About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Hacker Zines
CERT
CHAL
CHAOS
CIAC
CPD
CPSR
CRH
CWD
CuD
CuD/A
EFF
LOL
MOD
Miscellaneous Phreak and Hacker Zines
NIA
RISKS
UXU
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Intro to Biblio and Resources Moderators' Corner,


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.
A


Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)


Moderators: Jim Thomas and Gordon Meyer ([email protected])


CONTENTS, #3.36 ( October 12, 1991)

Subject: File 1-- Intro to Biblio and ResourcesModerators' Corner

Subject: File 2-- General CU-Related Bibliography

Subject: File 3-- Dissertations and Theses

Subject: File 4-- General On-Line and Print Resources

Subject: File 5-- Misc. Books for Fun Reading


Issues of CuD can be found in the Usenet alt.society.cu-digest news

group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,

and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)

789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),

chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of

Chicago email server, send mail with the subject "help" (without the

quotes) to [email protected].


COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing

information among computerists and to the presentation and debate of

diverse views. CuD material may be reprinted as long as the source

is cited. Some authors do copyright their material, and they should

be contacted for reprint permission. It is assumed that non-personal

mail to the moderators may be reprinted unless otherwise specified.

Readers are encouraged to submit reasoned articles relating to the

Computer Underground. Articles are preferred to short responses.

Please avoid quoting previous posts unless absolutely necessary.


DISCLAIMER: The views represented herein do not necessarily represent

the views of the moderators. Digest contributors assume all

responsibility for ensuring that articles submitted do not

violate copyright protections.


----------------------------------------------------------------------


Date: 12 Oct 91 11:21:19 CDT

From: Moderators <[email protected]>

Subject: Intro to Biblio and ResourcesModerators' Corner


We continually receive requests for information about studies, 'zines

and people doing research on cyber issues. The number of works

appearing in the past two years has dramatically increased. Below is a

select bibliography of some of the oft-cited works. We tried to be

representative rather than inclusive, and selected articles, stories,

or publications that include references to other works or that are

considered classics and must be read to understand the CU. Some

readers may questions the selection or why we excluded particular

items in favor of others. If any glaring omissions occur, send over

your choices and we will add a supplement in a few weeks.


------------------------------


Date: 12 Oct 91 11:21:19 CDT

From: Moderators <[email protected]>

Subject: General CU-Related Bibliography


The following list is not intended to be exhaustive, but reflects some

of the basic resource literature relevant to the Computer Underground

and related culture. Journalists specializing in media coverage of the

topic include Joe Abernathy of the Houston Chronicle, John Markoff of

the New York Times, and John Schnieder of Newsweek, and Adam Gaffin,

of the Middlesex News (Framingham, Mass). All are accessible on

internet. Susan Ross ([email protected]) is currently

comparing Canadian and U.S. civil rights laws as they pertain to

cyberspace.


Allman, William F. 1990. "Computer Hacking goes on Trial." U.S. News

and World Report, January 22: 25.


Barlow, John Perry. 1990 (Forthcoming). "Crime and Puzzlement." Whole

Earth Review.


Bequai, August. 1978. Computer Crime. Lexington (Mass.): Lexington.


Bequai, August. 1987. Technocrimes. Lexington (Mass.): Lexington.


Bloombecker, Jay. 1988. Interview, Hour Magazine. NBC television,

November 23.


Brunner, John. 1989. The Shockwave Rider. New York: Ballantine.


Camper, John. 1989. "Woman Indicted as Computer Hacker Mastermind."

Chicago Tribune, June 21: II-4.


Charles Ess. 1987. "Computers and Ideology: Limits of the Machine."

Quarterly Journal of Ideology. 11(2): 33-39.


"Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to Panic

over Computer Crime." New Statesman & Society, February 9: 27.


"Computer Expert's Son Cited as Virus Creator.' 1988. Chicago Tribune,

November 5: 1, 2.


"Computer Hacker Ring with a Bay Area Link." 1990. San Francisco

Chronicle, May 9: A-30.


