💾 Archived View for gemini.spam.works › mirrors › textfiles › hacking › BIBLIOGRAPHIES › abstract.ha… captured on 2023-01-29 at 15:10:51.
⬅️ Previous capture (2022-06-12)
-=-=-=-=-=-=-
90021932 Title: Is Computer Hacking a Crime? Authors: Anonymous Journal: Harper's Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57 Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary Abstract: A round-table discussion on the ethics of computer hacking is presented. The panelists include computer hackers, scientists, activists and media members. Subjects: Computer crime; Ethics; Social life & customs Type: Feature Length: Long (31+ col inches) 90008297 Title: Computer Hacking Goes on Trial Authors: Allman, William F Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990 pp: 25 Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News Abstract: The trial of Robert Morris, a graduate student who unleashed a "worm" that caused computers around the US to grind to a halt on Nov 2, 1988, is discussed. Photograph; Illustration Subjects: Trials; Computer crime Names: Morris, Robert Type: News Length: Medium (10-30 col inches) 89121419 Title: Hackers: Is a Cure Worse Than the Disease? Authors: Lewyn, Mark Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: Because of computer hacking, Pentagon officials would like to add more layers of security to protect their networks. But this would limit access to university and government scientists, who use the information the most. Photograph Subjects: Computer crime; Security systems; Computer networks Names: Morris, Robert Jr Type: Commentary Length: Medium (10-30 col inches) 89059272 Title: Let's Get Reckless Authors: Gaines, Donna Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15 Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary Abstract: The developing social importance of computer viruses is explored. Computer hacking and computer viruses have penetrated the consciousness of the mainstream media and are being countered by federal legislation. Illustration Subjects: Computer crime; Social conditions & trends Type: Commentary Length: Medium (10-30 col inches) 90144244 Title: Risky Business: Tackling Computer Security Authors: Peterson, Ivars Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373 Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech Abstract: In response to concerns about the security of US computer systems, a National Research Council panel issued a report detailing the extreme vulnerability of present-day systems. The report is discussed. Subjects: Computer crime; Computers & computer technology; National Research Council Type: News Length: Medium (10-30 col inches) 90142863 Title: Law: Breaking and Entering Authors: Lawren, Bill Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17 Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech Abstract: The US government's efforts to crack down on computer crime may violate the constitutional rights of hackers. The Electronic Frontier Foundation (EFF) has been formed to fight for those rights. Illustration Subjects: Computer crime; Civil rights; Electronic Frontier Foundation Type: Feature Length: Medium (10-30 col inches) 90128169 Title: Balancing the Books: Spectacular Computer Crimes Journal: Barron's Date: Oct 1, 1990 pp: 55 Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck BloomBecker about computer crime and the danger it poses to industry. Subjects: Computer crime Names: BloomBecker, Buck Type: Book Review-Unfavorable Length: Long (19+ col inches) 90125761 Title: Print Queue: Stomping the Nasties Authors: Kenner, Hugh Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System," by John McAfee and Colin Haynes. Illustration Subjects: Nonfiction; Computer crime; Computer programming & languages; Computers & computer technology Names: McAfee, John; Haynes, Colin Type: Book Review-Favorable Length: Long (31+ col inches) 90118815 Title: Apple Ad Arresting, but Will Stay in Can Authors: Johnson, Bradley Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6 Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV commercial before it was aired. Apparently the company thought the commercial might encourage the theft of Macintosh computers. Subjects: Advertising; Television; Computers & computer technology; Theft Companies: Apple Computer Inc Type: News Length: Short (1-9 col inches) 90109601 Title: Rights and Wrongs of Software Authors: Charles, Dan Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: Software copyrights have received much attention as software piracy proliferates. Some experts believe software restrictions will inhibit the development of better products and the growth of small firms. Photograph; Illustration Subjects: Software; Copyright; Computer programming & languages; Computer crime Type: Feature Length: Long (31+ col inches) 90108876 Title: Eternal Plague: Computer Viruses Authors: Cipra, Barry Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381 Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech Abstract: Recent findings indicate that there is no way to protect a computer against all possible viral attacks. Two basic types of computer viruses, the type that reproduces and the type that infects and alters an operating system, are described. Subjects: Computer programming & languages; Software; Operating systems; Computer crime Type: Feature Length: Medium (10-30 col inches) 90099926 Title: Computer Center Certifies First Secure Network Authors: Anonymous Journal: Aviation Week & Space Technology Vol: 133 Iss: 10 Date: Sep 3, 1990 pp: 42 Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech Abstract: The National Computer Center recently certified the first multi-level secure computer network, the Verdix Secure Local Area Network (VSLAN). Subjects: Computer networks; Computer crime; Security systems; National Computer Center Type: News Length: Short (1-9 col inches) 90099517 Title: Computer Hackers: United States v Zod Authors: Anonymous Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: The incompetence involved in the dramatic raids on computer hackers by the Secret Service is discussed. The question of whether its seizure of computers is constitutional is addressed. Photograph Subjects: Computer crime; Computer networks; Law enforcement; Search & seizure; Secret Service-US Type: Commentary Length: Medium (10-30 col inches) 90099086 Title: Computers, Crime, and the Law Authors: Branwyn, Gareth Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48 Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech; Socio/Environmental Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was part of an investigation into data piracy and computer crime. Computer professional's battle for free speech and privacy rights are detailed. Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US Companies: Steve Jackson Games Type: Commentary Length: Medium (10-30 col inches) 90144244 Title: Risky Business: Tackling Computer Security Authors: Peterson, Ivars Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373 Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech Abstract: In response to concerns about the security of US computer systems, a National Research Council panel issued a report detailing the extreme vulnerability of present-day systems. The report is discussed. Subjects: Computer crime; Computers & computer technology; National Research Council Type: News Length: Medium (10-30 col inches) 90142863 Title: Law: Breaking and Entering Authors: Lawren, Bill Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17 Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech Abstract: The US government's efforts to crack down on computer crime may violate the constitutional rights of hackers. The Electronic Frontier Foundation (EFF) has been formed to fight for those rights. Illustration Subjects: Computer crime; Civil rights; Electronic Frontier Foundation Type: Feature Length: Medium (10-30 col inches) 90128169 Title: Balancing the Books: Spectacular Computer Crimes Journal: Barron's Date: Oct 1, 1990 pp: 55 Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck BloomBecker about computer crime and the danger it poses to industry. Subjects: Computer crime Names: BloomBecker, Buck Type: Book Review-Unfavorable Length: Long (19+ col inches) 90125761 Title: Print Queue: Stomping the Nasties Authors: Kenner, Hugh Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System," by John McAfee and Colin Haynes. Illustration Subjects: Nonfiction; Computer crime; Computer programming & languages; Computers & computer technology Names: McAfee, John; Haynes, Colin Type: Book Review-Favorable Length: Long (31+ col inches) 90118815 Title: Apple Ad Arresting, but Will Stay in Can Authors: Johnson, Bradley Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6 Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV commercial before it was aired. Apparently the company thought the commercial might encourage the theft of Macintosh computers. Subjects: Advertising; Television; Computers & computer technology; Theft Companies: Apple Computer Inc Type: News Length: Short (1-9 col inches) 90109601 Title: Rights and Wrongs of Software Authors: Charles, Dan Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: Software copyrights have received much attention as software piracy proliferates. Some experts believe software restrictions will inhibit the development of better products and the growth of small firms. Photograph; Illustration Subjects: Software; Copyright; Computer programming & languages; Computer crime Type: Feature Length: Long (31+ col inches) 90108876 Title: Eternal Plague: Computer Viruses Authors: Cipra, Barry Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381 Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech Abstract: Recent findings indicate that there is no