releasing a worm program into the
|
|
Research Internet in Nov 1988. Morris was given a suspended jail
|
|
term, a fine of $10,000 and 400 hours of community service.
|
|
Illustration
|
|
Subjects: Computer crime; Criminal sentences; Fines & penalties; Crime &
|
|
criminals
|
|
Names: Morris, Robert T Jr
|
|
Type: Editorial
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90091223
|
|
Title: Insecurity about Security?
|
|
Authors: Neumann, Peter G
|
|
Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990 pp: 170
|
|
Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic
|
|
Abstract: The security provided with many computer systems is fundamentally
|
|
flawed. Better software and hardware systems are needed to hinder
|
|
misuse from within and penetration. Illustration
|
|
Subjects: Computers & computer technology; Computer crime; Security systems
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90090104
|
|
Title: Forum: Playing the Data Game
|
|
Authors: Wise, Bob; Scisco, Peter
|
|
Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 16
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: The Democratic congressman from West Virginia and the editor of
|
|
"Compute" magazine offer opinions on privacy and computer security.
|
|
Illustration
|
|
Subjects: Computer crime; Privacy
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90090099
|
|
Title: Crime Bytes Back
|
|
Authors: Marsa, Linda; Ray, Don
|
|
Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 34-38+
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: The high-tech world of future computer cops and robbers is
|
|
breathlessly described. Illustration
|
|
Subjects: Computer crime; Law enforcement; Social conditions & trends; Future
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90090027
|
|
Title: Books: The Cuckoo's Egg
|
|
Authors: Connolly, John W D
|
|
Journal: Physics Today Vol: 43 Iss: 8 Date: Aug 1990 pp: 75-76
|
|
Jrnl Code: GPHT ISSN: 0031-9228 Jrnl Group: SciTech
|
|
Abstract: John W. D. Connolly reviews "The Cuckoo's Egg: Tracking a Spy
|
|
Through the Maze of Computer Espionage," by Clifford Stoll.
|
|
Subjects: Nonfiction; Computer crime; Computer networks; Espionage
|
|
Names: Stoll, Clifford
|
|
Type: Book Review-Mixed
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90086946
|
|
Title: Hacker Trial under Way
|
|
Authors: Anderson, G Christopher
|
|
Journal: Nature Vol: 343 Iss: 6255 Date: Jan 18, 1990 pp: 200
|
|
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech
|
|
Abstract: The trial of Robert Morris Jr, the college student charged with
|
|
creating the "Cornell virus" that struck thousands of US computers
|
|
in 1988, is detailed. The law under which Morris is being
|
|
prosecuted, and its implications for future law enforcement for
|
|
computer crimes are examined. Photograph
|
|
Subjects: Trials; Computer crime; Law enforcement
|
|
Names: Morris, Robert
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90086606
|
|
Title: Viruses? Who You Gonna Call? 'Hackerbusters'
|
|
Authors: Schwartz, Evan I; Rothfeder, Jeffrey
|
|
Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 71-72
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Computer security, where purveyors of special software and
|
|
consulting methods offer protection from computer crime, is a $3
|
|
billion industry, but some critics claim that there are charlatans
|
|
out there. Graph; Illustration
|
|
Subjects: Industry profiles; Security systems; Computers & computer
|
|
technology; Computer crime; Consultants
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90086605
|
|
Title: Computer Anarchism Calls for a Tough Response
|
|
Authors: Rothfeder, Jeffrey; Schwartz, Evan I
|
|
Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 72
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: While computer break-ins and viruses are admittedly dangerous,
|
|
hysteria over the situation is no excuse for violating the
|
|
constitutional rights of suspected hackers. Photograph
|
|
Subjects: Computer crime; Civil rights
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90085769
|
|
Title: Theft in the Classroom
|
|
Authors: Thornburg, David D
|
|
Journal: inCider Vol: 8 Iss: 8 Date: Aug 1990 pp: 88-90
|
|
Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech
|
|
Abstract: The issue of software piracy as it relates to use of computer
|
|
programs in the classroom is discussed. More sources of public
|
|
funding are needed so schools won't be inclined to copy programs
|
|
illegally.
|
|
Subjects: Education & schools; Copyright; Software; Computer crime
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90084275
|
|
Title: On Line and Out of Bounds
|
|
Authors: Dibbell, Julian
|
|
Journal: Village Voice Vol: 35 Iss: 30 Date: Jul 24, 1990 pp: 26-32
|
|
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
|
|
Abstract: Computer hackers are penetrating some of the country's most
|
|
sophisticated systems, and the government is targeting them as a
|
|
serious threat to national security. Secret Service raids on
|
|
hackers are described. Illustration
|
|
Subjects: Computer crime; Computer networks; Classified information; National
|
|
security; Secret Service-US
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90083828
|
|
Title: Crackdown on Hackers 'May Violate Civil Rights'
|
|
Authors: Charles, Dan
|
|
Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 22
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: The Electronic Frontier Foundation, a computer industry group, says
|
|
US efforts to crack down on computer "hackers" may be unlawful and
|
|
violate civil rights. Photograph
|
|
Subjects: Computer crime; Laws & legislation; Civil rights; United States--US;
|
|
Electronic Frontier Foundation
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90083805
|
|
Title: Private and Confidential
|
|
Authors: Reynolds, Chris
|
|
Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 58
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: The proliferation of electronic mail, bulletin boards and databases
|
|
is raising concerns over security and privacy in the computer age.
|
|
Illustration
|
|
Subjects: Electronic mail; Computers & computer technology; Privacy; Computer
|
|
crime
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90081730
|
|
Title: Print Queue: Our Man in Berkeley
|
|
Authors: Kenner, Hugh
|
|
Journal: Byte Vol: 15 Iss: 3 Date: Mar 1990 pp: 360-362
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: Hugh Kenner reviews "The Cuckoo's Egg: Tracking a Spy Through the
|
|
Maze of Computer Espionage," by Clifford Stoll. Illustration
|
|
Subjects: Nonfiction; Computer crime; Espionage
|
|
Names: Stoll, Clifford
|
|
Type: Book Review-Favorable
|
|
Length: Long (31+ col inches)
|
|
|
|
90081052
|
|
Title: 'Killer' Computer Viruses: An Idea Whose Time Shouldn't Come
|
|
Authors: Lewyn, Mark
|
|
Journal: Business Week Iss: 3170 Date: Jul 23, 1990 pp: 30
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: The Defense Department's scheme to use a "killer" computer virus to
|
|
infiltrate an enemy's computer system is discussed. Although
|
|
feasible, the concept could prove to be costly in more ways than
|
|
one. Illustration
|
|
Subjects: Computer crime; Espionage; Department of Defense
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90078513
|
|
Title: Hackers of the World, Unite!
|
|
Authors: Schwartz, John
|
|
Journal: Newsweek Vol: 116 Iss: 1 Date: Jul 2, 1990 pp: 36-37
|
|
Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News
|
|
Abstract: As law-enforcement officials widen their crackdown on computer
|
|
tampering, computer pioneers like Mitch Kapor and Steve Wozniak are
|
|
joining in an effort to defend hackers and the freedom of
|
|
information. Photograph
|
|
Subjects: Computers & computer technology; Law enforcement; Computer crime
|
|
Type: News
|
|
Length: Long (31+ col inches)
|
|
|
|
90074799
|
|
Title: Man with a Modem
|
|
Authors: Campbell, Peter
|
|
Journal: New Statesman & Society Vol: 3 Iss: 106 Date: Jun 22, 1990
|
|
pp: 54
|
|
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
|
|
Abstract: Peter Campbell reviews "Beating the System: Hackers, Phreakers and
|
|
Electronic Spies," by Owen Bowcott and Sally Hamilton.
|
|
Subjects: Nonfiction; Computer crime
|
|
Names: Bowcott, Owen; Hamilton, Sally
|
|
Type: Book Review-Mixed
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90062822
|
|
Title: Microcomputer Security and Control
|
|
Authors: Forgione, Dana; Blankley, Alan
|
|
Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990 pp: 83-90
|
|
Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business
|
|
Abstract: Six tips for accountants on maintaining microcomputer security are
|
|
offered. Photograph; Table
|
|
Subjects: Personal computers; Computer crime; Accounting & accountants
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90062815
|
|
Title: Book Review: Computer Audit, Control, and Security
|
|
Authors: Iacono, Lisa M
|
|
Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990
|
|
pp: 150-151
|
|
Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business
|
|
Abstract: Lisa M. Iacono reviews "Computer Audit, Control, and Security," by
|
|
Robert R. Moeller.