"Computer Saboteur gets Probation." 1988. Chicago Tribune, Oct. 22: 4.


Conly, Catherine H. and J. Thomas McEwen. 1990. "Computer Crime." NIJ

Reports, 218(January/February): 2-7.


Conly, Catherine H. 1989. Organizing for Computer Crime Investigation

and Prosecution.


Cooley, Ronald B. 1984. "RICO: Modern Weaponry against Software

Pirates." Computer Law-Journal, 5(Fall): 143-162.


Denning, Dorothy E. 1990. "Concerning Hackers Who Break into

Computers Systems." Paper present at the National Computer Security

Conference, Washington, D.C., Oct. 1-4.


Edwards, Lynda. "Samurai Hackers." Rolling Stone, Sept. 19, 1991:

67-69.


Geertz, Clifford. 1973. The Interpretion of Cultures. New York: Basic

Books. 1973.


Gibson, William. 1984. Neuromancer. New York: Ace.


"Hacker, 18, Gets Prison for Fraud." 1989. Chicago Tribune, February

15: III-1.


Haffner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and

Hackers on the Computer Frontier. New York: Simon and Schuster.


Harper's Forum. 1990. "Is Computer Hacking a Crime? A Debate from the

Electronic Underground." Harper's, 280(March): 45-57.


Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The Process of

Criminalization: The Case of Computer Crime Laws." Criminology,

26(February): 101-126.


Hollnger, Richard C. 1990. "Hackers: Computer Heroes or Electronic

Highwaymen?" Paper presented at the American Society of Criminology

annual meetings, Baltimore, Nov. 7.


Jensen, Eric C. 198?. "An Electronic Soapbox: Computer Bulletin

Boards and the First Amendment." Federal Communications Law Journal,

39(3): 217-258.


Kane, Pamela. 1989. V.I.R.U.S. Protection: Vital Information

Resources under Siege. New York: Bantam.


Kling, Rob, and Suzanne Iocono. 1988. "The Mobilization of Support

for Computerization: The Role of Computerization Movements." Social

Problems, 35(June): 226-243.


Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to

Computer Security. Belleview (Wash.): Microsoft Press.


Langworthy, Robert H. 1989. "Do Stings Control Crime? An Evaluation

of a Police Fencing Operation." Justice Quarterly, 6(March): 27-45.


Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution.

Garden City: Doubleday.


Levy, Steven. 1990. Cloak and Dagger.


Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."

New York Times, April 4, A1, A11.


Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."

New York Times, April 4, A1, A11.


Markoff, John. 1990b. "Drive to Counter Computer Crime Aims at

Invaders." The New York Times, June 3: 1, 21.


Marx, Gary T. 1988a. Undercover: Police Surveillance in America.

Berkeley: University of California Press.


Marx, Gary T. 1988b. "The Maximum Security Society." Deviance et

Societe, 12(2): 147-166.


Marx, Gary T., and Nancy Reichman. 1985. "Routinizing the Discovery

of Secrets: Computers as Informants." Software Law Journal, 1(Fall):

95-121.


McEwen, J. Thomas. 1989. Dedicated Computer Crime Units. Washington

D.C.: National Institute of Justice.


Meyer, Gordon R. "Hackers, Phreakers, and Pirates: The Semantics of

the Computer Age." 1989. Pp. 74-82 in P. Kane, V.I.R.U.S. Protection:

Vital Information Resources under Siege. New York: Bantam.


Meyer, Gordon R. and Jim Thomas. 1989. "Role Differentiation in the

computer underground." Paper presented at the Society for the Study of

Social Problems annual meetings, Berkeley, August.


Meyer, Gordon R. 1989a. The Social Organization of the computer

underground. Unpublished Masters Thesis, Northern Illinois University.


Michalowski, Raymond J. and Erdwin H. Pfuhl. 1990 (forthcoming).

"Technology, Property, and Law: The Case of Computer Crime."

Contemporary Crisis.


Pope, Kyle, 1990. "U.S. Computer Investigation Targets Austinites."