way to protect a computer against all possible viral attacks. Two basic types of computer viruses, the type that reproduces and the type that infects and alters an operating system, are described. Subjects: Computer programming & languages; Software; Operating systems; Computer crime Type: Feature Length: Medium (10-30 col inches) 90099926 Title: Computer Center Certifies First Secure Network Authors: Anonymous Journal: Aviation Week & Space Technology Vol: 133 Iss: 10 Date: Sep 3, 1990 pp: 42 Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech Abstract: The National Computer Center recently certified the first multi-level secure computer network, the Verdix Secure Local Area Network (VSLAN). Subjects: Computer networks; Computer crime; Security systems; National Computer Center Type: News Length: Short (1-9 col inches) 90099517 Title: Computer Hackers: United States v Zod Authors: Anonymous Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: The incompetence involved in the dramatic raids on computer hackers by the Secret Service is discussed. The question of whether its seizure of computers is constitutional is addressed. Photograph Subjects: Computer crime; Computer networks; Law enforcement; Search & seizure; Secret Service-US Type: Commentary Length: Medium (10-30 col inches) 90099086 Title: Computers, Crime, and the Law Authors: Branwyn, Gareth Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48 Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech; Socio/Environmental Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was part of an investigation into data piracy and computer crime. Computer professional's battle for free speech and privacy rights are detailed. Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US Companies: Steve Jackson Games Type: Commentary Length: Medium (10-30 col inches) 90144244 Title: Risky Business: Tackling Computer Security Authors: Peterson, Ivars Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373 Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech Abstract: In response to concerns about the security of US computer systems, a National Research Council panel issued a report detailing the extreme vulnerability of present-day systems. The report is discussed. Subjects: Computer crime; Computers & computer technology; National Research Council Type: News Length: Medium (10-30 col inches) 90142863 Title: Law: Breaking and Entering Authors: Lawren, Bill Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17 Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech Abstract: The US government's efforts to crack down on computer crime may violate the constitutional rights of hackers. The Electronic Frontier Foundation (EFF) has been formed to fight for those rights. Illustration Subjects: Computer crime; Civil rights; Electronic Frontier Foundation Type: Feature Length: Medium (10-30 col inches) 90128169 Title: Balancing the Books: Spectacular Computer Crimes Journal: Barron's Date: Oct 1, 1990 pp: 55 Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck BloomBecker about computer crime and the danger it poses to industry. Subjects: Computer crime Names: BloomBecker, Buck Type: Book Review-Unfavorable Length: Long (19+ col inches) 90125761 Title: Print Queue: Stomping the Nasties Authors: Kenner, Hugh Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System," by John McAfee and Colin Haynes. Illustration Subjects: Nonfiction; Computer crime; Computer programming & languages; Computers & computer technology Names: McAfee, John; Haynes, Colin Type: Book Review-Favorable Length: Long (31+ col inches) 90118815 Title: Apple Ad Arresting, but Will Stay in Can Authors: Johnson, Bradley Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6 Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV commercial before it was aired. Apparently the company thought the commercial might encourage the theft of Macintosh computers. Subjects: Advertising; Television; Computers & computer technology; Theft Companies: Apple Computer Inc Type: News Length: Short (1-9 col inches) 90109601 Title: Rights and Wrongs of Software Authors: Charles, Dan Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: Software copyrights have received much attention as software piracy proliferates. Some experts believe software restrictions will inhibit the development of better products and the growth of small firms. Photograph; Illustration Subjects: Software; Copyright; Computer programming & languages; Computer crime Type: Feature Length: Long (31+ col inches) 90108876 Title: Eternal Plague: Computer Viruses Authors: Cipra, Barry Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381 Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech Abstract: Recent findings indicate that there is no way to protect a computer against all possible viral attacks. Two basic types of computer viruses, the type that reproduces and the type that infects and alters an operating system, are described. Subjects: Computer programming & languages; Software; Operating systems; Computer crime Type: Feature Length: Medium (10-30 col inches) 90099926 Title: Computer Center Certifies First Secure Network Authors: Anonymous Journal: Aviation Week & Space Technology Vol: 133 Iss: 10 Date: Sep 3, 1990 pp: 42 Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech Abstract: The National Computer Center recently certified the first multi-level secure computer network, the Verdix Secure Local Area Network (VSLAN). Subjects: Computer networks; Computer crime; Security systems; National Computer Center Type: News Length: Short (1-9 col inches) 90099517 Title: Computer Hackers: United States v Zod Authors: Anonymous Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: The incompetence involved in the dramatic raids on computer hackers by the Secret Service is discussed. The question of whether its seizure of computers is constitutional is addressed. Photograph Subjects: Computer crime; Computer networks; Law enforcement; Search & seizure; Secret Service-US Type: Commentary Length: Medium (10-30 col inches) 90099086 Title: Computers, Crime, and the Law Authors: Branwyn, Gareth Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48 Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech; Socio/Environmental Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was part of an investigation into data piracy and computer crime. Computer professional's battle for free speech and privacy rights are detailed. Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US Companies: Steve Jackson Games Type: Commentary Length: Medium (10-30 col inches) 90098358 Title: Artificial Intelligence: Computerized Breaking and Entering Authors: Goldberg, Jeff Journal: Omni Vol: 12 Iss: 12 Date: Sep 1990 pp: 18 Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech Abstract: To combat computer "worms," such as the one created by Robert Tappan Morris, software vendors are offering enhanced security programs. The pros and cons of security are discussed. Illustration Subjects: Computer crime; Software; Security systems Type: Feature Length: Medium (10-30 col inches) 90096176 Title: Spring Books: Guardian of the Gates Authors: Dickman, Steven Journal: Nature Vol: 344 Iss: 6269 Date: Apr 26, 1990 pp: 895-896 Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech Abstract: Steven Dickman reviews "The Cuckoo's Egg," by Clifford Stoll. Photograph Subjects: Nonfiction; Espionage; Computer crime Names: Stoll, Clifford Type: Book Review-Favorable Length: Medium (10-30 col inches) 90095224 Title: Science and the Citizen: Digital Desperados Authors: Wallich, Paul Journal: Scientific American Vol: 263 Iss: 3 Date: Sep 1990 pp: 34-38 Jrnl Code: GSCA ISSN: 0036-8733 Jrnl Group: SciTech Abstract: Many computer experts feel that the government is acting overzealousy in its effort to crack down on computer crime. The definition of computer crime has come into question. Subjects: Computer crime; Law enforcement Type: News Length: Medium (10-30 col inches) 90094490 Title: Off the Hook Authors: Dibbell, Julian Journal: Village Voice Vol: 35 Iss: 34 Date: Aug 21, 1990 pp: 8 Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary Abstract: Federal prosecutors dropped charges against Craig M. Neidorf, better known as the Knight Lightning computer hacker, on Jul 24, 1990. Neidorf had published a document detailing Bellsouth's emergency 911 system, although corporate officials agreed that the information was not sensitive. Subjects: Computer crime; Publishing; Telecommunications industry Names: Neidorf, Craig M Companies: BellSouth Corp Type: News Length: Short (1-9 col inches) 90091236 Title: Sending a Signal Authors: Denning, Peter J Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990 pp: 11, 13 Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic Abstract: An editorial discusses Robert Morris Jr's criminal sentence. Morris was convicted in Jan 1990 of releasing a worm program into the Research Internet in Nov 1988. Morris was given a suspended jail term, a fine of $10,000 and 400 hours of community service. Illustration Subjects: Computer crime; Criminal sentences; Fines & penalties; Crime & criminals Names: Morris, Robert T Jr Type: Editorial Length: Medium (10-30 col inches) 90091223 Title: Insecurity about Security? Authors: Neumann, Peter G Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990 pp: 170 Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic Abstract: The security provided with many computer systems is fundamentally flawed. Better software and hardware systems are needed to hinder misuse from within and penetration. Illustration Subjects: Computers & computer technology; Computer crime; Security systems Type: Commentary Length: Medium (10-30 col inches) 90090104 Title: Forum: Playing the Data Game Authors: Wise, Bob; Scisco, Peter Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 16 Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech Abstract: The Democratic congressman from West Virginia and the editor of "Compute" magazine offer opinions on privacy and computer security. Illustration Subjects: Computer crime; Privacy Type: Commentary Length: Medium (10-30 col inches) 90090099 Title: Crime Bytes Back Authors: Marsa, Linda; Ray, Don Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 34-38+ Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech Abstract: The high-tech world of future computer cops and robbers is breathlessly described. Illustration Subjects: Computer crime; Law enforcement; Social conditions & trends; Future Type: Feature Length: Long (31+ col inches) 90090027 Title: Books: The Cuckoo's Egg Authors: Connolly, John W D Journal: Physics Today Vol: 43 Iss: 8 Date: Aug 1990 pp: 75-76 Jrnl Code: GPHT ISSN: 0031-9228 Jrnl Group: SciTech Abstract: John W. D. Connolly reviews "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage," by Clifford Stoll. Subjects: Nonfiction; Computer crime; Computer networks; Espionage Names: Stoll, Clifford Type: Book Review-Mixed Length: Medium (10-30 col inches) 90086946 Title: Hacker Trial under Way Authors: Anderson, G Christopher Journal: Nature Vol: 343 Iss: 6255 Date: Jan 18, 1990 pp: 200 Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech Abstract: The trial of Robert Morris Jr, the college student charged with creating the "Cornell virus" that struck thousands of US computers in 1988, is detailed. The law under which Morris is being prosecuted, and its implications for future law enforcement for computer crimes are examined. Photograph Subjects: Trials; Computer crime; Law enforcement Names: Morris, Robert Type: Feature Length: Medium (10-30 col inches) 90086606 Title: Viruses? Who You Gonna Call? 'Hackerbusters' Authors: Schwartz, Evan I; Rothfeder, Jeffrey Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 71-72 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: Computer security, where purveyors of special software and consulting methods offer protection from computer crime, is a $3 billion industry, but some critics claim that there are charlatans out there. Graph; Illustration Subjects: Industry profiles; Security systems; Computers & computer technology; Computer crime; Consultants Type: Feature Length: Medium (10-30 col inches) 90086605 Title: Computer Anarchism Calls for a Tough Response Authors: Rothfeder, Jeffrey; Schwartz, Evan I Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 72 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: While computer break-ins and viruses are admittedly dangerous, hysteria over the situation is no excuse for violating the constitutional rights of suspected hackers. Photograph Subjects: Computer crime; Civil rights Type: Commentary Length: Medium (10-30 col inches) 90085769 Title: Theft in the Classroom Authors: Thornburg, David D Journal: inCider Vol: 8 Iss: 8 Date: Aug 1990 pp: 88-90 Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech Abstract: The issue of software piracy as it relates to use of computer programs in the classroom is discussed. More sources of public funding are needed so schools won't be inclined to copy programs illegally. Subjects: Education & schools; Copyright; Software; Computer crime Type: Commentary Length: Medium (10-30 col inches) 90084275 Title: On Line and Out of Bounds Authors: Dibbell, Julian Journal: Village Voice Vol: 35 Iss: 30 Date: Jul 24, 1990 pp: 26-32 Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary Abstract: Computer hackers are penetrating some of the country's most sophisticated systems, and the government is targeting them as a serious threat to national security. Secret Service raids on hackers are described. Illustration Subjects: Computer crime; Computer networks; Classified information; National security; Secret Service-US Type: Feature Length: Long (31+ col inches) 90083828 Title: Crackdown on Hackers 'May Violate Civil Rights' Authors: Charles, Dan Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 22 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: The Electronic Frontier Foundation, a computer industry group, says US efforts to crack down on computer "hackers" may be unlawful and violate civil rights. Photograph Subjects: Computer crime; Laws & legislation; Civil rights; United States--US; Electronic Frontier Foundation Type: News Length: Medium (10-30 col inches) 90083805 Title: Private and Confidential Authors: Reynolds, Chris Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 58 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: The proliferation of electronic mail, bulletin boards and databases is raising concerns over security and privacy in the computer age. Illustration Subjects: Electronic mail; Computers & computer technology; Privacy; Computer crime Type: Commentary Length: Medium (10-30 col inches) 90081730 Title: Print Queue: Our Man in Berkeley Authors: Kenner, Hugh Journal: Byte Vol: 15 Iss: 3 Date: Mar 1990 pp: 360-362 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: Hugh Kenner reviews "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage," by Clifford Stoll. Illustration Subjects: Nonfiction; Computer crime; Espionage Names: Stoll, Clifford Type: Book Review-Favorable Length: Long (31+ col inches) 90081052 Title: 'Killer' Computer Viruses: An Idea Whose Time Shouldn't Come Authors: Lewyn, Mark Journal: Business Week Iss: 3170 Date: Jul 23, 1990 pp: 30 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: The Defense Department's scheme to use a "killer" computer virus to infiltrate an enemy's computer system is discussed. Although feasible, the concept could prove to be costly in more ways than one. Illustration Subjects: Computer crime; Espionage; Department of Defense Type: Commentary Length: Medium (10-30 col inches) 90078513 Title: Hackers of the World, Unite! Authors: Schwartz, John Journal: Newsweek Vol: 116 Iss: 1 Date: Jul 2, 1990 pp: 36-37 Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News Abstract: As law-enforcement officials widen their crackdown on computer tampering, computer pioneers like Mitch Kapor and Steve Wozniak are joining in an effort to defend hackers and the freedom of information. Photograph Subjects: Computers & computer technology; Law enforcement; Computer crime Type: News Length: Long (31+ col inches) 90074799 Title: Man with a Modem Authors: Campbell, Peter Journal: New Statesman & Society Vol: 3 Iss: 106 Date: Jun 22, 1990 pp: 54 Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary Abstract: Peter Campbell reviews "Beating the System: Hackers, Phreakers and Electronic Spies," by Owen Bowcott and Sally Hamilton. Subjects: Nonfiction; Computer crime Names: Bowcott, Owen; Hamilton, Sally Type: Book Review-Mixed Length: Medium (10-30 col inches) 90062822 Title: Microcomputer Security and Control Authors: Forgione, Dana; Blankley, Alan Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990 pp: 83-90 Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business Abstract: Six tips for accountants on maintaining microcomputer security are offered. Photograph; Table Subjects: Personal computers; Computer crime; Accounting & accountants Type: Feature Length: Long (31+ col inches) 90062815 Title: Book Review: Computer Audit, Control, and Security Authors: Iacono, Lisa M Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990 pp: 150-151 Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business Abstract: Lisa M. Iacono reviews "Computer Audit, Control, and Security," by Robert R. Moeller. Subjects: Nonfiction; Accounting & accountants; Computers & computer technology; Computer crime; Security systems Names: Moeller, Robert R Type: Book Review-Favorable Length: Medium (10-30 col inches) 90062001 Title: The Risk of Computing Authors: Reynolds, Chris Journal: New Scientist Vol: 126 Iss: 1718 Date: May 26, 1990 pp: 64 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: Chris Reynolds reviews "Viruses, Bugs and Star Wars," by Geoff Simons. Illustration Subjects: Nonfiction; Computers & computer technology; Computer crime Names: Simons, Geoff Type: Book Review-Unfavorable Length: Medium (10-30 col inches) 90061371 Title: Thanks for Wiping the Memory Authors: Thimbleby, Harold Journal: New Scientist Vol: 126 Iss: 1717 Date: May 19, 1990 pp: 69 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: It is nice to think the computer viruses have a bright side: forcing programs, professional standards and hardware to improve. If viruses were unable to corrupt programs, then anything or anyone else would also find it harder. Subjects: Computers & computer technology; Computer crime; Software Type: Commentary Length: Medium (10-30 col inches) 90047219 Title: Conversations Authors: Ferrell, Keith Journal: Compute! Vol: 12 Iss: 5 Date: May 1990 pp: 98 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: According to Buck BloomBecker, the director of the National Center for Computer Crime Data, there is a potential for computer crime everywhere computers are located. There is a variety of motivations that underlie this type of crime. Photograph Subjects: Computer crime; National Center for Computer Crime Data Names: BloomBecker, Buck Type: Commentary Length: Medium (10-30 col inches) 90046190 Title: The Hacker Dragnet Authors: Schwartz, John Journal: Newsweek Vol: 115 Iss: 18 Date: Apr 30, 1990 pp: 50 Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News Abstract: Federal authorities are in hot pursuit of computer criminals. However, innocent victims may be being swept up in the hunt. Illustration Subjects: Computer crime; Crime & criminals; Law enforcement Type: News Length: Medium (10-30 col inches) 90045192 Title: Hackers 'Plan Revenge' for Police Clampdown on