|
|
Subjects: Nonfiction; Accounting & accountants; Computers & computer
|
|
technology; Computer crime; Security systems
|
|
Names: Moeller, Robert R
|
|
Type: Book Review-Favorable
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90062001
|
|
Title: The Risk of Computing
|
|
Authors: Reynolds, Chris
|
|
Journal: New Scientist Vol: 126 Iss: 1718 Date: May 26, 1990 pp: 64
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: Chris Reynolds reviews "Viruses, Bugs and Star Wars," by Geoff
|
|
Simons. Illustration
|
|
Subjects: Nonfiction; Computers & computer technology; Computer crime
|
|
Names: Simons, Geoff
|
|
Type: Book Review-Unfavorable
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90061371
|
|
Title: Thanks for Wiping the Memory
|
|
Authors: Thimbleby, Harold
|
|
Journal: New Scientist Vol: 126 Iss: 1717 Date: May 19, 1990 pp: 69
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: It is nice to think the computer viruses have a bright side:
|
|
forcing programs, professional standards and hardware to improve.
|
|
If viruses were unable to corrupt programs, then anything or anyone
|
|
else would also find it harder.
|
|
Subjects: Computers & computer technology; Computer crime; Software
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90047219
|
|
Title: Conversations
|
|
Authors: Ferrell, Keith
|
|
Journal: Compute! Vol: 12 Iss: 5 Date: May 1990 pp: 98
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: According to Buck BloomBecker, the director of the National Center
|
|
for Computer Crime Data, there is a potential for computer crime
|
|
everywhere computers are located. There is a variety of motivations
|
|
that underlie this type of crime. Photograph
|
|
Subjects: Computer crime; National Center for Computer Crime Data
|
|
Names: BloomBecker, Buck
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90046190
|
|
Title: The Hacker Dragnet
|
|
Authors: Schwartz, John
|
|
Journal: Newsweek Vol: 115 Iss: 18 Date: Apr 30, 1990 pp: 50
|
|
Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News
|
|
Abstract: Federal authorities are in hot pursuit of computer criminals.
|
|
However, innocent victims may be being swept up in the hunt.
|
|
Illustration
|
|
Subjects: Computer crime; Crime & criminals; Law enforcement
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90045192
|
|
Title: Hackers 'Plan Revenge' for Police Clampdown on Computer Crime
|
|
Authors: Charles, Dan; O Neill, Graeme
|
|
Journal: New Scientist Vol: 126 Iss: 1713 Date: Apr 21, 1990 pp: 24
|
|
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
|
|
Abstract: Managers of computer networks in the US and Australia have sent out
|
|
warnings that "hackers" may try to take revenge for recent attempts
|
|
by police to crack down on computer crime.
|
|
Subjects: Computers & computer technology; Computer networks; Computer crime;
|
|
Crime & criminals
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90042567
|
|
Title: Busting Computer Viruses: Who Ya Gonna Call?
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 315 Iss: 7649 Date: Apr 7, 1990 pp: 78
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: The onslaught of damage to computer systems by viruses and hackers
|
|
is expected to increase. Halting the problem will mean stricter
|
|
control on the use of PCs. Illustration
|
|
Subjects: Computers & computer technology; Personal computers; Computer crime
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90042105
|
|
Title: A 75 (Cent) Discrepancy Propels Astronomer Into a Maze of Computer
|
|
Networks and Onto a Best-Seller List
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 36 Iss: 29 Date: Apr 4, 1990
|
|
pp: A3
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Clifford Stoll's investigation of a 75-cent discrepancy in some
|
|
computer accounts in 1986 led him to track a spy through a maze of
|
|
computer networks. Stoll catalogued the techniques the spy used in
|
|
his book "The Cuckoo's Egg: Tracking a Spy Through the Maze of
|
|
Computer Espionage." Photograph
|
|
Subjects: Computers & computer technology; Biographical profiles; Espionage;
|
|
Computer crime
|
|
Names: Stoll, Clifford
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90041088
|
|
Title: Computer Whiz Guilty
|
|
Authors: Burstyn, Harold L
|
|
Journal: ABA Journal Vol: 76 Date: Apr 1990 pp: 20
|
|
Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business
|
|
Abstract: In one of the first jury trials under the Computer Fraud and Abuse
|
|
Act, a federal jury convicted a graduate student named Robert T.
|
|
Morris of launching a rogue program called a worm that shut down
|
|
hundreds of computers across the US. He intended no malice and was
|
|
not sent to jail. Photograph
|
|
Subjects: Court rulings; Computers & computer technology; Criminal sentences;
|
|
Computer crime
|
|
Names: Morris, Robert T Jr
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90038941
|
|
Title: Books and Arts: Computer Hackers--The 75-Cent Solution
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 314 Iss: 7648 Date: Mar 31, 1990 pp: 84-85
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: "The Cuckoo's Egg," by Clifford Stoll, is reviewed.
|
|
Subjects: Computer crime; Nonfiction
|
|
Names: Stoll, Clifford
|
|
Type: Book Review-Favorable
|
|
Length: Short (1-9 col inches)
|
|
|
|
90037281
|
|
Title: Stranger than Fiction
|
|
Authors: Carver, Robert
|
|
Journal: New Statesman & Society Vol: 3 Iss: 91 Date: Mar 9, 1990 pp: 38
|
|
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
|
|
Abstract: Robert Carver reviews "The Cuckoo's Egg," by Clifford Stoll.
|
|
Photograph
|
|
Subjects: Nonfiction; Computer crime; Espionage; Investigations
|
|
Names: Stoll, Clifford
|
|
Type: Book Review-Favorable
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90034139
|
|
Title: Hunt for the Hacker Spy
|
|
Authors: Elliott, Lawrence
|
|
Journal: Reader's Digest Vol: 136 Iss: 816 Date: Apr 1990 pp: 185-232
|
|
Jrnl Code: GRDI ISSN: 0034-0375 Jrnl Group: Lifestyles
|
|
Abstract: The mystery began when Clifford Stoll, a systems manager at the
|
|
Lawrence Berkeley Laboratory in Berkeley CA, learned of an
|
|
unexplained seventy-five-cent charge for computer time. Concerned
|
|
that someone was invading the US military networks, Stoll began to
|
|
hunt down the hacker. Photograph; Illustration
|
|
Subjects: Espionage; Computer crime; Defense industry
|
|
Names: Stoll, Clifford
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90032796
|
|
Title: Hi-Tech Mall Crawl
|
|
Authors: Dibbell, Julian
|
|
Journal: Village Voice Vol: 35 Iss: 12 Date: Mar 20, 1990 pp: S12
|
|
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
|
|
Abstract: Eric Corley, the publisher of a computer hacker's magazine called
|
|
"2600," discusses why he and others are lured to messing with the
|
|
government's computer systems.
|
|
Subjects: Computer crime
|
|
Names: Corley, Eric
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90031482
|
|
Title: Tennessee Suspends 19 for Computer Tampering
|
|
Authors: Anonymous
|
|
Journal: Chronicle of Higher Education Vol: 36 Iss: 26 Date: Mar 14, 1990
|
|
pp: A2
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: The University of Tennessee has suspended 19 students for at least
|
|
one semester for gaining access to the computer program that
|
|
controls the dropping and adding of courses past the deadline. No
|
|
grades were changed.
|
|
Subjects: Computer crime; Colleges & universities; Students
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90026028
|
|
Title: Computer Security: Gaining the CEO's Support
|
|
Authors: Horton, Thomas R
|
|
Journal: Vital Speeches of the Day Vol: 56 Iss: 10 Date: Mar 1990
|
|
pp: 307-310
|
|
Jrnl Code: VSP ISSN: 0042-742X Jrnl Group: Commentary
|
|
Abstract: Chief executive officers have been lamentably disinterested in
|
|
computer security, occasionally to their misfortune. Communication
|
|
is the key to any new program, and computer security personnel must
|
|
make it easy for busy CEOs to comprehend their security needs and
|
|
options. Confusion among different departments makes implementing
|
|
security a challenge.
|
|
Subjects: Computer crime; Security systems; Chief executive officers
|
|
Type: Speech
|
|
Length: Long (31+ col inches)
|
|
|
|
90025552
|
|
Title: When a Virus Makes Your PC Sneeze
|
|
Authors: Wiener, Daniel P
|
|
Journal: U.S. News & World Report Vol: 108 Iss: 8 Date: Feb 26, 1990
|
|
pp: 62
|
|
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
|
|
Abstract: Those who operate personal computers over telephone lines or trade
|
|
software with friends increase the risk of contracting a computer
|
|
virus. "Blocker" programs, available for PCs, can help one prevent
|
|
or track viruses. Illustration
|
|
Subjects: Personal computers; Software; Computer crime; Security systems
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90021932
|
|
Title: Is Computer Hacking a Crime?
|
|
Authors: Anonymous
|
|
Journal: Harper's Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57
|
|
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
|
|
Abstract: A round-table discussion on the ethics of computer hacking is
|
|
presented. The panelists include computer hackers, scientists,
|
|
activists and media members.
