home *** CD-ROM | disk | FTP | other *** search
-
-
- Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)
-
- Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)
-
- CONTENTS, #3.36 ( October 12, 1991)
- Subject: File 1-- Intro to Biblio and ResourcesModerators' Corner
- Subject: File 2-- General CU-Related Bibliography
- Subject: File 3-- Dissertations and Theses
- Subject: File 4-- General On-Line and Print Resources
- Subject: File 5-- Misc. Books for Fun Reading
-
- Issues of CuD can be found in the Usenet alt.society.cu-digest news
- group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
- and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
- 789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
- chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu. To use the U. of
- Chicago email server, send mail with the subject "help" (without the
- quotes) to archive-server@chsun1.spc.uchicago.edu.
-
- COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
- information among computerists and to the presentation and debate of
- diverse views. CuD material may be reprinted as long as the source
- is cited. Some authors do copyright their material, and they should
- be contacted for reprint permission. It is assumed that non-personal
- mail to the moderators may be reprinted unless otherwise specified.
- Readers are encouraged to submit reasoned articles relating to the
- Computer Underground. Articles are preferred to short responses.
- Please avoid quoting previous posts unless absolutely necessary.
-
- DISCLAIMER: The views represented herein do not necessarily represent
- the views of the moderators. Digest contributors assume all
- responsibility for ensuring that articles submitted do not
- violate copyright protections.
-
- ----------------------------------------------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: Intro to Biblio and ResourcesModerators' Corner
-
- We continually receive requests for information about studies, 'zines
- and people doing research on cyber issues. The number of works
- appearing in the past two years has dramatically increased. Below is a
- select bibliography of some of the oft-cited works. We tried to be
- representative rather than inclusive, and selected articles, stories,
- or publications that include references to other works or that are
- considered classics and must be read to understand the CU. Some
- readers may questions the selection or why we excluded particular
- items in favor of others. If any glaring omissions occur, send over
- your choices and we will add a supplement in a few weeks.
-
- ------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: General CU-Related Bibliography
-
- The following list is not intended to be exhaustive, but reflects some
- of the basic resource literature relevant to the Computer Underground
- and related culture. Journalists specializing in media coverage of the
- topic include Joe Abernathy of the Houston Chronicle, John Markoff of
- the New York Times, and John Schnieder of Newsweek, and Adam Gaffin,
- of the Middlesex News (Framingham, Mass). All are accessible on
- internet. Susan Ross (sross@clutx.clarkson.edu) is currently
- comparing Canadian and U.S. civil rights laws as they pertain to
- cyberspace.
-
- Allman, William F. 1990. "Computer Hacking goes on Trial." U.S. News
- and World Report, January 22: 25.
-
- Barlow, John Perry. 1990 (Forthcoming). "Crime and Puzzlement." Whole
- Earth Review.
-
- Bequai, August. 1978. Computer Crime. Lexington (Mass.): Lexington.
-
- Bequai, August. 1987. Technocrimes. Lexington (Mass.): Lexington.
-
- Bloombecker, Jay. 1988. Interview, Hour Magazine. NBC television,
- November 23.
-
- Brunner, John. 1989. The Shockwave Rider. New York: Ballantine.
-
- Camper, John. 1989. "Woman Indicted as Computer Hacker Mastermind."
- Chicago Tribune, June 21: II-4.
-
- Charles Ess. 1987. "Computers and Ideology: Limits of the Machine."
- Quarterly Journal of Ideology. 11(2): 33-39.
-
- "Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to Panic
- over Computer Crime." New Statesman & Society, February 9: 27.
-
- "Computer Expert's Son Cited as Virus Creator.' 1988. Chicago Tribune,
- November 5: 1, 2.
-
- "Computer Hacker Ring with a Bay Area Link." 1990. San Francisco
- Chronicle, May 9: A-30.
-
- "Computer Saboteur gets Probation." 1988. Chicago Tribune, Oct. 22: 4.
-
- Conly, Catherine H. and J. Thomas McEwen. 1990. "Computer Crime." NIJ
- Reports, 218(January/February): 2-7.
-
- Conly, Catherine H. 1989. Organizing for Computer Crime Investigation
- and Prosecution.