Computer Crime Authors: Charles, Dan; O Neill, Graeme Journal: New Scientist Vol: 126 Iss: 1713 Date: Apr 21, 1990 pp: 24 Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech Abstract: Managers of computer networks in the US and Australia have sent out warnings that "hackers" may try to take revenge for recent attempts by police to crack down on computer crime. Subjects: Computers & computer technology; Computer networks; Computer crime; Crime & criminals Type: News Length: Medium (10-30 col inches) 90042567 Title: Busting Computer Viruses: Who Ya Gonna Call? Authors: Anonymous Journal: Economist Vol: 315 Iss: 7649 Date: Apr 7, 1990 pp: 78 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: The onslaught of damage to computer systems by viruses and hackers is expected to increase. Halting the problem will mean stricter control on the use of PCs. Illustration Subjects: Computers & computer technology; Personal computers; Computer crime Type: News Length: Medium (10-30 col inches) 90042105 Title: A 75 (Cent) Discrepancy Propels Astronomer Into a Maze of Computer Networks and Onto a Best-Seller List Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 36 Iss: 29 Date: Apr 4, 1990 pp: A3 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Clifford Stoll's investigation of a 75-cent discrepancy in some computer accounts in 1986 led him to track a spy through a maze of computer networks. Stoll catalogued the techniques the spy used in his book "The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage." Photograph Subjects: Computers & computer technology; Biographical profiles; Espionage; Computer crime Names: Stoll, Clifford Type: News Length: Medium (10-30 col inches) 90041088 Title: Computer Whiz Guilty Authors: Burstyn, Harold L Journal: ABA Journal Vol: 76 Date: Apr 1990 pp: 20 Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business Abstract: In one of the first jury trials under the Computer Fraud and Abuse Act, a federal jury convicted a graduate student named Robert T. Morris of launching a rogue program called a worm that shut down hundreds of computers across the US. He intended no malice and was not sent to jail. Photograph Subjects: Court rulings; Computers & computer technology; Criminal sentences; Computer crime Names: Morris, Robert T Jr Type: News Length: Medium (10-30 col inches) 90038941 Title: Books and Arts: Computer Hackers--The 75-Cent Solution Authors: Anonymous Journal: Economist Vol: 314 Iss: 7648 Date: Mar 31, 1990 pp: 84-85 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: "The Cuckoo's Egg," by Clifford Stoll, is reviewed. Subjects: Computer crime; Nonfiction Names: Stoll, Clifford Type: Book Review-Favorable Length: Short (1-9 col inches) 90037281 Title: Stranger than Fiction Authors: Carver, Robert Journal: New Statesman & Society Vol: 3 Iss: 91 Date: Mar 9, 1990 pp: 38 Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary Abstract: Robert Carver reviews "The Cuckoo's Egg," by Clifford Stoll. Photograph Subjects: Nonfiction; Computer crime; Espionage; Investigations Names: Stoll, Clifford Type: Book Review-Favorable Length: Medium (10-30 col inches) 90034139 Title: Hunt for the Hacker Spy Authors: Elliott, Lawrence Journal: Reader's Digest Vol: 136 Iss: 816 Date: Apr 1990 pp: 185-232 Jrnl Code: GRDI ISSN: 0034-0375 Jrnl Group: Lifestyles Abstract: The mystery began when Clifford Stoll, a systems manager at the Lawrence Berkeley Laboratory in Berkeley CA, learned of an unexplained seventy-five-cent charge for computer time. Concerned that someone was invading the US military networks, Stoll began to hunt down the hacker. Photograph; Illustration Subjects: Espionage; Computer crime; Defense industry Names: Stoll, Clifford Type: Feature Length: Long (31+ col inches) 90032796 Title: Hi-Tech Mall Crawl Authors: Dibbell, Julian Journal: Village Voice Vol: 35 Iss: 12 Date: Mar 20, 1990 pp: S12 Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary Abstract: Eric Corley, the publisher of a computer hacker's magazine called "2600," discusses why he and others are lured to messing with the government's computer systems. Subjects: Computer crime Names: Corley, Eric Type: Feature Length: Medium (10-30 col inches) 90031482 Title: Tennessee Suspends 19 for Computer Tampering Authors: Anonymous Journal: Chronicle of Higher Education Vol: 36 Iss: 26 Date: Mar 14, 1990 pp: A2 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: The University of Tennessee has suspended 19 students for at least one semester for gaining access to the computer program that controls the dropping and adding of courses past the deadline. No grades were changed. Subjects: Computer crime; Colleges & universities; Students Type: News Length: Short (1-9 col inches) 90026028 Title: Computer Security: Gaining the CEO's Support Authors: Horton, Thomas R Journal: Vital Speeches of the Day Vol: 56 Iss: 10 Date: Mar 1990 pp: 307-310 Jrnl Code: VSP ISSN: 0042-742X Jrnl Group: Commentary Abstract: Chief executive officers have been lamentably disinterested in computer security, occasionally to their misfortune. Communication is the key to any new program, and computer security personnel must make it easy for busy CEOs to comprehend their security needs and options. Confusion among different departments makes implementing security a challenge. Subjects: Computer crime; Security systems; Chief executive officers Type: Speech Length: Long (31+ col inches) 90025552 Title: When a Virus Makes Your PC Sneeze Authors: Wiener, Daniel P Journal: U.S. News & World Report Vol: 108 Iss: 8 Date: Feb 26, 1990 pp: 62 Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News Abstract: Those who operate personal computers over telephone lines or trade software with friends increase the risk of contracting a computer virus. "Blocker" programs, available for PCs, can help one prevent or track viruses. Illustration Subjects: Personal computers; Software; Computer crime; Security systems Type: Feature Length: Medium (10-30 col inches) 90021932 Title: Is Computer Hacking a Crime? Authors: Anonymous Journal: Harper's Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57 Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary Abstract: A round-table discussion on the ethics of computer hacking is presented. The panelists include computer hackers, scientists, activists and media members. Subjects: Computer crime; Ethics; Social life & customs Type: Feature Length: Long (31+ col inches) 90020898 Title: Computers/Communications: Fraud Busters Authors: Siler, Charles Journal: Forbes Vol: 145 Iss: 4 Date: Feb 19, 1990 pp: 154-158 Jrnl Code: FBR ISSN: 0015-6914 Jrnl Group: Business Abstract: More than 50 companies, from Texas Instruments to Spectrix Inc, are developing tamper-proof computer networks to prevent investors from being cheated on the futures exchanges. This new technology is discussed. Photograph; Illustration Subjects: Computers & computer technology; Company profiles; Computer crime Companies: Texas Instruments Inc; Spectrix Inc Type: Feature Length: Long (31+ col inches) 90020575 Title: Morris Code Authors: Hafner, Katie Journal: New Republic Vol: 202 Iss: 8 Date: Feb 19, 1990 pp: 15-16 Jrnl Code: GTNR ISSN: 0028-6583 Jrnl Group: Commentary Abstract: Robert Tappan Morris, the young man who infiltrated Internet, a nationwide computer network, has recieved a stiff penalty from the Justice Department. His crime was actually far less pernicious than most others. Subjects: Computer crime; Criminal sentences Names: Morris, Robert T Jr Type: Feature Length: Long (31+ col inches) 90019137 Title: Scenes from Science: Hacking for Adventure Authors: Cooper, William Journal: Spectator Vol: 264 Iss: 8431 Date: Feb 10, 1990 pp: 10 Jrnl Code: GSPE ISSN: 0038-6952 Jrnl Group: Commentary Abstract: The case of the US Justice Department versus Cornell graduate student Robert Morris Jr will be a forum to evaluate the effectiveness of the Computer Fraud and Abuse Act. Subjects: Computer crime; Laws & legislation; Trials Names: Morris, Robert Jr Type: News Length: Short (1-9 col inches) 90019041 Title: Hacked to Pieces Authors: Jenkins, Jolyon Journal: New Statesman & Society Vol: 3 Iss: 87 Date: Feb 9, 1990 pp: 27 Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary Abstract: There is a good reason why people other than computer hackers and high-tech fraudsters should worry about computer crime legislation: Laws made in response to moral panic usually fail to catch real criminals and end up restricting civil liberties for everyone. Subjects: Computer crime; Laws & legislation; Civil rights Type: Feature Length: Medium (10-30 col inches) 90015840 Title: Around the Mall and Beyond Authors: Park, Edwards Journal: Smithsonian Vol: 20 Iss: 11 Date: Feb 1990 pp: 20-26 Jrnl Code: GSMI ISSN: 0037-7333 Jrnl Group: Socio/Environmental; SciTech Abstract: Astronomer-author-hacker Clifford Stoll is interviewed. Stoll is the author of "The Cuckoo's Egg," a computer-age detective story. Photograph Subjects: Scientists; Computer crime; Biographical profiles Names: Stoll, Clifford Type: Interview Length: Long (31+ col inches) 90015267 Title: Deterring Computer Crime Authors: Rosenblatt, Kenneth Journal: Technology Review Vol: 93 Iss: 2 Date: Feb 1990 pp: 34-40 Jrnl Code: TCR ISSN: 0040-1692 Jrnl Group: SciTech Abstract: Computer-illiterate police cannot combat the growing incidence of electronic theft and vandalism. What's needed are special task forces and penalties that fit the crime, such as taking away an offender's computer. Illustration Subjects: Computers & computer technology; Computer crime; Law enforcement Type: Feature Length: Long (31+ col inches) 90008297 Title: Computer Hacking Goes on Trial Authors: Allman, William F Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990 pp: 25 Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News Abstract: The trial of Robert Morris, a graduate student who unleashed a "worm" that caused computers around the US to grind to a halt on Nov 2, 1988, is discussed. Photograph; Illustration Subjects: Trials; Computer crime Names: Morris, Robert Type: News Length: Medium (10-30 col inches) 89127748 Title: Ethical Responsibility Key to Computer Security Authors: Lynn, M Stuart Journal: Educational Record Vol: 70 Iss: 2 Date: Spring 1989 pp: 36-39 Jrnl Code: GEDR ISSN: 0013-1873 Jrnl Group: Academic Abstract: The recent Computer Worm incident raised the issue of ethical standards relating to computer networks and information. The pervasiveness of powerful computers makes ethical behavior morally and practically necessary. Illustration; References Subjects: Computer crime; Computers & computer technology; Ethics; Morality Type: Feature Length: Long (31+ col inches) 89121419 Title: Hackers: Is a Cure Worse Than the Disease? Authors: Lewyn, Mark Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: Because of computer hacking, Pentagon officials would like to add more layers of security to protect their networks. But this would limit access to university and government scientists, who use the information the most. Photograph Subjects: Computer crime; Security systems; Computer networks Names: Morris, Robert Jr Type: Commentary Length: Medium (10-30 col inches) 89106603 Title: Halting Hackers Authors: Anonymous Journal: Economist Vol: 313 Iss: 7626 Date: Oct 28, 1989 pp: 18 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: An editorial discusses the need for laws to protect against computer crimes. Illustration Subjects: Computer crime; Laws & legislation Type: Editorial Length: Short (1-9 col inches) 89104122 Title: If Your Computer Catches a Virus on Friday the 13th, Who You Gonna Call? John McAfee Authors: Anonymous Journal: People Weekly Vol: 32 Iss: 16 Date: Oct 16, 1989 pp: 77 Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles Abstract: John McAfee, computer virus exterminator "extraordinaire," has created a so-called disinfectant program that can determine whether a virus has invaded computer. His program can wipe out the virus and repair the damage. Photograph Subjects: Computer crime; Computers & computer technology; Biographical profiles Names: McAfee, John Type: Feature Length: Medium (10-30 col inches) 89103846 Title: This Morning's Computer Virus--Unlucky for Some Authors: Anonymous Journal: Economist Vol: 313 Iss: 7624 Date: Oct 14, 1989 pp: 100-102 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News Abstract: A recent computer virus called Datacrime, which was designed to damage databases on Friday, October 13th, has so far infected thousands of computers in Europe. Subjects: Computer crime; Software; Data bases Type: Commentary Length: Medium (10-30 col inches) 89101302 Title: Short-Circuiting Computer Crime Authors: Bloombecker, J J Journal: Datamation Vol: 35 Iss: 19 Date: Oct 1, 1989 pp: 71-72 Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech Abstract: Assessing what other IS managers are doing to safeguard computer systems is probably the best source of ideas on how to shut down computer crime, a $500 million a year industry. Graph Subjects: Computer crime; Security systems; Computers & computer technology; Industry profiles Type: Feature Length: Long (31+ col inches) 89101248 Title: Crimes of the Heart? Authors: Crabb, Don Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 144E-144H Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: The person who stole and disseminated the source code to some of Apple's Macintosh ROM deserves a punishment to fit the horrible crime. As Apple moves into the first quarter of the 1990 fiscal year, several products Macintosh users hope to see introduced are discussed. Illustration Subjects: Product development; Computer crime Companies: Apple Computer Inc Type: Commentary Length: Long (31+ col inches) 89101228 Title: Goodbye, Mr. Chips Authors: Wayner, Peter Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 364 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: The computer revolution is threatened with the curse of success. Once eveyone starts using some new machine, the temptation to make everything right by regulation comes creeping in. Subjects: Computers & computer technology; Computer crime; Government regulation Type: Commentary Length: Medium (10-30 col inches) 89096642 Title: Brave New World Authors: Dibbell, Julian Journal: Village Voice Vol: 34 Iss: 39 Date: Sep 26, 1989 pp: S7, S10+ Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary Abstract: The software industry has picked up its legal attacks on pirates, targeting corporate offenders in particular. The steps that the industry are taking are discussed. Illustration Subjects: Computers & computer technology; Computer crime Type: Feature Length: Long (31+ col inches) 89091613 Title: Coping with a PC Virus Authors: Rosenberg, Jim Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989 pp: 8PC-10PC Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: The Commercial Appeal, a Memphis TN newspaper, recently had an encounter with a computer virus. The company was able to remedy the problem quickly with an anti-viral program. Subjects: Newspapers; Company profiles; Computers & computer technology; Computer crime Companies: Commercial Appeal Type: Commentary Length: Long (31+ col inches) 89091612 Title: Combatting PC Viruses Authors: Rosenberg, Jim Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989 pp: 11PC, 31PC Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: The House Telecommunication and Finance subcommittee will present legislation that will include stiff penalties against those who infect computer systems with a virus. Subjects: Laws & legislation; Computers & computer technology; Viruses; Computer crime Type: Commentary Length: Medium (10-30 col inches) 89089348 Title: Free the Hacker Two Authors: Corley, Eric Journal: Harper's Vol: 279 Iss: 1672 Date: Sep 1989 pp: 22-26 Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary Abstract: An editorial urges the release of computer "hackers" imprisoned for computer crimes. Excerpted from the book "Hackers in Jail." Subjects: Computer crime Type: Editorial Length: Long (31+ col inches) 89083744 Title: Nonfiction: The Cuckoo's Egg Authors: Stuttaford, Genevieve Journal: Publishers Weekly Vol: 236 Iss: 6 Date: Aug 11, 1989 pp: 448 Jrnl Code: GPUB ISSN: 0000-0019 Jrnl Group: Commentary; Business Abstract: Genevieve Stuttaford reviews "The Cuckoo's Egg: Tracking a Spy through the Maze of Computer Espionage," by Cliff Stoll. Subjects: Nonfiction; Computer crime Names: Stoll, Clifford Type: Book Review-Favorable Length: Short (1-9 col inches) 89078212 Title: Computer Viruses Authors: Vasilyev, Dmitri; Novikov, Yevgeni Journal: Soviet Life Iss: 7 Date: Jul 1989 pp: 37-39 Jrnl Code: GSOV ISSN: 0038-5549 Jrnl Group: Lifestyles; Commentary Abstract: The increased use of computers in the Soviet Union brings problems familiar to Western users, especially computer viruses. Soviet computer scientists Alfred Ailamazyan and Sergei Abramov are interviewed about Soviet computer viruses and computer security. Photograph Subjects: Computer crime; Security systems; Union of Soviet Socialist Republics--USSR Names: Ailamazyan, Alfred; Abramov, Sergei Type: Interview Length: Long (31+ col inches) 89077225 Title: The Computer Contagion Authors: Kenyon, David M Journal: ABA Journal Vol: 75 Date: Jun 1989 pp: 116-117 Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business Abstract: Computer viruses can spread from computer to computer, including those in law firms. Strategies for protecting against computer viruses are discussed, including establishing a policy of who may use the firm's computers and making paper backups of important material. Illustration Subjects: Computer crime; Legal professions Type: Feature Length: Long (31+ col inches) 89076390 Title: Viruses, Worms, Trojans, and Bombs Authors: Stover, Dawn Journal: Popular Science Vol: 235 Iss: 3 Date: Sep 1989 pp: 59-62+ Jrnl Code: GPOS ISSN: 0161-7370 Jrnl Group: SciTech Abstract: Viruses, worms, trojans, and bombs are electronic infections that make computers sick. They have actually crippled huge government networks as well as PCs. Purported preventions, including "vaccine" programs and protective hardware, are examined. Illustration Subjects: Computer crime; Computers & computer technology Type: Feature Length: Long (31+ col inches) 89074853 Title: Your Family Finances: "Credit Doctors" Can Hurt You Authors: Plawin, Paul; Kainen, Bertha; Buttenheim, Alison Journal: Changing Times Vol: 43 Iss: 8 Date: Aug 1989 pp: 78 Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Business; Socio/Environmental Abstract: People can steal data from a computerized file and sell the names and information of people with good credit to people with the same name whose credit is poor. Illustration Subjects: Credit; Computer crime; Theft Type: Commentary Length: Short (1-9 col inches) 89070945 Title: A Secret No More Authors: Kerr, Susan Journal: Datamation Vol: 35 Iss: 13 Date: Jul 1, 1989 pp: 53-55 Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech Abstract: As distributed processing and applications such as electronic mail grow, companies are concerned about data security, and they are evaluating their vulnerability to electronic breaches. Data encryption is one solution. Illustration Subjects: Security systems; Computer crime Type: Feature Length: Long (31+ col inches) 89070893 Title: 'Virus' Attacks ANPA's Computer Authors: Fitzgerald, Mark Journal: Editor & Publisher Vol: 122 Iss: 26 Date: Jul 1, 1989 pp: 34 Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: A computer virus recently contaminated all of the software in the American Newspaper Publishers