|
|
Subjects: Computer crime; Ethics; Social life & customs
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90020898
|
|
Title: Computers/Communications: Fraud Busters
|
|
Authors: Siler, Charles
|
|
Journal: Forbes Vol: 145 Iss: 4 Date: Feb 19, 1990 pp: 154-158
|
|
Jrnl Code: FBR ISSN: 0015-6914 Jrnl Group: Business
|
|
Abstract: More than 50 companies, from Texas Instruments to Spectrix Inc, are
|
|
developing tamper-proof computer networks to prevent investors from
|
|
being cheated on the futures exchanges. This new technology is
|
|
discussed. Photograph; Illustration
|
|
Subjects: Computers & computer technology; Company profiles; Computer crime
|
|
Companies: Texas Instruments Inc; Spectrix Inc
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90020575
|
|
Title: Morris Code
|
|
Authors: Hafner, Katie
|
|
Journal: New Republic Vol: 202 Iss: 8 Date: Feb 19, 1990 pp: 15-16
|
|
Jrnl Code: GTNR ISSN: 0028-6583 Jrnl Group: Commentary
|
|
Abstract: Robert Tappan Morris, the young man who infiltrated Internet, a
|
|
nationwide computer network, has recieved a stiff penalty from the
|
|
Justice Department. His crime was actually far less pernicious than
|
|
most others.
|
|
Subjects: Computer crime; Criminal sentences
|
|
Names: Morris, Robert T Jr
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90019137
|
|
Title: Scenes from Science: Hacking for Adventure
|
|
Authors: Cooper, William
|
|
Journal: Spectator Vol: 264 Iss: 8431 Date: Feb 10, 1990 pp: 10
|
|
Jrnl Code: GSPE ISSN: 0038-6952 Jrnl Group: Commentary
|
|
Abstract: The case of the US Justice Department versus Cornell graduate
|
|
student Robert Morris Jr will be a forum to evaluate the
|
|
effectiveness of the Computer Fraud and Abuse Act.
|
|
Subjects: Computer crime; Laws & legislation; Trials
|
|
Names: Morris, Robert Jr
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
90019041
|
|
Title: Hacked to Pieces
|
|
Authors: Jenkins, Jolyon
|
|
Journal: New Statesman & Society Vol: 3 Iss: 87 Date: Feb 9, 1990 pp: 27
|
|
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
|
|
Abstract: There is a good reason why people other than computer hackers and
|
|
high-tech fraudsters should worry about computer crime legislation:
|
|
Laws made in response to moral panic usually fail to catch real
|
|
criminals and end up restricting civil liberties for everyone.
|
|
Subjects: Computer crime; Laws & legislation; Civil rights
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
90015840
|
|
Title: Around the Mall and Beyond
|
|
Authors: Park, Edwards
|
|
Journal: Smithsonian Vol: 20 Iss: 11 Date: Feb 1990 pp: 20-26
|
|
Jrnl Code: GSMI ISSN: 0037-7333 Jrnl Group: Socio/Environmental;
|
|
SciTech
|
|
Abstract: Astronomer-author-hacker Clifford Stoll is interviewed. Stoll is
|
|
the author of "The Cuckoo's Egg," a computer-age detective story.
|
|
Photograph
|
|
Subjects: Scientists; Computer crime; Biographical profiles
|
|
Names: Stoll, Clifford
|
|
Type: Interview
|
|
Length: Long (31+ col inches)
|
|
|
|
90015267
|
|
Title: Deterring Computer Crime
|
|
Authors: Rosenblatt, Kenneth
|
|
Journal: Technology Review Vol: 93 Iss: 2 Date: Feb 1990 pp: 34-40
|
|
Jrnl Code: TCR ISSN: 0040-1692 Jrnl Group: SciTech
|
|
Abstract: Computer-illiterate police cannot combat the growing incidence of
|
|
electronic theft and vandalism. What's needed are special task
|
|
forces and penalties that fit the crime, such as taking away an
|
|
offender's computer. Illustration
|
|
Subjects: Computers & computer technology; Computer crime; Law enforcement
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
90008297
|
|
Title: Computer Hacking Goes on Trial
|
|
Authors: Allman, William F
|
|
Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990
|
|
pp: 25
|
|
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
|
|
Abstract: The trial of Robert Morris, a graduate student who unleashed a
|
|
"worm" that caused computers around the US to grind to a halt on Nov
|
|
2, 1988, is discussed. Photograph; Illustration
|
|
Subjects: Trials; Computer crime
|
|
Names: Morris, Robert
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89127748
|
|
Title: Ethical Responsibility Key to Computer Security
|
|
Authors: Lynn, M Stuart
|
|
Journal: Educational Record Vol: 70 Iss: 2 Date: Spring 1989 pp: 36-39
|
|
Jrnl Code: GEDR ISSN: 0013-1873 Jrnl Group: Academic
|
|
Abstract: The recent Computer Worm incident raised the issue of ethical
|
|
standards relating to computer networks and information. The
|
|
pervasiveness of powerful computers makes ethical behavior morally
|
|
and practically necessary. Illustration; References
|
|
Subjects: Computer crime; Computers & computer technology; Ethics; Morality
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89121419
|
|
Title: Hackers: Is a Cure Worse Than the Disease?
|
|
Authors: Lewyn, Mark
|
|
Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Because of computer hacking, Pentagon officials would like to add
|
|
more layers of security to protect their networks. But this would
|
|
limit access to university and government scientists, who use the
|
|
information the most. Photograph
|
|
Subjects: Computer crime; Security systems; Computer networks
|
|
Names: Morris, Robert Jr
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89106603
|
|
Title: Halting Hackers
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 313 Iss: 7626 Date: Oct 28, 1989 pp: 18
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: An editorial discusses the need for laws to protect against computer
|
|
crimes. Illustration
|
|
Subjects: Computer crime; Laws & legislation
|
|
Type: Editorial
|
|
Length: Short (1-9 col inches)
|
|
|
|
89104122
|
|
Title: If Your Computer Catches a Virus on Friday the 13th, Who You Gonna
|
|
Call? John McAfee
|
|
Authors: Anonymous
|
|
Journal: People Weekly Vol: 32 Iss: 16 Date: Oct 16, 1989 pp: 77
|
|
Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles
|
|
Abstract: John McAfee, computer virus exterminator "extraordinaire," has
|
|
created a so-called disinfectant program that can determine whether
|
|
a virus has invaded computer. His program can wipe out the virus
|
|
and repair the damage. Photograph
|
|
Subjects: Computer crime; Computers & computer technology; Biographical
|
|
profiles
|
|
Names: McAfee, John
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89103846
|
|
Title: This Morning's Computer Virus--Unlucky for Some
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 313 Iss: 7624 Date: Oct 14, 1989 pp: 100-102
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: A recent computer virus called Datacrime, which was designed to
|
|
damage databases on Friday, October 13th, has so far infected
|
|
thousands of computers in Europe.
|
|
Subjects: Computer crime; Software; Data bases
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89101302
|
|
Title: Short-Circuiting Computer Crime
|
|
Authors: Bloombecker, J J
|
|
Journal: Datamation Vol: 35 Iss: 19 Date: Oct 1, 1989 pp: 71-72
|
|
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech
|
|
Abstract: Assessing what other IS managers are doing to safeguard computer
|
|
systems is probably the best source of ideas on how to shut down
|
|
computer crime, a $500 million a year industry. Graph
|
|
Subjects: Computer crime; Security systems; Computers & computer technology;
|
|
Industry profiles
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89101248
|
|
Title: Crimes of the Heart?
|
|
Authors: Crabb, Don
|
|
Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 144E-144H
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: The person who stole and disseminated the source code to some of
|
|
Apple's Macintosh ROM deserves a punishment to fit the horrible
|
|
crime. As Apple moves into the first quarter of the 1990 fiscal
|
|
year, several products Macintosh users hope to see introduced are
|
|
discussed. Illustration
|
|
Subjects: Product development; Computer crime
|
|
Companies: Apple Computer Inc
|
|
Type: Commentary
|
|
Length: Long (31+ col inches)
|
|
|
|
89101228
|
|
Title: Goodbye, Mr. Chips
|
|
Authors: Wayner, Peter
|
|
Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 364
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: The computer revolution is threatened with the curse of success.
|
|
Once eveyone starts using some new machine, the temptation to make
|
|
everything right by regulation comes creeping in.
|
|
Subjects: Computers & computer technology; Computer crime; Government
|
|
regulation
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89096642
|
|
Title: Brave New World
|
|
Authors: Dibbell, Julian
|
|
Journal: Village Voice Vol: 34 Iss: 39 Date: Sep 26, 1989 pp: S7, S10+
|
|
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
|
|
Abstract: The software industry has picked up its legal attacks on pirates,
|
|
targeting corporate offenders in particular. The steps that the
|
|
industry are taking are discussed. Illustration
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89091613
|
|
Title: Coping with a PC Virus
|
|
Authors: Rosenberg, Jim
|
|
Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989
|
|
pp: 8PC-10PC
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: The Commercial Appeal, a Memphis TN newspaper, recently had an
|
|
encounter with a computer virus. The company was able to remedy the
|
|
problem quickly with an anti-viral program.
