180 lines
8.2 KiB
Plaintext
180 lines
8.2 KiB
Plaintext
|
|
87031153
|
|
Title: The Technobandits
|
|
Authors: Gibbs, Nancy R
|
|
Journal: Time Vol: 130 Iss: 22 Date: Nov 30, 1987 pp: 42-44
|
|
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
|
|
Abstract: The Charles McVey case highlights the problem of protecting secrets
|
|
in an open society. Because of stolen high-tech goods and secrets,
|
|
the US will insist on tighter enforcement and higher penalties for
|
|
violators that now exist.
|
|
Subjects: Crime & criminals; Computer crime; Smuggling; Espionage
|
|
Names: McVey, Henry
|
|
Type: News
|
|
Length: Long (31+ col inches)
|
|
|
|
87031026
|
|
Title: Computer Sabotage: Programmed to Sneeze
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 305 Iss: 7526 Date: Nov 28, 1987 pp: 90
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: Computer viruses are discussed. Almost every computer system is
|
|
vulnerable to viruses, which can crash programs or infect a memory
|
|
system. Catching a virus is easier than apprehending its creator.
|
|
Subjects: Computers & computer technology; Computer crime; Computer
|
|
programming & languages; Crime & criminals
|
|
Type: News
|
|
Length: Medium (10-30 col inches)
|
|
|
|
87029548
|
|
Title: Data Protection: Big Brother Is Being Watched
|
|
Authors: Anonymous
|
|
Journal: Economist Vol: 305 Iss: 7523 Date: Nov 7, 1987 pp: 63-66
|
|
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
|
|
Abstract: The Data Protection Act of 1984 is designed to look vigorously into
|
|
allegations of the misuse of personal data.
|
|
Subjects: Computer crime; Privacy; United Kingdom--UK
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
87018129
|
|
Title: Don't Tread on My Data
|
|
Authors: Elmer-DeWitt, Phillip
|
|
Journal: Time Vol: 130 Iss: 1 Date: Jul 6, 1987 pp: 84
|
|
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
|
|
Abstract: Richard Kusserow, after becoming inspector general for the
|
|
Department of Health and Human Services, decided to crack down on
|
|
computer fraud. In order to do this, however, there was an invasion
|
|
of privacy and the Fourth Amendment was violated. Photograph
|
|
Subjects: Privacy; Fraud; Computer crime; Investigations; Department of Health
|
|
& Human Services
|
|
Names: Kusserow, Richard
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
87015192
|
|
Title: Brady: Byte-ing the Hand that Feeds It
|
|
Authors: Brady, James
|
|
Journal: Advertising Age Vol: 58 Iss: 23 Date: Jun 1, 1987 pp: 48
|
|
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
|
|
Abstract: "Trojan horses," computer programs that enter a system disguised as
|
|
something important and then erase or scramble vital information,
|
|
are discussed. These renegade programs are held up as justification
|
|
for ignoring the computer craze.
|
|
Subjects: Computer crime; Computers & computer technology; Computer
|
|
programming & languages
|
|
Type: Commentary
|
|
Length: Long (31+ col inches)
|
|
|
|
87000399
|
|
Title: Last Word
|
|
Authors: Graybill, Christopher
|
|
Journal: Omni Vol: 9 Iss: 4 Date: Jan 1987 pp: 114
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: Computer crimes of a different sort than embezzlement, fraud, or
|
|
virus-dropping are portrayed in a satiric short story.
|
|
Subjects: Short stories
|
|
Type: Fiction
|
|
Length: Medium (10-30 col inches)
|
|
|
|
86042465
|
|
Title: No Tempest in a Teapot
|
|
Authors: Donlan, Thomas G
|
|
Journal: Barron's Vol: 66 Iss: 39 Date: Sep 29, 1986 pp: 14, 53
|
|
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
|
|
Abstract: The development of microspy has enhanced the electronic
|
|
eavesdropping industry. The use of microspy by government
|
|
agencies--the NSA and the CIA--in keeping tabs on private industry
|
|
is discussed. Illustration
|
|
Subjects: Electronic eavesdropping; Intelligence gathering; Business &
|
|
industry; Computer crime; National Security Agency; Central
|
|
Intelligence Agency--CIA
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
86039447
|
|
Title: House Panel Moves against Computer Fraud
|
|
Authors: Cohodas, Nadine
|
|
Journal: Congressional Quarterly Weekly Report Vol: 44 Iss: 19
|
|
Date: May 10, 1986 pp: 1038
|
|
Jrnl Code: GCQW ISSN: 0010-5910 Jrnl Group: Commentary; News
|
|
Abstract: The House Judiciary Committee on May 6, 1986 approved legislation to
|
|
help continue the federal government's crackdown on computer crime.