Association's desktop publishing laboratory. Three virus cleaners were used to disinfect the laboratory. Subjects: Newspapers; Computers & computer technology; Computer crime; American Newspaper Publishers Association Type: News Length: Medium (10-30 col inches) 89066677 Title: Software At-A-Glance: Virex Authors: Gordon, Molly Journal: Electronic Learning Vol: 8 Iss: 8 Date: Jun 1989 pp: 51 Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech Abstract: Molly Gordon reviews Virex, a software package that detects and repairs contamination by scores, nVir, and Peace viruses. The package, for the Macintosh Plus/SE/II, is from HJC Software. Subjects: Software; Computer crime Products: HJC Virex Companies: HJC Software Type: Product Review-Favorable Length: Short (1-9 col inches) 89062041 Title: Colleges Seem Vulnerable to Legal Actions Arising from Computer Viruses Authors: Moore, Thomas H Journal: Chronicle of Higher Education Vol: 35 Iss: 42 Date: Jun 28, 1989 pp: A1, A20 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: A report issued by the American Council on Education and the United Educators Insurance Risk Retention Group concludes that colleges and universities are unusually vulnerable to lawsuits arising from computer viruses and must take steps to reduce their liability. The report is examined. Subjects: Computer crime; Lawsuits; Colleges & universities; Liability Type: Feature Length: Medium (10-30 col inches) 89059272 Title: Let's Get Reckless Authors: Gaines, Donna Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15 Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary Abstract: The developing social importance of computer viruses is explored. Computer hacking and computer viruses have penetrated the consciousness of the mainstream media and are being countered by federal legislation. Illustration Subjects: Computer crime; Social conditions & trends Type: Commentary Length: Medium (10-30 col inches) 89053593 Title: The Missing Lists Authors: Steacy, Anne Journal: Maclean's Vol: 102 Iss: 20 Date: May 15, 1989 pp: 58 Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News Abstract: A series of break-ins at the offices of Toronto Canada-based environmental groups involving computer lists and data banks have raised suspicions that Canadian government organizations might be looking for information to discredit the groups. Photograph Subjects: Crime & criminals; Computer crime; Environment; Activism; Toronto Ontario Canada Type: Feature Length: Medium (10-30 col inches) 89049351 Title: The Tampa Media-Espionage Case Authors: Hoyt, Michael Journal: Columbia Journalism Review Vol: 28 Iss: 1 Date: May 1989 pp: 27-31 Jrnl Code: GCJR ISSN: 0010-194X Jrnl Group: Academic Abstract: Michael Shapiro, assistant news director at WTSP-TV in St. Petersburg Fl and computer hacker, is accused of using his computer modem at home to break into his competitor's files. The case is discussed. Photograph Subjects: Computer crime; Television news; Competition; Journalism & journalists Names: Shapiro, Michael Type: Feature Length: Long (31+ col inches) 89046556 Title: Avoiding Virus Hysteria Authors: Honan, Patrick Journal: Personal Computing Vol: 13 Iss: 5 Date: May 1989 pp: 84-92 Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech Abstract: Common-sense strategies and a few good tools can help keep a company's data and equipment safe from computer viruses, time bombs or Trojan horses. Illustration; Photograph Subjects: Computer crime; Computers & computer technology; Security systems Type: Feature Length: Long (31+ col inches) 89037736 Title: Student Acted Alone in Spreading Computer 'Worm,' Cornell Report Says Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 30 Date: Apr 5, 1989 pp: A18 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: A report from Cornell University says that Robert T. Morris Jr, a graduate student at the university, acted alone in November 1988 when he released on a national research network a computer program that slowed or halted as many as 6,000 computers in the US. Subjects: Computer crime; Colleges & universities; Students; Cornell University Names: Morris, Robert T Jr Type: Feature Length: Medium (10-30 col inches) 89035435 Title: Computer Viruses: An Epidemic Real or Imagined? Authors: Chaffin, Ellen Journal: Electronic Learning Vol: 8 Iss: 6 Date: Apr 1989 pp: 36-37 Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech Abstract: Computer viruses have become an unpleasant fact of life. Tips are given to combat the problems a computer virus may cause. Much of the damage done by the virus is caused by of carelessness. Illustration Subjects: Computer crime; Computers & computer technology Type: Feature Length: Long (31+ col inches) 89031460 Title: German Computer Spy Ring Broken Authors: Marshall, Eliot Journal: Science Vol: 243 Iss: 4898 Date: Mar 24, 1989 pp: 1545 Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic Abstract: The arrest of three West German techno-vandals in March, 1989 ended a two year investigation of security breaches of computers from a US military base in Japan to a laboratory in California to several German universities and research institutes. Subjects: Computer crime; Espionage; Investigations; West Germany Names: Hess, Markus Type: General Information Length: Medium (10-30 col inches) 89027847 Title: Art ATMs Easy Targets for Crooks? Authors: Cole, Patrick; Levine, Jonathan B Journal: Business Week Iss: 3094 Date: Mar 6, 1989 pp: 30 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: Computer systems that monitor electronic transfers are becoming an easy target for criminal operations. Several recent incidents are described. Photograph Subjects: Computer crime; Banks & banking; Automated teller machines--ATM; Crime & criminals Type: General Information Length: Medium (10-30 col inches) 89026462 Title: Information (Mis)management Authors: Thompson, Tom Journal: Byte Vol: 14 Iss: 3 Date: Mar 1989 pp: MAC 2 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: Computer viruses and worms can destroy data and infect computer systems. Safeguards are necessary so that viruses do not imperil the free exchange of information among programmers who fear infection. Subjects: Computers & computer technology; Computer crime; Sabotage Type: Editorial Length: Medium (10-30 col inches) 89025356 Title: The Global Village under Seige--We've Met the Enemy and He Is Us Authors: Thornburg, David D Journal: Compute! Vol: 11 Iss: 3 Date: Mar 1989 pp: 13 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: While personal workstations are good, interconnecting with a network can provide advantages. Networking is now being challenged by fears of computer viruses. Subjects: Computer networks; Computers & computer technology; Computer crime Type: Commentary Length: Medium (10-30 col inches) 89018587 Title: The Virus Cure Authors: McAfee Journal: Datamation Vol: 35 Iss: 4 Date: Feb 15, 1989 pp: 29-40 Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business Abstract: Computer viruses are plaguing many of the large computer networks. Over 300 major virus attacks happened in the first seven months of 1988. Advice on how to prevent viruses and recover when they occur is given. Illustration Subjects: Computer crime; Computer networks; Computers & computer technology; Viruses Type: Feature Length: Long (31+ col inches) 89016758 Title: Student Linked to Computer 'Virus' Granted Immunity by U. S. Attorney Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 22 Date: Feb 8, 1989 pp: A2 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Robert T. Morris, the Cornell University student believed to be the creator of the computer "virus" that paralyzed a national research network in 1988, has been granted limited immunity by the US Attorney's office in Syracuse New York. Subjects: Computer crime Names: Morris, Robert T Type: News Length: Short (1-9 col inches) 89014959 Title: Avoid It Like the Plague: Protecting Yourself from Computer Virus Attacks Authors: Esters, Stephanie D Journal: Black Enterprise Vol: 19 Iss: 7 Date: Feb 1989 pp: 55-56 Jrnl Code: BEN ISSN: 0006-4165 Jrnl Group: Business; Socio/Environmental Abstract: Protecting computer systems against viruses has become a top priority for government, academia and business. Computer crime is responsible for $5 billion in losses annually. Several antiviral programs are described. Subjects: Computers & computer technology; Computer crime; Software Type: General Information Length: Long (31+ col inches) 89012668 Title: Blanket Security Authors: Perdue, Lewis Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 164-167 Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech Abstract: Computer crime is a serious problem and PC users are fighting back with extra-strength security precautions. Physical protection, data encryption and passwords are a few ways to protect these computers. Table; Illustration Subjects: Computer crime; Personal computers; Security systems Type: Feature Length: Long (31+ col inches) 89012658 Title: Chicken Pox or Chicken Little? Authors: Dolce, Mary A Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 280 Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech Abstract: The fear of computer viruses has been somewhat misleading. Software saboteurs prefer to attack large companies rather than PC users in general. Users can take some simple precautions against the threat of destructive software. Subjects: Software; Computer crime Type: Commentary Length: Medium (10-30 col inches) 89007662 Title: Computer Flu is After You Authors: Boudette, Neal E. Journal: Industry Week Vol: 238 Iss: 2 Date: Jan 16, 1989 pp: 39-40 Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business Abstract: Companies shouldn't think themselves immune to computer viruses. Companies must reevaluate their computer security policies and proceedures, and use consultants to fix problems before their computer systems catch a virus. Illustration Subjects: Computer crime; Business & industry; Security systems Type: Feature Length: Medium (10-30 col inches) 89006239 Title: Drop the Phone Authors: Anonymous Journal: Time Vol: 133 Iss: 2 Date: Jan 9, 1989 pp: 49 Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News Abstract: Kevin Mitnick, who has a long record of computer crime, is currently facing a possible 30 years in prison and a $750,000 fine for several crimes covered by a new federal law that prohibits breaking into an interstate computer network for criminal purposes. Mitnick commits most of his crimes via the telephone. Photograph Subjects: Computer crime; Crime & criminals; Computer networks; Telephones Names: Mitnick, Kevin Type: News Length: Short (1-9 col inches) 89004747 Title: The Data Bandits Authors: Adney, William M.; Kavanagh, Douglas E. Journal: Byte Vol: 14 Iss: 1 Date: Jan 1989 pp: 267-270 Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech Abstract: Possible security threats to a LAN are discussed, including viruses, data theft and accidental data destruction. Tips on making a LAN more secure are offered. Photograph Subjects: Computer networks; Computer crime; Security systems Type: Feature Length: Long (31+ col inches) 89004699 Title: ComputerScan: Antiviral Shields Authors: Branwyn, Gareth; Clabaugh, Gavin Journal: Futurist Vol: 23 Iss: 1 Date: Jan 1989 pp: 38 Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental; SciTech Abstract: Branwyn and Clabaugh review InterPath's new anti-computer virus shield C-4, short for Cylene-4. Subjects: Software; Computer crime Products: InterPath C-4 Companies: InterPath Corp Type: Product Review-Favorable Length: Short (1-9 col inches) 89003483 Title: Disease of the Year: Illness of Glitch Authors: Vogel, Shawna Journal: Discover Vol: 10 Iss: 1 Date: Jan 1989 pp: 64-66 Jrnl Code: GDIS ISSN: 0274-7529 Jrnl Group: SciTech Abstract: The most talked-about virus of 1988 infects computers, not organisms. Computer viruses are programs that destroy other programs and data by incessantly replicating themselves, similar to a viral infection in the body. Illustration; Photograph Subjects: Computer crime; Computer programming & languages; Viruses Names: Morris, Robert Jr Type: Feature Length: Long (31+ col inches) 89000654 Title: Revenge of the Nerds Authors: Martin, Nicholas Journal: Washington Monthly Vol: 20 Iss: 12 Date: Jan 1989 pp: 21-24 Jrnl Code: GTWM ISSN: 0043-0633 Jrnl Group: Commentary Abstract: The real problem with computer viruses, like the one recently created by Robert T. Morris Jr, isn't the brilliant programmers, but the easy access to classified data and the dearth of security measures. Illustration Subjects: Computer crime; Computers & computer technology; Security systems; Classified information Names: Morris, Robert T Jr Type: Commentary Length: Long (31+ col inches) 88178609 Title: Greater Awareness of Security in Aftermath of Computer Worm Authors: Shulman, Seth; Palca, Joseph Journal: Nature Vol: 336 Iss: 6197 Date: Nov 24, 1988 pp: 301 Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech Abstract: The recent attack of an unauthorized computer program upon thousands of computer systems around the US using the ARPANET, Milnet and NSF Net computer networks and the ensuing debate over the need for increased security are described. Illustration Subjects: Computers & computer technology; Computer crime; Security systems Type: Feature Length: Medium (10-30 col inches) 88178491 Title: Networked Computers Hit by Intelligent 'Virus' Authors: Palca, Joseph; Shulman, Seth Journal: Nature Vol: 336 Iss: 6195 Date: Nov 10, 1988 pp: 97 Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech Abstract: Thousands of people using the UNIX computer operating system were infiltrated via electronic mail during Nov 1988. The virus, which was created by Robert T. Morris, a graduate student in computer science at Cornell University in Ithaca NY, is discussed. Subjects: Computers & computer technology; Computer crime; Electronic mail Names: Morris, Robert T Jr Type: News Length: Medium (10-30 col inches) 88174189 Title: Minding the Store: Part Two Authors: Hirsch, Rudolph E Journal: Public Relations Journal Vol: 44 Iss: 5 Date: May 1988 pp: 39 Jrnl Code: PRJ ISSN: 0033-3670 Jrnl Group: Business Abstract: System unavailability due to human error or natural disasters is a common computer-security problem. The best precaution against system unavailability is duplexing, having two of a given component. The process is described. (Part 2 of a series) Subjects: Computers & computer technology; Software; Computer crime Type: Feature Length: Medium (10-30 col inches) 88165977 Title: The 25 Most Intriguing People: The Cyberpunk Authors: Anonymous Journal: People Weekly Vol: 30 Iss: 26 Date: Dec 26, 1988 pp: 50 Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles Abstract: In the world of computer hackers, the "Cyberpunk" probes the weaknesses in electronic security systems, breaking into computer networks, altering data, and unleashing microchip mayhem. Photograph Subjects: Computer crime Type: News Length: Short (1-9 col inches) 88162631 Title: Another Infection Authors: Anonymous Journal: Time Vol: 132 Iss: 24 Date: Dec 12, 1988 pp: 33 Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News Abstract: Only five weeks after the Defense Department's Arpanet computer network was infected by a computer virus, the Mitre Corp has warned the Pentagon that the Milnet military information system has also been violated. Subjects: Computer crime; Computer networks; Department of Defense Companies: Mitre Corp Type: News Length: Short (1-9 col inches) 88159822 Title: The Viral Age Authors: Hodges, Parker Journal: Datamation Vol: 34 Iss: 24 Date: Dec 1, 1988 pp: 96 Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business Abstract: An editorial reflects on the vulnerability of computer networks to viruses. Throughout history, crimes have grown naturally from technology and have become definitive of an era. Subjects: Computers & computer technology; Computer crime Type: Editorial Length: Medium (10-30 col inches) 88158631 Title: Look Out Virus-Spreaders! Authors: Aycock, Heidi E. H. Journal: Compute! Vol: 10 Iss: 12 Date: Dec 1988 pp: 7 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: A proposed bill in the US House of Representatives provides criminal penalties and allows civil suits aginst people who affect, or could affect, interstate or foreign commerce by inserting viruses in computer systems. Subjects: Computer crime; Laws & legislation Type: News Length: Medium (10-30 col inches) 88157268 Title: An Ounce of Prevention Authors: Borts, Andrew D.; Zatz, Martin J. Journal: inCider Vol: 6 Iss: 12 Date: Dec 1988 pp: 60-61 Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech Abstract: Guidelines are given for avoiding a computer virus. A user should resist the temptation to download directly to the hard drive to lessen the chance of a virus. Subjects: Computer crime; Computers & computer technology Type: General Information Length: Short (1-9 col inches) 88152319 Title: Security Officials Ask Researchers Not to Make 'Virus' Copies Available Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988 pp: A1, A12 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Officials at the National Computer Security Center, a division of the National Security Agency, have asked researchers not to share copies of the computer-network virus that attacked 6,000 scientific and academic computers recently. Subjects: Computer crime; National Computer Security Center Type: Feature Length: Long (31+ col inches) 88152249 Title: Overreaction to External Attacks on Computer Systems Could Be More Harmful than the Viruses Themselves Authors: King, Kenneth M. Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988 pp: A36 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: The recent "virus" attack on computers linked to a major research network may result in resistance to linking instututional computers to networks, but these networks are important to scholars and administrators. Illustration Subjects: Computers & computer technology; Computer networks; Computer crime Type: Commentary Length: Long (31+ col inches) 88151032 Title: Computer Abuse: Chain Mail Authors: Anonymous Journal: Economist Vol: 309 Iss: 7577 Date: Nov 19, 1988 pp: 98-100 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business Abstract: Robert Morris used a "trap-door" in the Unix electronic mail program to cause a chain reaction that brought thousands of computers to a halt. Some lawyers feel that America's computer crime statutes need to be examined. Subjects: Computer crime; Laws & legislation; Computer programming & languages; United States--US Names: Morris, Robert Type: Feature Length: Medium (10-30 col inches) 88150295 Title: Computer 'Viruses' Are Seen as Hard to Stop on Open Academic Networks Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988 pp: A13, A18 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: The computer "virus" that recently infected research networks has college administrators worried about whether a recurrence can be prevented. Photograph Subjects: Computers & computer technology; Colleges & universities; Computer crime Type: Feature Length: Medium (10-30 col inches) 88150291 Title: Computer Infections Can Often Hide in Software and Then Start to Spread Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988 pp: A18 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Software viruses are hidden in programs, transferred to computer memories when the programs are run, and then transferred again to other disks or programs used in the infected