-
- Cooley, Ronald B. 1984. "RICO: Modern Weaponry against Software
- Pirates." Computer Law-Journal, 5(Fall): 143-162.
-
- Denning, Dorothy E. 1990. "Concerning Hackers Who Break into
- Computers Systems." Paper present at the National Computer Security
- Conference, Washington, D.C., Oct. 1-4.
-
- Edwards, Lynda. "Samurai Hackers." Rolling Stone, Sept. 19, 1991:
- 67-69.
-
- Geertz, Clifford. 1973. The Interpretion of Cultures. New York: Basic
- Books. 1973.
-
- Gibson, William. 1984. Neuromancer. New York: Ace.
-
- "Hacker, 18, Gets Prison for Fraud." 1989. Chicago Tribune, February
- 15: III-1.
-
- Haffner, Katie and John Markoff. 1991. Cyberpunk: Outlaws and
- Hackers on the Computer Frontier. New York: Simon and Schuster.
-
- Harper's Forum. 1990. "Is Computer Hacking a Crime? A Debate from the
- Electronic Underground." Harper's, 280(March): 45-57.
-
- Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The Process of
- Criminalization: The Case of Computer Crime Laws." Criminology,
- 26(February): 101-126.
-
- Hollnger, Richard C. 1990. "Hackers: Computer Heroes or Electronic
- Highwaymen?" Paper presented at the American Society of Criminology
- annual meetings, Baltimore, Nov. 7.
-
- Jensen, Eric C. 198?. "An Electronic Soapbox: Computer Bulletin
- Boards and the First Amendment." Federal Communications Law Journal,
- 39(3): 217-258.
-
- Kane, Pamela. 1989. V.I.R.U.S. Protection: Vital Information
- Resources under Siege. New York: Bantam.
-
- Kling, Rob, and Suzanne Iocono. 1988. "The Mobilization of Support
- for Computerization: The Role of Computerization Movements." Social
- Problems, 35(June): 226-243.
-
- Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to
- Computer Security. Belleview (Wash.): Microsoft Press.
-
- Langworthy, Robert H. 1989. "Do Stings Control Crime? An Evaluation
- of a Police Fencing Operation." Justice Quarterly, 6(March): 27-45.
-
- Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution.
- Garden City: Doubleday.
-
- Levy, Steven. 1990. Cloak and Dagger.
-
- Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."
- New York Times, April 4, A1, A11.
-
- Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."
- New York Times, April 4, A1, A11.
-
- Markoff, John. 1990b. "Drive to Counter Computer Crime Aims at
- Invaders." The New York Times, June 3: 1, 21.
-
- Marx, Gary T. 1988a. Undercover: Police Surveillance in America.
- Berkeley: University of California Press.
-
- Marx, Gary T. 1988b. "The Maximum Security Society." Deviance et
- Societe, 12(2): 147-166.
-
- Marx, Gary T., and Nancy Reichman. 1985. "Routinizing the Discovery
- of Secrets: Computers as Informants." Software Law Journal, 1(Fall):
- 95-121.
-
- McEwen, J. Thomas. 1989. Dedicated Computer Crime Units. Washington
- D.C.: National Institute of Justice.
-
- Meyer, Gordon R. "Hackers, Phreakers, and Pirates: The Semantics of
- the Computer Age." 1989. Pp. 74-82 in P. Kane, V.I.R.U.S. Protection:
- Vital Information Resources under Siege. New York: Bantam.
-
- Meyer, Gordon R. and Jim Thomas. 1989. "Role Differentiation in the
- computer underground." Paper presented at the Society for the Study of
- Social Problems annual meetings, Berkeley, August.
-
- Meyer, Gordon R. 1989a. The Social Organization of the computer
- underground. Unpublished Masters Thesis, Northern Illinois University.
-
- Michalowski, Raymond J. and Erdwin H. Pfuhl. 1990 (forthcoming).
- "Technology, Property, and Law: The Case of Computer Crime."
- Contemporary Crisis.
-
- Pope, Kyle, 1990. "U.S. Computer Investigation Targets Austinites."
- Austin-American Statesman, March 17, Pp A-1, A-12.
-
- Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles
- Scribner's Sons.
-
- Pfuhl, Erdwin H. 1987. "Computer Abuse: Problems of Instrumental
- Control." Deviant Behavior, 8(2): 113-130.
-
- Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box." Esquire,
- 76(October): 116-1125, 222-226.
-
- Rosenblatt, Kenneth. 1990. "Deterring Computer Crime." Technology
- Review, 93(FebruaryMarch): 34-40.
-
- Sandza, Richard. 1984. "Revenge of the Hackers." Newsweek,
- 104(December 10): 25.
-
- Sandza, Richard. 1984. "The Night of the Hackers." Newsweek,
- 104(November 12): 17-18.
-
- Schwartz, Eddie. 1988. "Special on 'Computer Hacking.'" WGN Radio,
- Sept 27.
-
- Schwartz, John. 1990. "The Hacker Dragnet: The Feds Put a Tail on
- Computer Crooks--and Sideswipe a few Innocent Bystanders." Newsweek,
- April 30: 50.
-
- Scientific American. 1991. Special Issue: How to Work, Play and
- Thrive in Cyberspace. September.
-
- Sterling, Bruce. 1988. Islands in the Net. New York: Ace Books.
-
- Sterling, Bruce. Forthcoming. The Hacker Crackdown: The True Story of
- the Digital Dragnet of 1990 and the Start of the Electronic Frontier
- Foundation.
-
- Stoll, Clifford. 1989. The Cuckoo's Egg: Tracking a Spy through the
- Maze of Computer Espionage. New York: Doubleday.
-
- Thomas, Jim and Gordon R. Meyer. 1990. "(Witch)Hunting for the
- Computer Underground: Joe McCarthy in a Leisure Suit." The Critical
- Criminologist, 2(September): 7-8, 19-20.
-
- Thomas, Jim, and Gordon R. Meyer. 1990a (forthcoming). "The Baudy
- World of the Byte Bandit: A Postmodernist Interpretation of the
- Computer Underground." In F. Schmalleger (ed.), Computers in Criminal
- Justice. Bristol (Ind.): Wyndham Hall.
-
- Thomas, Jim, and Gordon R. Meyer. 1990b. "In Defense of the Computer
- Underground: The End of the Frontier?" Paper presented to the American
- Society of Criminology annual conference, Baltimore (November).
-
- Tompkins, Joseph B., Jr., and Linda A. Mar. 1986. "The 1984 Federal
- Computer Crime Statute: A Partial Answer to a Pervasive Problem."
- Computer-Law Journal, 6(Winter): 459-481.
-
- Van, John. 1989. "Oddballs no More, Hackers are now a Threat."
- Chicago Tribune, March 5, IV: 4.
-
- Winter, Christine. 1988. "Virus Infects Huge Computer Network."
- Chicago Tribune, November 4, 1, 18.
-
- "Yes, You Sound very Sexy, but I Really Need a Probation Officer."
- 1989. Chicago Tribune, June 13, 10.
-
- Zablit, Jocelyne. 1989. "Fraud Sweep Nabs 2 Michigan Teens in
- Computer Ring." Detroit Free Press, 25 May: 1, 18.
-
- ------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: Dissertations and Theses
-
- The following come from International Dissertation Abstracts and from
- persons who responded to our request for information on theses. The
- dissertation list should be fairly complete. It excludes works limited
- to computer crime or computer-mediated communication (contact Bitnet's
- CMC newsgroup for information on CMC). The thesis list is incomplete
- because of the relatively low number of institutions responding. But,
- judging from bibliographies and discussions, there seem to be
- relatively few CU-related theses. ("Dissertations" are normally done
- for a PhD, and "theses" are written for a Master's degree).
-
- ++++++++++++++++++++++++
- DISSERTATIONS
- ++++++++++++++++++++++++
-
- Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION:
- ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director:
- none listed). University of California, Berkeley. 186 pp. Order No.
- DA 8916665.
-
- Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF
- RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F.
- Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976.
-
- Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS
- AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova
- University. 133 pp. Order No. DA 9022334.
-
- Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER
- INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of
- Arizona. 377 pp. Order No. DA 8217495
-
- Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE
- DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS.
- (Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA
- 8918795.
-
- Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS.
- (Director: Malur K. Sundareshan). The University of Arizona. 282 pp.
- Order No. DA 8702350.
-
- Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION.
- (Chair: David G. Cantor). University of California, Los Angeles. 202
- pp. Order No. DA 9033944
-
- Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER
- COMMUNICATION PARTNERS (University of Utah). Contact: sshamp@uga.bitnet
-
- ++++++++++++++++++++++++
- MASTERS' THESES
- ++++++++++++++++++++++++
-
- Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE
- COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois
- University. Contact: Gordon Meyer: "72307.1502@COMPUSERVE.COM"
-
- Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND
- PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop
- University. 109 pp. Order No. MA 132853
-
- Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY.
- (Major Professor: Marino J. Niccolai). University of South Alabama.
- 190 pp. Order No. ??).
-
- ++++++++++++++++++++++++
- WORKS IN PROGRESS
- ++++++++++++++++++++++++
-
- (The following include projects in the planning stage as well as
- those nearing completion)
-
- William Curran (Arizona State University). Writing a Masters Thesis on
- the introduction of wide area and local nets into the Soviet Union,
- combining technological and sociological analysis that summarizes the
- changes and prospects for early nineties. Contact:
- WCURRAN@CARAT.ARIZONA.EDU
-
- Mark Smith (Sociology, University of California, Los Angeles).
- Dissertation (in progress) that focuses on the power and politics of the
- "information society". Recurring themes include the role of time/space
- compression and surveillance in society. Significant influences include
- David Harvey, Michel Foucault, Mark Poster, Herbert expand. One issue
- includes the clash between Enlightenment rhetoric and post-modern
- technology. Contact: SMITHM@DUVM.BITNET
-
- Peter S. Markham (University of Melbourne, Dept. of Criminology).
- Masters' Thesis in progress on a comparative study of the
- Criminalisation of Computer Misuse in the United States, United Kingdom
- and Australia. Contact: pmark@ARIEL.UCS.UNIMELB.EDU.AU
-
- Elizabeth M. Reid (University of Melbourne). Supervisor: Donna
- Merwick. Honours Thesis on computer-Mediated Communication
- communication processes in synchronous conferencing, including
- computer networks, internet, and electronic mail. The focus is on
- cultural themes of communication, including power, interpreting social
- contexts, socialization and learning, from a deconstructionist
- perspective. ((Moderators' note: We've read a draft, and it's
- first-rate)). Contact: "emr%munagin.ee.mu.oz.au@uunet.uu.net"
-
- Paul Taylor (University of Edinburgh). Finishing a dissertation on
- hacking/viruses and the politics behind them. Focus includes hackers
- and their computer security industry counterparts. Examines the issue
- of technological determinism and the "information revolution" and also
- the idea of hackers being perhaps an extension or most recent
- development of an alternative culture. It also raises the whole issue of
- the exact nature of cyberspace and the implications it holds: Are we
- entering a new realm of informational colonialism? What is information?
- Who has rights over it, and are hackers/the computer underground
- fighting a battle of principle the importance of which has passed most
- people by? Contact: "p.a.taylor@edinburgh.ac.uk"
-
- Robert Berry (U. of North Carolina at Chapel Hill, Journalism). M.A.
- Thesis on the First Amendment implications of computer-based
- communication technologies. The focus includes a political analysis
- of the history of governmental harassment of hackers and how that
- harassment threatens to infringe the First Amendment rights associated
- with this new technology. The analysis centers around Operation Sun
- Devil and the related prosecutions that have taken place during the
- past few years. Contact: rrberry@SHELTIE.CHAPEL-HILL.NC.US
-
- ------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: General On-Line and Print Resources
-
- The following "phreak/hacker" newsletters and magazines provide
- insights into the culture of the CU. Some are defunct, others are
- still publishing. An (*) indicates continued publication. (E)
- indicates published in electronic format, (H) indicates hardcopy.
- Most are available in the CuD ftp archives.
-
- TAP (*H): General phreak/hack information. Contact TAP, PO Box 20264
- Louisville, KY 40250.
-
- ATI (*E): Political oriented posts. Appears every few months. Contact
- gzero@tronsbox.xei.com
-
- NIA (Network Information Access) (*E): News digest and p/h
- information.
-
- NIA (*E): National Information Access, appears every few months.
- Contact nuchat!samp@uunet.uu.net.