Austin-American Statesman, March 17, Pp A-1, A-12.


Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles

Scribner's Sons.


Pfuhl, Erdwin H. 1987. "Computer Abuse: Problems of Instrumental

Control." Deviant Behavior, 8(2): 113-130.


Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box." Esquire,

76(October): 116-1125, 222-226.


Rosenblatt, Kenneth. 1990. "Deterring Computer Crime." Technology

Review, 93(FebruaryMarch): 34-40.


Sandza, Richard. 1984. "Revenge of the Hackers." Newsweek,

104(December 10): 25.


Sandza, Richard. 1984. "The Night of the Hackers." Newsweek,

104(November 12): 17-18.


Schwartz, Eddie. 1988. "Special on 'Computer Hacking.'" WGN Radio,

Sept 27.


Schwartz, John. 1990. "The Hacker Dragnet: The Feds Put a Tail on

Computer Crooks--and Sideswipe a few Innocent Bystanders." Newsweek,

April 30: 50.


Scientific American. 1991. Special Issue: How to Work, Play and

Thrive in Cyberspace. September.


Sterling, Bruce. 1988. Islands in the Net. New York: Ace Books.


Sterling, Bruce. Forthcoming. The Hacker Crackdown: The True Story of

the Digital Dragnet of 1990 and the Start of the Electronic Frontier

Foundation.


Stoll, Clifford. 1989. The Cuckoo's Egg: Tracking a Spy through the

Maze of Computer Espionage. New York: Doubleday.


Thomas, Jim and Gordon R. Meyer. 1990. "(Witch)Hunting for the

Computer Underground: Joe McCarthy in a Leisure Suit." The Critical

Criminologist, 2(September): 7-8, 19-20.


Thomas, Jim, and Gordon R. Meyer. 1990a (forthcoming). "The Baudy

World of the Byte Bandit: A Postmodernist Interpretation of the

Computer Underground." In F. Schmalleger (ed.), Computers in Criminal

Justice. Bristol (Ind.): Wyndham Hall.


Thomas, Jim, and Gordon R. Meyer. 1990b. "In Defense of the Computer

Underground: The End of the Frontier?" Paper presented to the American

Society of Criminology annual conference, Baltimore (November).


Tompkins, Joseph B., Jr., and Linda A. Mar. 1986. "The 1984 Federal

Computer Crime Statute: A Partial Answer to a Pervasive Problem."

Computer-Law Journal, 6(Winter): 459-481.


Van, John. 1989. "Oddballs no More, Hackers are now a Threat."

Chicago Tribune, March 5, IV: 4.


Winter, Christine. 1988. "Virus Infects Huge Computer Network."

Chicago Tribune, November 4, 1, 18.


"Yes, You Sound very Sexy, but I Really Need a Probation Officer."

1989. Chicago Tribune, June 13, 10.


Zablit, Jocelyne. 1989. "Fraud Sweep Nabs 2 Michigan Teens in

Computer Ring." Detroit Free Press, 25 May: 1, 18.


------------------------------


Date: 12 Oct 91 11:21:19 CDT

From: Moderators <[email protected]>

Subject: Dissertations and Theses


The following come from International Dissertation Abstracts and from

persons who responded to our request for information on theses. The

dissertation list should be fairly complete. It excludes works limited

to computer crime or computer-mediated communication (contact Bitnet's

CMC newsgroup for information on CMC). The thesis list is incomplete

because of the relatively low number of institutions responding. But,

judging from bibliographies and discussions, there seem to be

relatively few CU-related theses. ("Dissertations" are normally done

for a PhD, and "theses" are written for a Master's degree).


++++++++++++++++++++++++

DISSERTATIONS

++++++++++++++++++++++++


Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION:

ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director:

none listed). University of California, Berkeley. 186 pp. Order No.

DA 8916665.


Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF

RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F.

Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976.


Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS

AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova

University. 133 pp. Order No. DA 9022334.


Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER

INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of

Arizona. 377 pp. Order No. DA 8217495


Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE

DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS.

(Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA

8918795.


Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS.

(Director: Malur K. Sundareshan). The University of Arizona. 282 pp.

Order No. DA 8702350.


Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION.

(Chair: David G. Cantor). University of California, Los Angeles. 202

pp. Order No. DA 9033944


Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER

COMMUNICATION PARTNERS (University of Utah). Contact: [email protected]


++++++++++++++++++++++++

MASTERS' THESES

++++++++++++++++++++++++


Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE

COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois

University. Contact: Gordon Meyer: "[email protected]"


Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND

PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop

University. 109 pp. Order No. MA 132853


Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY.

(Major Professor: Marino J. Niccolai). University of South Alabama.

190 pp. Order No. ??).


++++++++++++++++++++++++

WORKS IN PROGRESS

++++++++++++++++++++++++


(The following include projects in the planning stage as well as

those nearing completion)


William Curran (Arizona State University). Writing a Masters Thesis on

the introduction of wide area and local nets into the Soviet Union,

combining technological and sociological analysis that summarizes the

changes and prospects for early nineties. Contact:

[email protected]


Mark Smith (Sociology, University of California, Los Angeles).

Dissertation (in progress) that focuses on the power and politics of the

"information society". Recurring themes include the role of time/space

compression and surveillance in society. Significant influences include

David Harvey, Michel Foucault, Mark Poster, Herbert expand. One issue

includes the clash between Enlightenment rhetoric and post-modern

technology. Contact: [email protected]


Peter S. Markham (University of Melbourne, Dept. of Criminology).

Masters' Thesis in progress on a comparative study of the

Criminalisation of Computer Misuse in the United States, United Kingdom

and Australia. Contact: [email protected]


Elizabeth M. Reid (University of Melbourne). Supervisor: Donna

Merwick. Honours Thesis on computer-Mediated Communication

communication processes in synchronous conferencing, including

computer networks, internet, and electronic mail. The focus is on

cultural themes of communication, including power, interpreting social

contexts, socialization and learning, from a deconstructionist

perspective. ((Moderators' note: We've read a draft, and it's

first-rate)). Contact: "emr%munagin.ee.[email protected]"


Paul Taylor (University of Edinburgh). Finishing a dissertation on

hacking/viruses and the politics behind them. Focus includes hackers

and their computer security industry counterparts. Examines the issue

of technological determinism and the "information revolution" and also

the idea of hackers being perhaps an extension or most recent

development of an alternative culture. It also raises the whole issue of

the exact nature of cyberspace and the implications it holds: Are we

entering a new realm of informational colonialism? What is information?

Who has rights over it, and are hackers/the computer underground

fighting a battle of principle the importance of which has passed most

people by? Contact: "[email protected]"


Robert Berry (U. of North Carolina at Chapel Hill, Journalism). M.A.

Thesis on the First Amendment implications of computer-based

communication technologies. The focus includes a political analysis

of the history of governmental harassment of hackers and how that

harassment threatens to infringe the First Amendment rights associated

with this new technology. The analysis centers around Operation Sun

Devil and the related prosecutions that have taken place during the

past few years. Contact: [email protected]


------------------------------


Date: 12 Oct 91 11:21:19 CDT

From: Moderators <[email protected]>

Subject: General On-Line and Print Resources


The following "phreak/hacker" newsletters and magazines provide

insights into the culture of the CU. Some are defunct, others are

still publishing. An (*) indicates continued publication. (E)

indicates published in electronic format, (H) indicates hardcopy.

Most are available in the CuD ftp archives.


TAP (*H): General phreak/hack information. Contact TAP, PO Box 20264

Louisville, KY 40250.


ATI (*E): Political oriented posts. Appears every few months. Contact

[email protected]


NIA (Network Information Access) (*E): News digest and p/h

information.


NIA (*E): National Information Access, appears every few months.

Contact [email protected].


P/Hun (E): Five issues appeared. Primarily technical information.


PIRATE (E): News related to software piracy. Five issues appeared.