|
|
The legislation is examined.
|
|
Subjects: Laws & legislation; Computer crime; Federal government; House of
|
|
Representatives-Judiciary, Committee on the
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
86031448
|
|
Title: Are Data Bases a Threat to National Security?
|
|
Authors: Starr, Barbara
|
|
Journal: Business Week Iss: 2975 Date: Dec 1, 1986 pp: 39
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: The Pentagon intends to add new controls over the contents of
|
|
computer data bases for fear of information reaching the Soviet
|
|
bloc. Computer data bases are goldmines for foreign agents
|
|
interested in technical and economic information. Illustration
|
|
Subjects: Classified information; Computer crime; Data bases; Government
|
|
regulation; Department of Defense
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
86026687
|
|
Title: A Victory for the Pirates?
|
|
Authors: Elmer-DeWitt, Philip
|
|
Journal: Time Vol: 128 Iss: 16 Date: Oct 20, 1986 pp: 86
|
|
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
|
|
Abstract: In an attempt to halt software piracy, the makers of
|
|
personal-computer software began copy protection measures. However,
|
|
consumer complaints that they are inconvenient, has caused the
|
|
companies to give up and remove them. Illustration
|
|
Subjects: Computers & computer technology; Personal computers; Software;
|
|
Computer crime; Piracy
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
86015548
|
|
Title: Software Pirates Beware: Berkin Is Out for Blood
|
|
Authors: Ticer, Scott
|
|
Journal: Business Week Iss: 2951 Date: Jun 16, 1986 pp: 83
|
|
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
|
|
Abstract: Geoffrey A. Berkin, an associate general counsel at personal
|
|
computer software publisher Ashton-Tate Inc is profiled. Berkin's
|
|
efforts have earned Ashton-Tate the reputation of champion against
|
|
domestic piracy. Photograph
|
|
Subjects: Biographical profiles; Company profiles; Computer crime
|
|
Names: Berkin, Geoffrey A
|
|
Companies: Ashton-Tate Corp
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|
|
|
|
86014490
|
|
Title: 'Star Wars' Crime: New Threat to Corporate Security
|
|
Authors: McCartney, Laton
|
|
Journal: Business Month Vol: 127 Iss: 6 Date: Jun 1986 pp: 85-88
|
|
Jrnl Code: DMI ISSN: 0892-4090 Jrnl Group: Business
|
|
Abstract: Satellite espionage is a new and highly sophisticated kind of
|
|
computer larceny that could have disastrous consequences. Although
|
|
most satellites are built with some security measures, all of them
|
|
are vulnerable to interception or disruption by someone who knows
|
|
where the satellite is located, the frequency it uses for
|
|
transmission and the sender's code. Illustration
|
|
Subjects: Computers & computer technology; Computer crime; Satellites;
|
|
Espionage
|
|
Type: Feature
|
|
Length: Long (31+ col inches)
|
|
|
|
86014067
|
|
Title: Continuum: Computer Virus
|
|
Authors: Gross, Steve
|
|
Journal: Omni Vol: 8 Iss: 9 Date: Jun 1986 pp: 35
|
|
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
|
|
Abstract: The traumas a computer virus can cause for a computer owner are
|
|
discussed. With the increasing use of computer bulletin boards,
|
|
killer programs are a threat to business and personal computer
|
|
systems alike.
|
|
Subjects: Computers & computer technology; Computer crime; Software
|
|
Type: Feature
|
|
Length: Medium (10-30 col inches)
|