|
|
Subjects: Newspapers; Company profiles; Computers & computer technology;
|
|
Computer crime
|
|
Companies: Commercial Appeal
|
|
Type: Commentary
|
|
Length: Long (31+ col inches)
|
|
|
|
89091612
|
|
Title: Combatting PC Viruses
|
|
Authors: Rosenberg, Jim
|
|
Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989
|
|
pp: 11PC, 31PC
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: The House Telecommunication and Finance subcommittee will present
|
|
legislation that will include stiff penalties against those who
|
|
infect computer systems with a virus.
|
|
Subjects: Laws & legislation; Computers & computer technology; Viruses;
|
|
Computer crime
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89089348
|
|
Title: Free the Hacker Two
|
|
Authors: Corley, Eric
|
|
Journal: Harper's Vol: 279 Iss: 1672 Date: Sep 1989 pp: 22-26
|
|
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
|
|
Abstract: An editorial urges the release of computer "hackers" imprisoned for
|
|
computer crimes. Excerpted from the book "Hackers in Jail."
|
|
Subjects: Computer crime
|
|
Type: Editorial
|
|
Length: Long (31+ col inches)
|
|
|
|
89083744
|
|
Title: Nonfiction: The Cuckoo's Egg
|
|
Authors: Stuttaford, Genevieve
|
|
Journal: Publishers Weekly Vol: 236 Iss: 6 Date: Aug 11, 1989 pp: 448
|
|
Jrnl Code: GPUB ISSN: 0000-0019 Jrnl Group: Commentary; Business
|
|
Abstract: Genevieve Stuttaford reviews "The Cuckoo's Egg: Tracking a Spy
|
|
through the Maze of Computer Espionage," by Cliff Stoll.
|
|
Subjects: Nonfiction; Computer crime
|
|
Names: Stoll, Clifford
|
|
Type: Book Review-Favorable
|
|
Length: Short (1-9 col inches)
|
|
|
|
89078212
|
|
Title: Computer Viruses
|
|
Authors: Vasilyev, Dmitri; Novikov, Yevgeni
|
|
Journal: Soviet Life Iss: 7 Date: Jul 1989 pp: 37-39
|
|
Jrnl Code: GSOV ISSN: 0038-5549 Jrnl Group: Lifestyles;
|
|
Commentary
|
|
Abstract: The increased use of computers in the Soviet Union brings problems
|
|
familiar to Western users, especially computer viruses. Soviet
|
|
computer scientists Alfred Ailamazyan and Sergei Abramov are
|
|
interviewed about Soviet computer viruses and computer security.
|
|
Photograph
|
|
Subjects: Computer crime; Security systems; Union of Soviet Socialist
|
|
Republics--USSR
|
|
Names: Ailamazyan, Alfred; Abramov, Sergei
|
|
Type: Interview
|
|
Length: Long (31+ col inches)
|
|
|
|
89077225
|
|
Title: The Computer Contagion
|
|
Authors: Kenyon, David M
|
|
Journal: ABA Journal Vol: 75 Date: Jun 1989 pp: 116-117
|
|
Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business
|
|
Abstract: Computer viruses can spread from computer to computer, including
|
|
those in law firms. Strategies for protecting against computer
|
|
viruses are discussed, including establishing a policy of who may
|
|
use the firm's computers and making paper backups of important
|
|
material. Illustration
|
|
Subjects: Computer crime; Legal professions
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89076390
|
|
Title: Viruses, Worms, Trojans, and Bombs
|
|
Authors: Stover, Dawn
|
|
Journal: Popular Science Vol: 235 Iss: 3 Date: Sep 1989 pp: 59-62+
|
|
Jrnl Code: GPOS ISSN: 0161-7370 Jrnl Group: SciTech
|
|
Abstract: Viruses, worms, trojans, and bombs are electronic infections that
|
|
make computers sick. They have actually crippled huge government
|
|
networks as well as PCs. Purported preventions, including "vaccine"
|
|
programs and protective hardware, are examined. Illustration
|
|
Subjects: Computer crime; Computers & computer technology
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89074853
|
|
Title: Your Family Finances: "Credit Doctors" Can Hurt You
|
|
Authors: Plawin, Paul; Kainen, Bertha; Buttenheim, Alison
|
|
Journal: Changing Times Vol: 43 Iss: 8 Date: Aug 1989 pp: 78
|
|
Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Business;
|
|
Socio/Environmental
|
|
Abstract: People can steal data from a computerized file and sell the names
|
|
and information of people with good credit to people with the same
|
|
name whose credit is poor. Illustration
|
|
Subjects: Credit; Computer crime; Theft
|
|
Type: Commentary
|
|
Length: Short (1-9 col inches)
|
|
|
|
89070945
|
|
Title: A Secret No More
|
|
Authors: Kerr, Susan
|
|
Journal: Datamation Vol: 35 Iss: 13 Date: Jul 1, 1989 pp: 53-55
|
|
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech
|
|
Abstract: As distributed processing and applications such as electronic mail
|
|
grow, companies are concerned about data security, and they are
|
|
evaluating their vulnerability to electronic breaches. Data
|
|
encryption is one solution. Illustration
|
|
Subjects: Security systems; Computer crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89070893
|
|
Title: 'Virus' Attacks ANPA's Computer
|
|
Authors: Fitzgerald, Mark
|
|
Journal: Editor & Publisher Vol: 122 Iss: 26 Date: Jul 1, 1989 pp: 34
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: A computer virus recently contaminated all of the software in the
|
|
American Newspaper Publishers Association's desktop publishing
|
|
laboratory. Three virus cleaners were used to disinfect the
|
|
laboratory.
|
|
Subjects: Newspapers; Computers & computer technology; Computer crime;
|
|
American Newspaper Publishers Association
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89066677
|
|
Title: Software At-A-Glance: Virex
|
|
Authors: Gordon, Molly
|
|
Journal: Electronic Learning Vol: 8 Iss: 8 Date: Jun 1989 pp: 51
|
|
Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech
|
|
Abstract: Molly Gordon reviews Virex, a software package that detects and
|
|
repairs contamination by scores, nVir, and Peace viruses. The
|
|
package, for the Macintosh Plus/SE/II, is from HJC Software.
|
|
Subjects: Software; Computer crime Products: HJC Virex
|
|
Companies: HJC Software
|
|
Type: Product Review-Favorable
|
|
Length: Short (1-9 col inches)
|
|
|
|
89062041
|
|
Title: Colleges Seem Vulnerable to Legal Actions Arising from Computer
|
|
Viruses
|
|
Authors: Moore, Thomas H
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 42 Date: Jun 28, 1989
|
|
pp: A1, A20
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: A report issued by the American Council on Education and the United
|
|
Educators Insurance Risk Retention Group concludes that colleges and
|
|
universities are unusually vulnerable to lawsuits arising from
|
|
computer viruses and must take steps to reduce their liability. The
|
|
report is examined.
|
|
Subjects: Computer crime; Lawsuits; Colleges & universities; Liability
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89059272
|
|
Title: Let's Get Reckless
|
|
Authors: Gaines, Donna
|
|
Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15
|
|
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
|
|
Abstract: The developing social importance of computer viruses is explored.
|
|
Computer hacking and computer viruses have penetrated the
|
|
consciousness of the mainstream media and are being countered by
|
|
federal legislation. Illustration
|
|
Subjects: Computer crime; Social conditions & trends
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89053593
|
|
Title: The Missing Lists
|
|
Authors: Steacy, Anne
|
|
Journal: Maclean's Vol: 102 Iss: 20 Date: May 15, 1989 pp: 58
|
|
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
|
|
Abstract: A series of break-ins at the offices of Toronto Canada-based
|
|
environmental groups involving computer lists and data banks have
|
|
raised suspicions that Canadian government organizations might be
|
|
looking for information to discredit the groups. Photograph
|
|
Subjects: Crime & criminals; Computer crime; Environment; Activism; Toronto
|
|
Ontario Canada
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89049351
|
|
Title: The Tampa Media-Espionage Case
|
|
Authors: Hoyt, Michael
|
|
Journal: Columbia Journalism Review Vol: 28 Iss: 1 Date: May 1989
|
|
pp: 27-31
|
|
Jrnl Code: GCJR ISSN: 0010-194X Jrnl Group: Academic
|
|
Abstract: Michael Shapiro, assistant news director at WTSP-TV in St.
|
|
Petersburg Fl and computer hacker, is accused of using his computer
|
|
modem at home to break into his competitor's files. The case is
|
|
discussed. Photograph
|
|
Subjects: Computer crime; Television news; Competition; Journalism &
|
|
journalists
|
|
Names: Shapiro, Michael
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89046556
|
|
Title: Avoiding Virus Hysteria
|
|
Authors: Honan, Patrick
|
|
Journal: Personal Computing Vol: 13 Iss: 5 Date: May 1989 pp: 84-92
|
|
Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech
|
|
Abstract: Common-sense strategies and a few good tools can help keep a
|
|
company's data and equipment safe from computer viruses, time bombs
|
|
or Trojan horses. Illustration; Photograph
|
|
Subjects: Computer crime; Computers & computer technology; Security systems
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89037736
|
|
Title: Student Acted Alone in Spreading Computer 'Worm,' Cornell Report
|
|
Says
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 30 Date: Apr 5, 1989
|
|
pp: A18
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: A report from Cornell University says that Robert T. Morris Jr, a
|
|
graduate student at the university, acted alone in November 1988
|
|
when he released on a national research network a computer program
|
|
that slowed or halted as many as 6,000 computers in the US.
|
|
Subjects: Computer crime; Colleges & universities; Students; Cornell
|
|
University
|
|
Names: Morris, Robert T Jr
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89035435
|
|
Title: Computer Viruses: An Epidemic Real or Imagined?
|
|
Authors: Chaffin, Ellen
|
|
Journal: Electronic Learning Vol: 8 Iss: 6 Date: Apr 1989 pp: 36-37
|
|
Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech
|
|
Abstract: Computer viruses have become an unpleasant fact of life. Tips are
|
|
given to combat the problems a computer virus may cause. Much of
|
|
the damage done by the virus is caused by of carelessness.
|
|
Illustration
|
|
Subjects: Computer crime; Computers & computer technology
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89031460
|
|
Title: German Computer Spy Ring Broken
|
|
Authors: Marshall, Eliot
|
|
Journal: Science Vol: 243 Iss: 4898 Date: Mar 24, 1989 pp: 1545
|
|
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic
|
|
Abstract: The arrest of three West German techno-vandals in March, 1989 ended
|
|
a two year investigation of security breaches of computers from a US
|
|
military base in Japan to a laboratory in California to several
|
|
German universities and research institutes.
|
|
Subjects: Computer crime; Espionage; Investigations; West Germany
|
|
Names: Hess, Markus
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89027847
|
|
Title: Art ATMs Easy Targets for Crooks?
|
|
Authors: Cole, Patrick; Levine, Jonathan B
|
|
Journal: Business Week Iss: 3094 Date: Mar 6, 1989 pp: 30
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Computer systems that monitor electronic transfers are becoming an
|
|
easy target for criminal operations. Several recent incidents are
|
|
described. Photograph
|
|
Subjects: Computer crime; Banks & banking; Automated teller machines--ATM;
|
|
Crime & criminals
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89026462
|
|
Title: Information (Mis)management
|
|
Authors: Thompson, Tom
|
|
Journal: Byte Vol: 14 Iss: 3 Date: Mar 1989 pp: MAC 2
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: Computer viruses and worms can destroy data and infect computer
|
|
systems. Safeguards are necessary so that viruses do not imperil
|
|
the free exchange of information among programmers who fear
|
|
infection.
|
|
Subjects: Computers & computer technology; Computer crime; Sabotage
|
|
Type: Editorial
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89025356
|
|
Title: The Global Village under Seige--We've Met the Enemy and He Is Us
|
|
Authors: Thornburg, David D
|
|
Journal: Compute! Vol: 11 Iss: 3 Date: Mar 1989 pp: 13
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: While personal workstations are good, interconnecting with a network
|
|
can provide advantages. Networking is now being challenged by fears
|
|
of computer viruses.
|
|
Subjects: Computer networks; Computers & computer technology; Computer crime
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89018587
|
|
Title: The Virus Cure
|
|
Authors: McAfee
|
|
Journal: Datamation Vol: 35 Iss: 4 Date: Feb 15, 1989 pp: 29-40
|
|
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business
|
|
Abstract: Computer viruses are plaguing many of the large computer networks.
|
|
Over 300 major virus attacks happened in the first seven months of
|
|
1988. Advice on how to prevent viruses and recover when they occur
|
|
is given. Illustration
|
|
Subjects: Computer crime; Computer networks; Computers & computer technology;
|
|
Viruses
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89016758
|
|
Title: Student Linked to Computer 'Virus' Granted Immunity by U. S.
|
|
Attorney
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 22 Date: Feb 8, 1989
|
|
pp: A2
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Robert T. Morris, the Cornell University student believed to be the
|
|
creator of the computer "virus" that paralyzed a national research
|
|
network in 1988, has been granted limited immunity by the US
|
|
Attorney's office in Syracuse New York.
|
|
Subjects: Computer crime
|
|
Names: Morris, Robert T
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
89014959
|
|
Title: Avoid It Like the Plague: Protecting Yourself from Computer Virus
|
|
Attacks
|
|
Authors: Esters, Stephanie D
|
|
Journal: Black Enterprise Vol: 19 Iss: 7 Date: Feb 1989 pp: 55-56
|
|
Jrnl Code: BEN ISSN: 0006-4165 Jrnl Group: Business;
|
|
Socio/Environmental
|
|
Abstract: Protecting computer systems against viruses has become a top
|
|
priority for government, academia and business. Computer crime is
|
|
responsible for $5 billion in losses annually. Several antiviral
|
|
programs are described.
|
|
Subjects: Computers & computer technology; Computer crime; Software
|
|
Type: General Information
|
|
Length: Long (31+ col inches)
|
|
|
|
89012668
|
|
Title: Blanket Security
|
|
Authors: Perdue, Lewis
|
|
Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 164-167
|
|
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
|
|
Abstract: Computer crime is a serious problem and PC users are fighting back
|
|
with extra-strength security precautions. Physical protection, data
|
|
encryption and passwords are a few ways to protect these computers.
|
|
Table; Illustration
|
|
Subjects: Computer crime; Personal computers; Security systems
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89012658
|
|
Title: Chicken Pox or Chicken Little?
|
|
Authors: Dolce, Mary A
|
|
Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 280
|
|
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
|
|
Abstract: The fear of computer viruses has been somewhat misleading. Software
|
|
saboteurs prefer to attack large companies rather than PC users in
|
|
general. Users can take some simple precautions against the threat
|
|
of destructive software.
|
|
Subjects: Software; Computer crime
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89007662
|
|
Title: Computer Flu is After You
|
|
Authors: Boudette, Neal E.
|
|
Journal: Industry Week Vol: 238 Iss: 2 Date: Jan 16, 1989 pp: 39-40
|
|
Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business
|
|
Abstract: Companies shouldn't think themselves immune to computer viruses.
|
|
Companies must reevaluate their computer security policies and
|
|
proceedures, and use consultants to fix problems before their
|
|
computer systems catch a virus. Illustration
|
|
Subjects: Computer crime; Business & industry; Security systems
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
89006239
|
|
Title: Drop the Phone
|
|
Authors: Anonymous
|
|
Journal: Time Vol: 133 Iss: 2 Date: Jan 9, 1989 pp: 49
|
|
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
|
|
Abstract: Kevin Mitnick, who has a long record of computer crime, is currently
|
|
facing a possible 30 years in prison and a $750,000 fine for several
|
|
crimes covered by a new federal law that prohibits breaking into an
|
|
interstate computer network for criminal purposes. Mitnick commits
|
|
most of his crimes via the telephone. Photograph
|
|
Subjects: Computer crime; Crime & criminals; Computer networks; Telephones
|
|
Names: Mitnick, Kevin
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
89004747
|
|
Title: The Data Bandits
|
|
Authors: Adney, William M.; Kavanagh, Douglas E.
|
|
Journal: Byte Vol: 14 Iss: 1 Date: Jan 1989 pp: 267-270
|
|
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
|
|
Abstract: Possible security threats to a LAN are discussed, including viruses,
|
|
data theft and accidental data destruction. Tips on making a LAN
|
|
more secure are offered. Photograph
|
|
Subjects: Computer networks; Computer crime; Security systems
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89004699
|
|
Title: ComputerScan: Antiviral Shields
|
|
Authors: Branwyn, Gareth; Clabaugh, Gavin
|
|
Journal: Futurist Vol: 23 Iss: 1 Date: Jan 1989 pp: 38
|
|
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
|
|
SciTech
|
|
Abstract: Branwyn and Clabaugh review InterPath's new anti-computer virus
|
|
shield C-4, short for Cylene-4.