LoD/TJ (E): Hacker technical journal with occasional news. Four issue

appeared.


Weltanschaaung (*E): Political and editorial information focusing on

cyber issues. Began August, 1991. Contact [email protected]


2600--The Hacker Quarterly (*H): Quarterly issue devoted to

hacker-related technical information and news. Contact

[email protected]


Boardwatch Magazine (*H): Published monthly; Billed as a "guide to the

world of online services," focus is on BBS world. Essential reading

for serious modemers. Contact [email protected]


MONDO 2000 (*H): A slick, "postmodernist" oriented magazine, Mondo

covers music, art, and other cultural topics as well as cyber culture.

Contact [email protected]


EFFECTOR (*HE): The newsletter of the Electronic Frontier Foundation.

Mainly covers EFF activities and summaries of its involvement in

various projects. Contact eff@org


RISKS Digest (*E): An on-line, moderated newsgroup identifying

computer risks to society. Available through Usenet. Contact

[email protected]


TELECOM Digest (*E): A on-line, moderated newsgroup focusing on

telecommunications issues and the related social, ethical, and

political problems. Available through Usenet. Contact

[email protected]


CuD (*EH): On-line magazine/journal specializing in legal, ethical,

and social issues related to the computer culture. Available through

Usenet. Contact [email protected].


CuD ftp archives (*E): A collection of legal and academic papers and

phreak/hacker/pirate 'zines and newsletters. Collection also includes

a variety of state and federal laws and university policies along with

other CU-related documents. Contact: chsun1.spc.uchicago.edu or

ftp.cs.widener.edu


VIRUS-L Digest: on-line moderated newsgroup for discussions of

computer viruses. Available through Usenet. Contact virus-l@lehiibm1


Comp.org.eff.talk (*E): Unmoderated newsgroup for discussion of issues

related to cyberspace. Available through Usenet.


Computer/Law Journal (*H): Legal journal devoted to all legal aspects

of computer technology, including security, privacy, and copyright.


Chalisti (*E): German hacker newsletter (written in German) covering

European hacker news and technology.


------------------------------


Date: 12 Oct 91 11:21:19 CDT

From: Moderators <[email protected]>

Subject: Misc. Books for Fun Reading


(Compiled by "Dark Mage")


Title Author

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Johnny Zed Betancourt, John Gregory

When Gravity Fails Effinger, George Alec

The Long Orbit Farren, Mick

The Company Man Faust, Clifford

A Death of Honor Faust, Clifford

Cyber Way Foster, Alan Dean

Neuromancer Gibson, William

Mona Lisa Overdrive Gibson, William

Count Zero Gibson, William

Burning Chrome Gibson, William

Barking Dogs Green, Terrence M.

The Glass Hammer Jeter, K.W.

Farewell Horizontal Jeter, K.W.

Bad Voltage Littel, Jonathan

Armageddon Blues Moran, Daniel Keys

Emerald Eyes Moran, Daniel Keys

Yesterdays Pawn Quick, W.T.

Dreams of Flesh and Sand Quick, W.T.

Dreams of Gods and Men Quick, W.T.

Systems Quick, W.T.

Eclipse Penumbra Shirley, John

Eclipse Shirley, John

Little Heroes Spinrad, Norman

Other Americas Spinrad, Norman

Islands in the Net Spinrad, Norman

Mercedes Nights Weaver, Michael D.

Angel Station Williams, Walter Jon

Hardwired Williams, Walter Jon

Voice of the Whirlwind Williams, Walter Jon


------------------------------


End of Computer Underground Digest #3.36

************************************

Browse, Scan, Read, Download, Upload, Quit, ?=Menu

(1) General Text:

 
To the best of our knowledge, the text on this page may be freely reproduced and distributed.
If you have any questions about this, please check out our Copyright Policy.

 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
R. A. Salvatore
Reading childrens books weird?
What are you currently reading?
How often do you read?
Would you let your novel become a movie?
Penguin and Barnes and Noble, fleecing customer?
Chuck Palahniuk
What does reading mean for you?
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS