💾 Archived View for gemini.spam.works › mirrors › textfiles › news captured on 2023-01-29 at 03:33:16. Gemini links have been rewritten to link to archived content

View Raw

More Information

⬅️ Previous capture (2020-10-31)

-=-=-=-=-=-=-

T E X T F I L E S

News Stories

Before the news media made the transition to online servies, everything was on paper, and if a BBS user wanted to share, they had to type in the entire article themselves and pass it along. This directory will fill as time goes on with professionally transcribed stories, but peppered here and there are those labors of love, trying to spread the word.

092793.txt

Computer Porn Case Triggers Legal Questions from Daily Oklahoman Newspaper (September 27, 1993)

17arr.txt

17 Arrested in High-Tech Phone Fraud by Lee Catterall and William Green, Typed in by Skatepunk (1988)

1stamend

Showdown over Computer 'Crime" by Brooks Boliek (August 5, 1990)

26008586.txt

Excerpts from Various Issues of 2600 Magazine, by The Fixer

2600dcr1.txt

Reports of "Raid" on 2600 Washington Meeting 11/09/92

2600dcr2.txt

Secret Service Role Questioned in "2600 Washington Raid" (November 10, 1992)

2600dcr3.txt

Conflicting Stories in 2600 Raid (November 11, 1992)

2600dcrp.txt

Hackers Allege Harassment at Mall; Pentagon City Guards Stop Meeting, Tell Computer Group to Leave. by Robert O'Harrow, Jr.

2600raid.txt

A Raid on a 2600 Meeting (November 7, 1992)

adshack.hac

The FBI Goes after ADS Hackers

agnts.nfo

Computer Criminal Caught After 10 Months On The Run by Keith Stone (August 30th, 1994)

akronbbs.txt

Police Say They Were Taking a Byte Out of Crime, by Charlene Nevada, Beacon Journal, March 22, 1993

arrest.txt

Two Juveniles Arrested in BBS Extortion Case

article.txt

ASCII and Ye Shall Recieve (Analysis and Criticism by the Slipped Disk)

bardbyte.txt

The Bard Bytes Dust, by Charles Burress (SF Chronicle, 1986) Typed in by The Unknown User

baudy.hac

The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground (Thesis, 1990)

bawdybds.txt

Bulletin Bawdy, from "The Games Machine" July 1988

bbscase.txt

Akron BBS Trial Update: Dangerous Precedents in Sysop Prosecution

bbscourt.txt

About Litigation on BBSes in the USA, April, 1990

bbssting.txt

Police Set Up Bulletin Board Stings by Jim Forbes of Infoworld

bcwired.asc

What Does a Nobel Prize for Radio Astronomy Have to Do with Your Telephone? by Richard Rapaport

biblio

Computer Hackers News Articles by Bob Krause

bmbmnul.txt

Student Disciplined for Bomb Manual, from the Collinsville Herald-Journal (March 21, 1993)

boardwat.txt

Board Watch Magazine: Volume 7, Issue 4, April 1993

boh-20f8.txt

Bildschirmtext: A Blow Against the System (Chaos Computer Club (November 30, 1984)

bp.txt

Hackers Under Attack: Crackdown Raises Questions about New Forms of Speech, by Mark Leccese (September 7, 1990)

bucks.txt

Millionaire Gets Mugged In Park He Donated To

bust1lod.hac

U.S. computer investigation targets Austinites

busted

All About the Cherry Hill Phreak Busts

busweek.txt

Does Someone Have Your Company's Number?: Phone Hackers are Tapping PBXs, Running Up Millions in Charges (February 4, 1991)

c0smos.nws

The Story of the C0SM0S BBS

cable.hac

The true story of John Maxfield, electronic private eye, by John Manning

captain.phk

An Apple for the Captain

captaina.hac

Who is Captain Zap? (Article from Washington Post)

captmidn.txt

The Legend of Captain Midnight and HBO

chesire.phk

Who is Cheshire Catalyst? (Article in Technology Illustrated)

cptcrnch.txt

Raping Ma Bell: Captain Crunch, by Zbigniew Kindela of Hustler Magazine, February 1979

craig.fun

The Urban Legend of Craig Shergold strikes in Kennewick, WA, USA, 15 Jan 1992

crime.hac

Is there Computer Crime, and what are the results?

crime1.txt

Computer Crime Becoming "Less Sophisticated", Margie Wylie, May 1990 Computerworld

crimes.txt

Going Undercover In The Computer Underworld by Ralph Blumenthal (The New York Times) January 26, 1993

crunchy.txt

Phone Phreak Eyes Computers (More on John Draper)

crypto.txt

Promising Technology Alarms Government, by Joe Abernathy of the Houston Chronicle (1992)

csuicide.txt

Programmed for Life and Death, by John Markoff, New York Times, 1990

cybrnazi.txt

CyberNazis Baffle German Politc (February 1994)

cybrshit.rdt

Heavily Angrily Commented Transcript/Discussion about the BCS/Speech Discussion on Cyberpunks by John Markoff

cycrime1.hac

Crime and Puzzlement, by John Perry Barlow (Introduction to the Electronic Frontier Foundation)

dedsheep.txt

Bighorn Sheep Massacre A Mystery, By Keith Rogers, Las Vegas Review-Journal/Sun, Sunday November 24, 1991

delorean.txt

The DeLorean Case

demonews.67

DEMO NEWS #67, October 23-29, 1994

demonews.68

DEMO NEWS #68, October 30-November 5, 1994

demonews.69

DEMO NEWS #69, November 6-12, 1994

demonews.70

DEMO NEWS #70, November 13-19, 1994

dibbel.hac

"On Line and Out of Bounds..." By Julian Dibbell (Needs Editing)

dibbel.txt

On line and Out of Bounds by Julian Dibbell

digital.txt

Digital Underground, by Mark Bennett (September 12, 1992)

digundrg.txt

Digital Underground, by Mark Bennettm Published in i-D Technology (September 12th, 1992)

donahue.txt

Transcript of a Phil Donahue Show about Hackers (March 15, 1985) from P-80 Systems

emmanuel.txt

An Interview with Emmanuel Goldstein, by CNN (1999)

ethics.hac

Newsweek: Teaching Hackers Ethics

fadehack.txt

The Fading Hacker Mystique: No Longer Just Pests from Computer Shopper, transcribed by Mac?? (August 24, 1991)

fbi1

PC Bulletin Board Hit by FBI Raid, by Josh Hyatt (Boston Globe), June 14, 1992

fbi2

Colonel Guilty of Sending Porn via Computer

fbi20

30 Arrests In Silicon Valley Computer Parts Sting 01/13/93

fbibust2

The Raid of Hackers in Irvine, California, by Uncle Fester

freeware.txt

Andrew Flugleman: In Memoriam

gangplan.txt

The Bloods and the Crips propose to face-lift LA

genius.txt

The Latest Cult Hero: J R. Bob Dodds

geraldo.txt

Now it Can Be Told: Mad Hacker's Key Party, by Geraldo Rivera (September 30, 1991)

guilty.txt

Hacker Pleads Guilty in AT&T Case: Sentence Urged for Md. Man Among Stiffest Yet for Computer Crime, by Mark Potts of Washington Post

hack-nsa.txt

Hackers Retaliate by Leaking Manual, by Keay Davidson, Examiner Science Writer

hacker.hac

Abuse Hits Computer Networks

hacker2.txt

The Cops Got His Number: Teen accused of harassment calls via computer, San Jose Mercury News

hackers

An Article about High School Hackers by Argon PhoenixFire and Beta Ray Bill (February 28, 1985)

hackers.txt

Is Computer Hacking a Crime? (March 1990 Harper's Magazine)

hackers.unite

Hackers of the World, Unite! By John Schwartz and Typed by Apple Adept (July 2, 1990)

hackers1.hac

Amateur Hackers Tripped Up (Telegram-Tribune Newspaper, Mar. 23, 1991)

hackers2.hac

Computer Case Takes a Twist (Telegram-Tribune Newspaper, Mar. 29, 1991)

hackers3.hac

Hackers off Hook, Property Returned ((Telegram-Tribune Newspaper, Apr. 12, 1991)

hackerth

Hacker "Theives" by Silent Revel (July 18, 1985)

hacknasa

NASA vs. Hobbyist: Computer Whiz Accused of Illegal Access, Mischief, by Peter G. Chronis

hackpape.hac

The Hacker Papers (Psychology Today Aug. '80)

hackrfoe.txt

HACKERS: Friend or Foe? by Ken McLeod (1986)

hackunit.txt

Hackers of the World, Unite! With Comments by Digital Derelict (July 2, 1990)

hacrpt.twk

AP Newswire story on the coming crackdown on free phone calls

hakmedia.hac

Hackers in the Media, List start: 10/28/92 - Doomsday

harticle

Teen-Age Hacker has Lessons for Columbia Police

hcc.txt

How Crackers Crack by Rory J. O'Connor of Mercury News

hcknews.hac

Grab-Bag of Hacking-related news story transcriptions

hckrslg

The Hacker's League, by Lee Felsenstein, 18 March 1992

herb_zin.sto

Chicago Phreak Gets Prison Term (February 17, 1989)

hunt

Holding Teenage Hackers: Don't Plug Those Leaky Computers, December 1984

hydebomb.txt

Newsweek Article on the Hyde Park Bomb

invest.txt

Philadelphia financial planner Christine C. Dattilo is interviewed by financial writer Mike Pietruk

isdn.txt

Macworld: Another Part of your Life is About to Go Digital

jilted.txt

Jilted Businessman Accused in Botched Murder Plot

johnmedi.txt

Hacker's Story: Two Days on Long Distance (Transcribed by Anarchy Tech)

kevin.pol

More Net Friends Charged with Telephone Computer Crimes, by John Gilmore (January 19, 199)

kfyi-593.txt

KFYI Phoenix, 910 AM, Kim Kommando Show 5-22-93 Transcript (Nerd on the Air)

latimes.txt

The Pirates of the Internet (November 3, 1994)

leftist.txt

Open Sesame: In the Arcane Culture Of Computer Hackers, Few Doors Stay Closed (Wall Street Journal, August 22, 1990)

legion.txt

Article about Legion of Doom: "Ex-Hackers' Tactics Attracting Criticism', Houston Chronicle

len_rose.new

'Hacker' Pleads Guilty in AT&T CASE: Sentence Urged for Md. Man Among Stiffest Yet for Computer Crime, by Mark Potts, Washington Post Staff Writer

livermor.txt

Hackers in the News: Orlando Sentinel from the Los Angeles Times

lodhbust.nws

US Computer Investigation Targets Austinites

marsface.txt

Some See Glimpse of Life in Face of Mars

marsmani.txt

Mars Mania, API, 1988

menace.txt

The Hacker Menace and Electronic Bulletin Boards by Code Cracker

mism34.hac

What You Should Know About Collection Agencies ("Cosmopolitan" (November 1984))

mism6.txt

Computer Hackers Beware! Senate Passes Computer Fraud And Abuse Act

mitnick.txt

Slippery cybervandal caught in his own electronic web, by New York Times

mob.hac

Hackers in the Mob

modbust.txt

New York Computer Crime Indictments (Bust of the MOD) (July 10, 1992)

modem.spf

Split Personalities on Electronic Bulletin Boards by Rangott Spliekin

multimed.txt

The End of Literature: Multimedia is Television's Insidious Offspring, by Steven Levy

nasa.hak

The NASA Hackers, by Tarkin Darklighter (September 15, 1987)

neidorf

The Craig Neidorf Case Proceedings, July, 1990

neidorfd.txt

The Craig Neidorf Defense Fund Introduction

new.ibm

IBM Announcement of the Personal System/2

newphed.phk

RADIO SCHLOCK Helps the Feds (Needs to be edited)

night.txt

The Night of the Hackers, by Richard Sandza

nighthac

Nighthack:A Story About Hackers

nighthak.txt

The Night of the Hackers, by Richard Sandza

nightlin

Nightline: FBI, Privacy, and Proposed Wire-Tapping Legislation, Friday, May 22, 1992

nsw-porn.txt

Forget Homework, Computer Kids Discover Electro Porn, by Ben Hills

nzidcard.txt

Prime Minister's Team Gets Set to Move on ID Cards, by Clive Mathew-Wilson, Computerworld, April 1, 1991

paranoia.pro

Paranoia runs rampant throughout Computer Community

pbust.txt

Semi-Literate Account of the Busting on Two Portuguese Pirates

pcomhck.txt

The Popular Communications Hacker News Story, by Tom Kneitel (K2AES)

phrack.txt

Missouri Man Pleads Not Guilty to Charges of Cracking 911 System

piratpub.hac

Publisher Pirates Publisher, 1983

prank.txt

Infoworld 1984: The Merry Pranksters, Wozniak and Jobs

press.txt

How To Talk To The Press by Johnny Mnemonic

pump.txt

Computer Access Arrests In NY 11/03/92

r&e_bust.txt

FBI raids major Ohio computer bulletin board, January 30, 1993

races.txt

Professor Pilloried for Race Theory, by Jeffrey Ulbright in Toronto

racist.net

Article About the Publishing Racist Jokes, from the Kitchener Record

radhoax.txt

Disc Jockeys Apologize for Concocted On-Air Murder Hoax

rdr.asc

Roswell Daily Record for Tuesday, July 8, 1947: RAAF Captures Flying Saucer On Ranch in Roswell Region

requiem.txt

Requiem for a Sysop, from PC WEEK, November 20, 1984

response.hac

A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww

rivera

Transcript of Now It Can Be Told: Mad Hacker's Key Party, by Geraldo Rivera (Sept. 30, 1991)

saddam.txt

Transcript of Meeting Between Iraqi President, Saddam Hussein and U.S. Ambassador to Iraq, April Glaspie. - July 25, 1990

satelite.hac

The Great Satellite Caper, from Time Magazine

satlink.txt

Overview of the News Channel's View of Satellite Links

scary2.phk

"Night of the Hackers", by Richard Sandza

sentence.hac

Three from Legion of Doom Sentenced (Nov. 17)

sflvrs_h.ack

A Beautiful Obsession with the Binary World by Steven Levy

shadow.hac

The Shadowy World of Computer Hackers

shuttle.txt

Large Collection of Suspicious NASA News Stories

sieze.txt

Drive to Counter Computer Crime Aims at Invaders, by John Markoff (June 3, 1990)

sign

A Sign Of Our Times (Anorexia) by Rick Arnold

silvrspy.txt

World of Silver Spy, 17 Year Old Tinker (Needs Editing)

singh.hac

Hacking: The Case of Edward Austin Singh

sjg-day1

Steve Jackson Games/Secret Service Lawsuit -- Day One by Joe Abernathy, Houston Chronicle

sjg-day2

Steve Jackson Games/Secret Service Lawsuit -- Day Two by Joe Abernathy, Houston Chronicle

sjg-day3

Steve Jackson Games/Secret Service Lawsuit -- Day Three by Joe Abernathy, Houston Chronicle

sjg-wins.sjg

Steven Jackson Games Wins Lawsuit Against U.S. Secret Service

ss&fbi.txt

The Secret Service Decides to Watch All of Us

sunhack.txt

Hackers Suspected in Online Vandalism

supehack.txt

Super Hacker. Was he busted, or slipped out into the night?

swpiracy.txt

Software Piracy: from the NZ Listener (August 13, 199) by Chris Barton

syrp1124.txt

The Syndicate Report: Bell Information Transmittal #8

sysopjl.txt

SysOp Jailed in Georgia, by Lance Rose

teensac.txt

Two Teens Accused of Cracking Phones While in the jailhouse

telecmp2.hum

The Telecomputist, Sept 1986

terminal.esq

Terminal Delinguents, by Jack Hitt and Paul Tough of Esquire (December 1990)

theburli.txt

Peninsula Hackers Busted, by John Curry

thefacts.phk

Push Button Felonies, KPFA Radio Broadcast, July 26, 1990

thegreat.txt

The Great Satellite Caper, by Silent Rebel (July 29, 1985)

time-art

Cyberpunk, by Philip Elmer-Dewett (Time Magazine, February 8, 1993)

top10.hac

Top 10 Media Errors about the Steve Jackson Games Raid

top10.nws

The Top 10 Media Errors about the Steven Jackson Games Raid

trib1118.txt

Crackdown on Crime is Raising Question of Computer Rights by Jim Sulski

trw

Computer Raiders Hit Big Credit File, 06/22/84

tubeshok.txt

Tube Shocks, by J. Neil Schulman (About TV)

v-world.txt

Programmed for Life and Death, by John Markoff

vanish.txt

The Hacker Who Vanished: Suicide or Clever Hoax? (About Bill Landreth)

videocon.txt

Ben and Jerry's Use of Video Conferencing

virgin_i.phr

News: Virgin Islands Phreak Arrested and Convicted

vs010799.txt

The Rise and Fall of the Modem King, by Victoria Shannon

washlod.txt

The Terminal Men: Crackdown on the `Legion of Doom' Ends an Era for Computer Hackers, by Willie Schatz (Washington Post)

wormdoc.hac

Crisis and aftermath. (the Internet worm), by Eugene Spafford

xt.hac

Personal Computer Users Penetrating Nation's Phone System, (1988 NY Times)