|
|
Subjects: Software; Computer crime Products: InterPath C-4
|
|
Companies: InterPath Corp
|
|
Type: Product Review-Favorable
|
|
Length: Short (1-9 col inches)
|
|
|
|
89003483
|
|
Title: Disease of the Year: Illness of Glitch
|
|
Authors: Vogel, Shawna
|
|
Journal: Discover Vol: 10 Iss: 1 Date: Jan 1989 pp: 64-66
|
|
Jrnl Code: GDIS ISSN: 0274-7529 Jrnl Group: SciTech
|
|
Abstract: The most talked-about virus of 1988 infects computers, not
|
|
organisms. Computer viruses are programs that destroy other
|
|
programs and data by incessantly replicating themselves, similar to
|
|
a viral infection in the body. Illustration; Photograph
|
|
Subjects: Computer crime; Computer programming & languages; Viruses
|
|
Names: Morris, Robert Jr
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
89000654
|
|
Title: Revenge of the Nerds
|
|
Authors: Martin, Nicholas
|
|
Journal: Washington Monthly Vol: 20 Iss: 12 Date: Jan 1989 pp: 21-24
|
|
Jrnl Code: GTWM ISSN: 0043-0633 Jrnl Group: Commentary
|
|
Abstract: The real problem with computer viruses, like the one recently
|
|
created by Robert T. Morris Jr, isn't the brilliant programmers,
|
|
but the easy access to classified data and the dearth of security
|
|
measures. Illustration
|
|
Subjects: Computer crime; Computers & computer technology; Security systems;
|
|
Classified information
|
|
Names: Morris, Robert T Jr
|
|
Type: Commentary
|
|
Length: Long (31+ col inches)
|
|
|
|
88178609
|
|
Title: Greater Awareness of Security in Aftermath of Computer Worm
|
|
Authors: Shulman, Seth; Palca, Joseph
|
|
Journal: Nature Vol: 336 Iss: 6197 Date: Nov 24, 1988 pp: 301
|
|
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech
|
|
Abstract: The recent attack of an unauthorized computer program upon thousands
|
|
of computer systems around the US using the ARPANET, Milnet and NSF
|
|
Net computer networks and the ensuing debate over the need for
|
|
increased security are described. Illustration
|
|
Subjects: Computers & computer technology; Computer crime; Security systems
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88178491
|
|
Title: Networked Computers Hit by Intelligent 'Virus'
|
|
Authors: Palca, Joseph; Shulman, Seth
|
|
Journal: Nature Vol: 336 Iss: 6195 Date: Nov 10, 1988 pp: 97
|
|
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech
|
|
Abstract: Thousands of people using the UNIX computer operating system were
|
|
infiltrated via electronic mail during Nov 1988. The virus, which
|
|
was created by Robert T. Morris, a graduate student in computer
|
|
science at Cornell University in Ithaca NY, is discussed.
|
|
Subjects: Computers & computer technology; Computer crime; Electronic mail
|
|
Names: Morris, Robert T Jr
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88174189
|
|
Title: Minding the Store: Part Two
|
|
Authors: Hirsch, Rudolph E
|
|
Journal: Public Relations Journal Vol: 44 Iss: 5 Date: May 1988 pp: 39
|
|
Jrnl Code: PRJ ISSN: 0033-3670 Jrnl Group: Business
|
|
Abstract: System unavailability due to human error or natural disasters is a
|
|
common computer-security problem. The best precaution against
|
|
system unavailability is duplexing, having two of a given component.
|
|
The process is described. (Part 2 of a series)
|
|
Subjects: Computers & computer technology; Software; Computer crime
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88165977
|
|
Title: The 25 Most Intriguing People: The Cyberpunk
|
|
Authors: Anonymous
|
|
Journal: People Weekly Vol: 30 Iss: 26 Date: Dec 26, 1988 pp: 50
|
|
Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles
|
|
Abstract: In the world of computer hackers, the "Cyberpunk" probes the
|
|
weaknesses in electronic security systems, breaking into computer
|
|
networks, altering data, and unleashing microchip mayhem.
|
|
Photograph
|
|
Subjects: Computer crime
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88162631
|
|
Title: Another Infection
|
|
Authors: Anonymous
|
|
Journal: Time Vol: 132 Iss: 24 Date: Dec 12, 1988 pp: 33
|
|
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
|
|
Abstract: Only five weeks after the Defense Department's Arpanet computer
|
|
network was infected by a computer virus, the Mitre Corp has warned
|
|
the Pentagon that the Milnet military information system has also
|
|
been violated.
|
|
Subjects: Computer crime; Computer networks; Department of Defense
|
|
Companies: Mitre Corp
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88159822
|
|
Title: The Viral Age
|
|
Authors: Hodges, Parker
|
|
Journal: Datamation Vol: 34 Iss: 24 Date: Dec 1, 1988 pp: 96
|
|
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business
|
|
Abstract: An editorial reflects on the vulnerability of computer networks to
|
|
viruses. Throughout history, crimes have grown naturally from
|
|
technology and have become definitive of an era.
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Type: Editorial
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88158631
|
|
Title: Look Out Virus-Spreaders!
|
|
Authors: Aycock, Heidi E. H.
|
|
Journal: Compute! Vol: 10 Iss: 12 Date: Dec 1988 pp: 7
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: A proposed bill in the US House of Representatives provides criminal
|
|
penalties and allows civil suits aginst people who affect, or could
|
|
affect, interstate or foreign commerce by inserting viruses in
|
|
computer systems.
|
|
Subjects: Computer crime; Laws & legislation
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88157268
|
|
Title: An Ounce of Prevention
|
|
Authors: Borts, Andrew D.; Zatz, Martin J.
|
|
Journal: inCider Vol: 6 Iss: 12 Date: Dec 1988 pp: 60-61
|
|
Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech
|
|
Abstract: Guidelines are given for avoiding a computer virus. A user should
|
|
resist the temptation to download directly to the hard drive to
|
|
lessen the chance of a virus.
|
|
Subjects: Computer crime; Computers & computer technology
|
|
Type: General Information
|
|
Length: Short (1-9 col inches)
|
|
|
|
88152319
|
|
Title: Security Officials Ask Researchers Not to Make 'Virus' Copies
|
|
Available
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988
|
|
pp: A1, A12
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Officials at the National Computer Security Center, a division of
|
|
the National Security Agency, have asked researchers not to share
|
|
copies of the computer-network virus that attacked 6,000 scientific
|
|
and academic computers recently.
|
|
Subjects: Computer crime; National Computer Security Center
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88152249
|
|
Title: Overreaction to External Attacks on Computer Systems Could Be More
|
|
Harmful than the Viruses Themselves
|
|
Authors: King, Kenneth M.
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988
|
|
pp: A36
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: The recent "virus" attack on computers linked to a major research
|
|
network may result in resistance to linking instututional computers
|
|
to networks, but these networks are important to scholars and
|
|
administrators. Illustration
|
|
Subjects: Computers & computer technology; Computer networks; Computer crime
|
|
Type: Commentary
|
|
Length: Long (31+ col inches)
|
|
|
|
88151032
|
|
Title: Computer Abuse: Chain Mail
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 309 Iss: 7577 Date: Nov 19, 1988 pp: 98-100
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
|
|
Abstract: Robert Morris used a "trap-door" in the Unix electronic mail program
|
|
to cause a chain reaction that brought thousands of computers to a
|
|
halt. Some lawyers feel that America's computer crime statutes
|
|
need to be examined.
|
|
Subjects: Computer crime; Laws & legislation; Computer programming &
|
|
languages; United States--US
|
|
Names: Morris, Robert
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88150295
|
|
Title: Computer 'Viruses' Are Seen as Hard to Stop on Open Academic
|
|
Networks
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
|
|
pp: A13, A18
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: The computer "virus" that recently infected research networks has
|
|
college administrators worried about whether a recurrence can be
|
|
prevented. Photograph
|
|
Subjects: Computers & computer technology; Colleges & universities; Computer
|
|
crime
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88150291
|
|
Title: Computer Infections Can Often Hide in Software and Then Start to
|
|
Spread
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
|
|
pp: A18
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Software viruses are hidden in programs, transferred to computer
|
|
memories when the programs are run, and then transferred again to
|
|
other disks or programs used in the infected computer.
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88150290
|
|
Title: A Professor Seeks a Universal Antidote
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
|
|
pp: A18
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: John Robert Cordani believes scientists can find the "theoretical
|
|
underpinnings" of computer viruses, and thus develop a universal
|
|
antidote.
|
|
Subjects: Computer crime
|
|
Names: Cordani, John Robert
|
|
Type: General Information
|
|
Length: Short (1-9 col inches)
|
|
|
|
88150289
|
|
Title: Chances of Catching Viruses Are Slim if Precautions Are Taken,
|
|
Experts Say
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
|
|
pp: A18
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Computer experts at Cornell University say that computer viruses may
|
|
not be entirely avoidable, but the chances of catching them are slim
|
|
if users take precautions.
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Type: General Information
|
|
Length: Short (1-9 col inches)
|
|
|
|
88149867
|
|
Title: Rapid Spread of Virus Confirms Fear about Danger to Computers
|
|
Authors: Nordwall, Bruce D.
|
|
Journal: Aviation Week & Space Technology Vol: 129 Iss: 20
|
|
Date: Nov 14, 1988 pp: 44
|
|
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: SciTech; Business
|
|
Abstract: The virus that infested several thousand computers in November 1988
|
|
confirms the growing concern about the security of computer
|
|
networks. The virus was reputedly spread by Cornell University
|
|
graduate student Robert T. Morris, Jr.
|
|
Subjects: Computer crime; Computers & computer technology; Security systems
|
|
Names: Morris, Robert T Jr
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88148517
|
|
Title: Worm Invades Computer Networks
|
|
Authors: Marshall, Eliot
|
|
Journal: Science Vol: 242 Iss: 4880 Date: Nov 11, 1988 pp: 855-856
|
|
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic
|
|
Abstract: Internet, the major computer network for researchers in the US and
|
|
overseas, was disrupted for two days last week due to the presence
|
|
of a computer virus. The virus and attempts by computer experts at
|
|
the University of California at Berkeley and the Massachusetts
|
|
Institute of Technology to cure it are examined.
|
|
Subjects: Computer crime; Computer networks; University of
|
|
California-Berkeley; Massachusetts Institute of Technology
|
|
Type: News
|
|
Length: Long (31+ col inches)
|
|
|
|
88144157
|
|
Title: The Assault on Data Security Is Getting a Lot of Attention
|
|
Authors: Manuel, Tom; Shandle, Jack; Naegele, Tobias
|
|
Journal: Electronics Vol: 61 Iss: 17 Date: Nov 1988 pp: 136-142
|
|
Jrnl Code: GELS ISSN: 0883-4989 Jrnl Group: SciTech
|
|
Abstract: There are two separate problems to be dealt with in safeguarding
|
|
data security: keeping outsiders off the system and preventing
|
|
disgruntled or criminally inclined employees from attacking it.
|
|
Restricting access is in some ways the hardest to accomplish.
|
|
Illustration; Photograph
|
|
Subjects: Computers & computer technology; Security systems; Computer crime;
|
|
Security personnel
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88131293
|
|
Title: Vengeance by 'Virus'
|
|
Authors: Lord, Lew; Stanglin, Douglas; Galloway, Joseph L.; Rosenberg,
|
|
Robert; Satchell, Michael; et al.
|
|
Journal: U.S. News & World Report Vol: 105 Iss: 13 Date: Oct 3, 1988
|
|
pp: 10
|
|
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
|
|
Abstract: Last week Donald Burleson, an insurance firm's director of computer
|
|
security, became the first person ever convicted of destroying
|
|
crucial data by implanting codes in computer programs. Burleson's
|
|
crime involved an early form of what are now known as "viruses."
|
|
Subjects: Computers & computer technology; Crime & criminals; Computer crime
|
|
Names: Burleson, Donald
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88127257
|
|
Title: Viruses and Trojans Strike--But Very Rarely
|
|
Authors: Getts, Judy
|
|
Journal: PC World Vol: 6 Iss: 10 Date: Oct 1988 pp: 72-74
|
|
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
|
|
Abstract: Much of the concern about computer viruses has been exaggerated.
|
|
Users who frequently download from bulletin boards or exchange
|
|
software via floppy disk are at higher risk. Steps users can take
|
|
to protect against viruses are outlined. Illustration
|
|
Subjects: Computer crime; Software
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88117361
|
|
Title: 'Virus Attacks'
|
|
Authors: Rosenberg, Jim
|
|
Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988
|
|
pp: 19pc, 40pc+
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: A contagion of about 40 computer viruses has prompted a concern
|
|
about high-tech hygiene for newspaper PC systems managers,
|
|
technicians and engineers.
|
|
Subjects: Newspapers; Personal computers; Computer crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88117355
|
|
Title: Avoiding Virus Infection
|
|
Authors: Fitzgerald, Mark
|
|
Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988 pp: 41pc
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: Although the Long Island "Newsday" may seem to be vulnerable to
|
|
viruses because it operates the Newsday Electronic Bulletin Board,
|
|
there have been no problems so far.
|
|
Subjects: Newspapers; Computer crime
|
|
Companies: Newsday
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88116399
|
|
Title: Tomorrow's Thieves
|
|
Authors: Albanese, Jay S.
|
|
Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 24-28
|
|
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
|
|
SciTech
|
|
Abstract: The advent of computers have provided the latest opportunity
|
|
resource for criminal misuse. Fraud will likely become the most
|
|
prevalent form of theft in the computer age. Photograph; Table
|
|
Subjects: Theft; Computer crime; Law enforcement
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88116380
|
|
Title: Computer Viruses: The "AIDS" of the Information Age?
|
|
Authors: Halal, William E.
|
|
Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 60
|
|
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
|
|
SciTech
|
|
Abstract: One solution to the problems posed by computer viruses is simply to
|
|
be careful when using computers and use safe computing procedures.
|
|
Subjects: Computer crime
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88115135
|
|
Title: On Your Computer: Where's the Viral Epidemic?
|
|
Authors: Frailey, Fred W.; Goldwasser, Joan; Willenbrink, Kristin
|
|
Journal: Changing Times Vol: 42 Iss: 9 Date: Sep 1988 pp: 98-99
|
|
Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Socio/Environmental;
|
|
Business
|
|
Abstract: Computer viruses are most commonly a shareware program that has been
|
|
downloaded from a bulletin board or software that someone passed on.
|
|
Subjects: Computer crime; Computers & computer technology
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88110258
|
|
Title: The New Office: An RX for Healthy Software
|
|
Authors: McCandless, Holloway
|
|
Journal: Working Woman Vol: 13 Iss: 9 Date: Sep 1988 pp: 33
|
|
Jrnl Code: WKW ISSN: 0145-5761 Jrnl Group: Lifestyles; Business
|
|
Abstract: One way companies can protect their software from computer viruses
|
|
is by keeping their system as isolated as possible.
|
|
Subjects: Computer crime; Software; Business & industry
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88106102
|
|
Title: Sick Computers
|
|
Authors: Welter, Therese R.
|
|
Journal: Industry Week Vol: 237 Iss: 4 Date: Aug 15, 1988 pp: 51-55
|
|
Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business
|
|
Abstract: Computer viruses, a form of electronic sabotage, are occurring more
|
|
frequently nowadays. To help control them, a careful policy needs
|
|
to be established on the use of electronic bulletin boards and
|
|
public domain software. Illustration
|
|
Subjects: Computers & computer technology; Security systems; Computer crime
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88103547
|
|
Title: Ex-Employee Sentenced in Cheyney U. Grade Case
|
|
Authors: Anonymous
|
|
Journal: Chronicle of Higher Education Vol: 34 Iss: 47 Date: Aug 3, 1988
|
|
pp: A2
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Joseph J. Johnson, a former employee of Cheyney State University
|
|
has been sentenced to 3 to 23 months in prison for changing the
|
|
grades of students who paid him to do so.
|
|
Subjects: Students; Crime & criminals; Colleges & universities; Computer
|
|
crime; Cheyney University
|
|
Names: Johnson, Joseph J
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88103071
|
|
Title: Is Your Computer Secure
|
|
Authors: Hafner, Katherine M.; Lewis, Geoff; Kelly, Kevin; Shao, Maria;
|
|
Hawkins, Chick; Angiolillo, Paul
|
|
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 64-72
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: America's information systems are alarmingly vulnerable to high-tech
|
|
bandits, hackers, disgruntled workers and natural disasters.
|
|
Moreover, as PCs proliferate, the problem can only grow worse.
|
|
Computer crime is examined. Photograph; Illustration; Graph
|
|
Subjects: Computers & computer technology; Computer crime; High tech
|
|
industries
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88103070
|
|
Title: How Uncle Sam's Cloak-And-Data Boys Are Fighting Back
|
|
Authors: Port, Otis
|
|
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 72
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Penetration of government computers--particularly military
|
|
systems--is a deadly serious matter for the National Security Agency
|
|
and for counterintelligence agents at the FBI. Photograph
|
|
Subjects: Computer crime; National security; Classified information; National
|
|
Security Agency
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88103057
|
|
Title: A German Hackers' Club that Promotes Creative Chaos
|
|
Authors: Schares, Gail
|
|
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 71
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Hackers with the Hamburg, West Germany-based Chaos Computer Club use
|
|
their computing skills to increase public access to information
|
|
instead of sabotaging databases. Members believe that access to
|
|
electronic information cost too much in Germany. Photograph
|
|
Subjects: Computers & computer technology; Computer crime; Chaos Computer Club
|
|
Names: Fix, Bernd
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88103041
|
|
Title: Editorials: Treat Computer Data Like the Crown Jewels
|
|
Authors: Anonymous
|
|
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 108
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: An editorial states that as the complex networks of computers built
|
|
by business and government assume more and more tasks, they produce
|
|
a whole new set of risks: computer viruses.
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Type: Editorial
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88101861
|
|
Title: Editorial License
|
|
Authors: Keizer, Gregg
|
|
Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 4
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: An editorial discusses the transmission and prevention of computer
|
|
viruses.
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Type: Editorial
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88101823
|
|
Title: Compute Specific--Off the Mac Wire
|
|
Authors: Aker, Sharon Zardetto
|
|
Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 49
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: A computer virus has been showing up on Macintosh systems that
|
|
destroys files and can randomly erase data. The outbreaks have
|
|
centered around Dallas and Washington DC.
|
|
Subjects: Computer crime; Computers & computer technology; Personal computers
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88092802
|
|
Title: Keeping Out of the Kaos Club
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 308 Iss: 7558 Date: Jul 9, 1988 pp: 78-79
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
|
|
Abstract: In response to ever-increasing occurrences of fraudsters, hackers
|
|
and viruses violating computer networks, the computer industry is
|
|
strengthening security measures for computer operating systems.
|
|
Photograph
|
|
Subjects: Computers & computer technology; Security systems; Computer crime
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88089057
|
|
Title: Impact
|
|
Authors: Thornburg, David D.
|
|
Journal: Compute! Vol: 10 Iss: 7 Date: Jul 1988 pp: 10
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: Viruses, small programs embedded inside other programs, have the
|
|
ability to replicate themselves and infect almost any program on a
|
|
disk, including parts of an operating system. Viruses are, at best,
|
|
nuisances and, at worst, they can damage computers.
|
|
Subjects: Computers & computer technology; Computer crime; Computer
|
|
programming & languages
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88084661
|
|
Title: Beware: It's Virus Season
|
|
Authors: Honan, Patrick
|
|
Journal: Personal Computing Vol: 12 Iss: 7 Date: Jul 1988 pp: 36
|
|
Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech
|
|
Abstract: An anonymous company is working with Panda Systems to eliminate the
|
|
software virus, dubbed the Sunnyvale Slug, which Panda Systems has
|
|
removed from all but one of the company's computers. Photograph
|
|
Subjects: Computer crime; Computers & computer technology
|
|
Companies: Panda Systems
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88075577
|
|
Title: Compute! Specific: Mac--Virus and Vaccine
|
|
Authors: Aker, Sharon Zardetto
|
|
Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 44
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: A computer virus is a little program that's usually buried in
|
|
another program; when the "host" program is run, your computer
|
|
system catches the virus. A specific Macintosh virus has surfaced,
|
|
but a cure has been found.
|
|
Subjects: Computer programming & languages; Computer crime
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88075550
|
|
Title: News & Notes: New PC Virus Innoculation
|
|
Authors: Karnes, Clifton
|
|
Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 81
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: Lasertrieve has announced a revolutionary new service and product
|
|
package called VirALARM. It is designed to protect a PC from
|
|
viruses by detecting infestation and alerting the user to their
|
|
existence early. Illustration
|
|
Subjects: Computers & computer technology; Computer crime
|
|
Companies: Lasertrieve
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88071494
|
|
Title: The Cost of Computer Crime
|
|
Authors: San Segundo, Gonzalo
|
|
Journal: World Press Review Vol: 35 Iss: 6 Date: Jun 1988 pp: 47
|
|
Jrnl Code: GWPR ISSN: 0195-8895 Jrnl Group: News
|
|
Abstract: The average net from a computer crime is about $220,000, while the
|
|
conventional bank robbery will bring in about $6,600. Only one in
|
|
100 cases of computer crimes is punished by law.
|
|
Subjects: Computer crime; White collar crime; Crime & criminals
|
|
Type: Commentary
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88070487
|
|
Title: "The Chairman" and His Board
|
|
Authors: Bock, Gordon; McWhirter, William
|
|
Journal: Time Vol: 131 Iss: 22 Date: May 30, 1988 pp: 45
|
|
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
|
|
Abstract: Gabriel Taylor, a clerk at the First National Bank of Chicago,
|
|
electronically transferred funds to accounts under assumed names in
|
|
Vienna. If the scheme had succeeded, the conspirators would have
|
|
gotten $68.7 million. Photograph
|
|
Subjects: Computer crime; Crime & criminals; Embezzlement
|
|
Names: Taylor, Gabriel
|
|
Companies: First National Bank of Chicago
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88068234
|
|
Title: Computer 'Virus' Hits First U.S. Newspaper
|
|
Authors: Fitzgerald, Mark
|
|
Journal: Editor & Publisher Vol: 121 Iss: 21 Date: May 21, 1988 pp: 22
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: A computer virus has invaded the "Providence Journal-Bulletin,"
|
|
making it the first newspaper to succumb to the unauthorized codes
|
|
which secretly penetrate systems and wreak havoc.
|
|
Subjects: Newspapers; Computer crime
|
|
Companies: Providence Journal-Bulletin
|
|
Type: General Information
|
|
Length: Medium (10-30 col inches)
|
|
|
|
88067609
|
|
Title: Scientists Track Hacker to Find Flaws in Systems
|
|
Authors: Turner, Judith Axler
|
|
Journal: Chronicle of Higher Education Vol: 34 Iss: 36 Date: May 18, 1988
|
|
pp: A16
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: Scientists at the Lawrence Berkeley Laboratory tracked a West German
|
|
computer hacker electronically for almost a year as he tried to
|
|
enter 450 computers, and invaded 30, throughout the US.
|
|
Subjects: Computer crime; West Germany; Lawrence Berkeley Laboratory
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88060581
|
|
Title: Compute! Specific: PC Virus
|
|
Authors: Karnes, Clifton
|
|
Journal: Compute! Vol: 10 Iss: 5 Date: May 1988 pp: 39
|
|
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
|
|
Abstract: Computer viruses insinuate themselves into an operating system, and
|
|
after a certain interval, do "something." So far, no viruses have
|
|
appeared on the IBM forums of CompuServe.
|
|
Subjects: Computers & computer technology; Software; Computer crime
|
|
Companies: IBM Corp
|
|
Type: News
|
|
Length: Short (1-9 col inches)
|
|
|
|
88053577
|
|
Title: When Bytes Bite Back
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 307 Iss: 7547 Date: Apr 23, 1988 pp: 68
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
|
|
Abstract: Costly problems in commercial computer systems are caused by
|
|
fraudsters, hackers, disgruntled employees, accidents and human
|
|
errors. Few companies have adequate network security. Illustration
|
|
Subjects: Computer crime; Computers & computer technology
|
|
Type: Feature
|
|
Length: Short (1-9 col inches)
|
|
|
|
88030286
|
|
Title: Spawning a Computer "Virus"
|
|
Authors: White, Ron
|
|
Journal: 80 Micro Iss: 98 Date: Mar 1988 pp: 16-18
|
|
Jrnl Code: GEIM ISSN: 0744-7868 Jrnl Group: SciTech
|
|
Abstract: "Core wars" are battles between rival programs for control of a
|
|
theoretical computer's operating system. The game is designed for
|
|
programmers to test their abilities against one another, but the
|
|
principles behind these programs are similar to those in computer
|
|
"viruses." Photograph
|
|
Subjects: Computer programming & languages; Games; Computer crime
|
|
Type: General Information
|
|
Length: Long (31+ col inches)
|
|
|
|
88023137
|
|
Title: Companies Say Unauthorized Modifications of Systems to Permit Remote
|
|
Entry Could Jeopardize Vendor Support
|
|
Authors: Rosenberg, Jim
|
|
Journal: Editor & Publisher Vol: 121 Iss: 8 Date: Feb 20, 1988 pp: 35, 37
|
|
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
|
|
Abstract: Unauthorized entry into remote classified advertising through
|
|
newspapers' computers may jeopardize vendor support for the
|
|
advertising.
|
|
Subjects: Fraud; Computers & computer technology; Computer crime; Newspapers
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88016993
|
|
Title: The Online Underworld
|
|
Authors: Scrogan, Len
|
|
Journal: Classroom Computer Learning Vol: 8 Iss: 5 Date: Feb 1988
|
|
pp: 58-60
|
|
Jrnl Code: GCCL ISSN: 0746-4223 Jrnl Group: SciTech
|
|
Abstract: Every educator who introduces kids to telecommunications should also
|
|
be aware of the illegal activities which might occur. Teachers need
|
|
to communicate the ethics of online behavior to students.
|
|
Subjects: Education & schools; Computer crime; Computer programming &
|
|
languages; Ethics
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88013032
|
|
Title: Fighting Computer Crime
|
|
Authors: Szabo, Joan C.
|
|
Journal: Nation's Business Vol: 76 Iss: 2 Date: Feb 1988 pp: 14
|
|
Jrnl Code: NAB ISSN: 0028-047X Jrnl Group: Business
|
|
Abstract: A new booklet from the SBA, "A Small Business Guide to Computer
|
|
Security," gives guidelines on how small business can protect their
|
|
computer operations.
|
|
Subjects: Computer crime; Small business; Small Business Administration--SBA
|
|
Type: Commentary
|
|
Length: Short (1-9 col inches)
|
|
|
|
88011465
|
|
Title: Crime in the Computer Age
|
|
Authors: Wood, Chris
|
|
Journal: Maclean's Vol: 101 Iss: 5 Date: Jan 25, 1988 pp: 28-30
|
|
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
|
|
Abstract: A discussion of computer crimes. Photograph
|
|
Subjects: Crime & criminals; Computers & computer technology
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
88010266
|
|
Title: Israeli University Offers Cure for Mysterious Computer 'Virus'
|
|
Authors: Watzman, Herbert M.
|
|
Journal: Chronicle of Higher Education Vol: 34 Iss: 19 Date: Jan 20, 1988
|
|
pp: A41
|
|
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
|
|
Abstract: A electronic 'virus' programmed to damage and destroy software has
|
|
been spreading across Israel. Israeli University is handing out a
|
|
cure for the 'virus' to those who need it.
|
|
Subjects: Computer crime; Israel; Israeli University
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|