-
- P/Hun (E): Five issues appeared. Primarily technical information.
-
- PIRATE (E): News related to software piracy. Five issues appeared.
-
- LoD/TJ (E): Hacker technical journal with occasional news. Four issue
- appeared.
-
- Weltanschaaung (*E): Political and editorial information focusing on
- cyber issues. Began August, 1991. Contact fox@nuchat.sccsi.com
-
- 2600--The Hacker Quarterly (*H): Quarterly issue devoted to
- hacker-related technical information and news. Contact
- emmanuel@well.sf.ca.us
-
- Boardwatch Magazine (*H): Published monthly; Billed as a "guide to the
- world of online services," focus is on BBS world. Essential reading
- for serious modemers. Contact jrickard@teal.csn.org
-
- MONDO 2000 (*H): A slick, "postmodernist" oriented magazine, Mondo
- covers music, art, and other cultural topics as well as cyber culture.
- Contact rusirius@well.sf.ca.us
-
- EFFECTOR (*HE): The newsletter of the Electronic Frontier Foundation.
- Mainly covers EFF activities and summaries of its involvement in
- various projects. Contact eff@org
-
- RISKS Digest (*E): An on-line, moderated newsgroup identifying
- computer risks to society. Available through Usenet. Contact
- risks@csl.sri.com
-
- TELECOM Digest (*E): A on-line, moderated newsgroup focusing on
- telecommunications issues and the related social, ethical, and
- political problems. Available through Usenet. Contact
- telecom@eecs.nwu.edu
-
- CuD (*EH): On-line magazine/journal specializing in legal, ethical,
- and social issues related to the computer culture. Available through
- Usenet. Contact tk0jut1@mvs.cso.niu.edu.
-
- CuD ftp archives (*E): A collection of legal and academic papers and
- phreak/hacker/pirate 'zines and newsletters. Collection also includes
- a variety of state and federal laws and university policies along with
- other CU-related documents. Contact: chsun1.spc.uchicago.edu or
- ftp.cs.widener.edu
-
- VIRUS-L Digest: on-line moderated newsgroup for discussions of
- computer viruses. Available through Usenet. Contact virus-l@lehiibm1
-
- Comp.org.eff.talk (*E): Unmoderated newsgroup for discussion of issues
- related to cyberspace. Available through Usenet.
-
- Computer/Law Journal (*H): Legal journal devoted to all legal aspects
- of computer technology, including security, privacy, and copyright.
-
- Chalisti (*E): German hacker newsletter (written in German) covering
- European hacker news and technology.
-
- ------------------------------
-
- Date: 12 Oct 91 11:21:19 CDT
- From: Moderators <tk0jut2@mvs.cso.niu.edu>
- Subject: Misc. Books for Fun Reading
-
- (Compiled by "Dark Mage")
-
- Title Author
- ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
- Johnny Zed Betancourt, John Gregory
- When Gravity Fails Effinger, George Alec
- The Long Orbit Farren, Mick
- The Company Man Faust, Clifford
- A Death of Honor Faust, Clifford
- Cyber Way Foster, Alan Dean
- Neuromancer Gibson, William
- Mona Lisa Overdrive Gibson, William
- Count Zero Gibson, William
- Burning Chrome Gibson, William
- Barking Dogs Green, Terrence M.
- The Glass Hammer Jeter, K.W.
- Farewell Horizontal Jeter, K.W.
- Bad Voltage Littel, Jonathan
- Armageddon Blues Moran, Daniel Keys
- Emerald Eyes Moran, Daniel Keys
- Yesterdays Pawn Quick, W.T.
- Dreams of Flesh and Sand Quick, W.T.
- Dreams of Gods and Men Quick, W.T.
- Systems Quick, W.T.
- Eclipse Penumbra Shirley, John
- Eclipse Shirley, John
- Little Heroes Spinrad, Norman
- Other Americas Spinrad, Norman
- Islands in the Net Spinrad, Norman
- Mercedes Nights Weaver, Michael D.
- Angel Station Williams, Walter Jon
- Hardwired Williams, Walter Jon
- Voice of the Whirlwind Williams, Walter Jon
-
- ------------------------------
-
- End of Computer Underground Digest #3.36
- ************************************
-
-