computer. Subjects: Computers & computer technology; Computer crime Type: General Information Length: Medium (10-30 col inches) 88150290 Title: A Professor Seeks a Universal Antidote Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988 pp: A18 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: John Robert Cordani believes scientists can find the "theoretical underpinnings" of computer viruses, and thus develop a universal antidote. Subjects: Computer crime Names: Cordani, John Robert Type: General Information Length: Short (1-9 col inches) 88150289 Title: Chances of Catching Viruses Are Slim if Precautions Are Taken, Experts Say Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988 pp: A18 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Computer experts at Cornell University say that computer viruses may not be entirely avoidable, but the chances of catching them are slim if users take precautions. Subjects: Computers & computer technology; Computer crime Type: General Information Length: Short (1-9 col inches) 88149867 Title: Rapid Spread of Virus Confirms Fear about Danger to Computers Authors: Nordwall, Bruce D. Journal: Aviation Week & Space Technology Vol: 129 Iss: 20 Date: Nov 14, 1988 pp: 44 Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: SciTech; Business Abstract: The virus that infested several thousand computers in November 1988 confirms the growing concern about the security of computer networks. The virus was reputedly spread by Cornell University graduate student Robert T. Morris, Jr. Subjects: Computer crime; Computers & computer technology; Security systems Names: Morris, Robert T Jr Type: News Length: Medium (10-30 col inches) 88148517 Title: Worm Invades Computer Networks Authors: Marshall, Eliot Journal: Science Vol: 242 Iss: 4880 Date: Nov 11, 1988 pp: 855-856 Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic Abstract: Internet, the major computer network for researchers in the US and overseas, was disrupted for two days last week due to the presence of a computer virus. The virus and attempts by computer experts at the University of California at Berkeley and the Massachusetts Institute of Technology to cure it are examined. Subjects: Computer crime; Computer networks; University of California-Berkeley; Massachusetts Institute of Technology Type: News Length: Long (31+ col inches) 88144157 Title: The Assault on Data Security Is Getting a Lot of Attention Authors: Manuel, Tom; Shandle, Jack; Naegele, Tobias Journal: Electronics Vol: 61 Iss: 17 Date: Nov 1988 pp: 136-142 Jrnl Code: GELS ISSN: 0883-4989 Jrnl Group: SciTech Abstract: There are two separate problems to be dealt with in safeguarding data security: keeping outsiders off the system and preventing disgruntled or criminally inclined employees from attacking it. Restricting access is in some ways the hardest to accomplish. Illustration; Photograph Subjects: Computers & computer technology; Security systems; Computer crime; Security personnel Type: Feature Length: Long (31+ col inches) 88131293 Title: Vengeance by 'Virus' Authors: Lord, Lew; Stanglin, Douglas; Galloway, Joseph L.; Rosenberg, Robert; Satchell, Michael; et al. Journal: U.S. News & World Report Vol: 105 Iss: 13 Date: Oct 3, 1988 pp: 10 Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News Abstract: Last week Donald Burleson, an insurance firm's director of computer security, became the first person ever convicted of destroying crucial data by implanting codes in computer programs. Burleson's crime involved an early form of what are now known as "viruses." Subjects: Computers & computer technology; Crime & criminals; Computer crime Names: Burleson, Donald Type: News Length: Short (1-9 col inches) 88127257 Title: Viruses and Trojans Strike--But Very Rarely Authors: Getts, Judy Journal: PC World Vol: 6 Iss: 10 Date: Oct 1988 pp: 72-74 Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech Abstract: Much of the concern about computer viruses has been exaggerated. Users who frequently download from bulletin boards or exchange software via floppy disk are at higher risk. Steps users can take to protect against viruses are outlined. Illustration Subjects: Computer crime; Software Type: General Information Length: Medium (10-30 col inches) 88117361 Title: 'Virus Attacks' Authors: Rosenberg, Jim Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988 pp: 19pc, 40pc+ Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: A contagion of about 40 computer viruses has prompted a concern about high-tech hygiene for newspaper PC systems managers, technicians and engineers. Subjects: Newspapers; Personal computers; Computer crime Type: Feature Length: Long (31+ col inches) 88117355 Title: Avoiding Virus Infection Authors: Fitzgerald, Mark Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988 pp: 41pc Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: Although the Long Island "Newsday" may seem to be vulnerable to viruses because it operates the Newsday Electronic Bulletin Board, there have been no problems so far. Subjects: Newspapers; Computer crime Companies: Newsday Type: News Length: Short (1-9 col inches) 88116399 Title: Tomorrow's Thieves Authors: Albanese, Jay S. Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 24-28 Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental; SciTech Abstract: The advent of computers have provided the latest opportunity resource for criminal misuse. Fraud will likely become the most prevalent form of theft in the computer age. Photograph; Table Subjects: Theft; Computer crime; Law enforcement Type: Feature Length: Long (31+ col inches) 88116380 Title: Computer Viruses: The "AIDS" of the Information Age? Authors: Halal, William E. Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 60 Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental; SciTech Abstract: One solution to the problems posed by computer viruses is simply to be careful when using computers and use safe computing procedures. Subjects: Computer crime Type: Commentary Length: Medium (10-30 col inches) 88115135 Title: On Your Computer: Where's the Viral Epidemic? Authors: Frailey, Fred W.; Goldwasser, Joan; Willenbrink, Kristin Journal: Changing Times Vol: 42 Iss: 9 Date: Sep 1988 pp: 98-99 Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Socio/Environmental; Business Abstract: Computer viruses are most commonly a shareware program that has been downloaded from a bulletin board or software that someone passed on. Subjects: Computer crime; Computers & computer technology Type: General Information Length: Medium (10-30 col inches) 88110258 Title: The New Office: An RX for Healthy Software Authors: McCandless, Holloway Journal: Working Woman Vol: 13 Iss: 9 Date: Sep 1988 pp: 33 Jrnl Code: WKW ISSN: 0145-5761 Jrnl Group: Lifestyles; Business Abstract: One way companies can protect their software from computer viruses is by keeping their system as isolated as possible. Subjects: Computer crime; Software; Business & industry Type: General Information Length: Medium (10-30 col inches) 88106102 Title: Sick Computers Authors: Welter, Therese R. Journal: Industry Week Vol: 237 Iss: 4 Date: Aug 15, 1988 pp: 51-55 Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business Abstract: Computer viruses, a form of electronic sabotage, are occurring more frequently nowadays. To help control them, a careful policy needs to be established on the use of electronic bulletin boards and public domain software. Illustration Subjects: Computers & computer technology; Security systems; Computer crime Type: Feature Length: Medium (10-30 col inches) 88103547 Title: Ex-Employee Sentenced in Cheyney U. Grade Case Authors: Anonymous Journal: Chronicle of Higher Education Vol: 34 Iss: 47 Date: Aug 3, 1988 pp: A2 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Joseph J. Johnson, a former employee of Cheyney State University has been sentenced to 3 to 23 months in prison for changing the grades of students who paid him to do so. Subjects: Students; Crime & criminals; Colleges & universities; Computer crime; Cheyney University Names: Johnson, Joseph J Type: News Length: Short (1-9 col inches) 88103071 Title: Is Your Computer Secure Authors: Hafner, Katherine M.; Lewis, Geoff; Kelly, Kevin; Shao, Maria; Hawkins, Chick; Angiolillo, Paul Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 64-72 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: America's information systems are alarmingly vulnerable to high-tech bandits, hackers, disgruntled workers and natural disasters. Moreover, as PCs proliferate, the problem can only grow worse. Computer crime is examined. Photograph; Illustration; Graph Subjects: Computers & computer technology; Computer crime; High tech industries Type: Feature Length: Long (31+ col inches) 88103070 Title: How Uncle Sam's Cloak-And-Data Boys Are Fighting Back Authors: Port, Otis Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 72 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: Penetration of government computers--particularly military systems--is a deadly serious matter for the National Security Agency and for counterintelligence agents at the FBI. Photograph Subjects: Computer crime; National security; Classified information; National Security Agency Type: General Information Length: Medium (10-30 col inches) 88103057 Title: A German Hackers' Club that Promotes Creative Chaos Authors: Schares, Gail Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 71 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: Hackers with the Hamburg, West Germany-based Chaos Computer Club use their computing skills to increase public access to information instead of sabotaging databases. Members believe that access to electronic information cost too much in Germany. Photograph Subjects: Computers & computer technology; Computer crime; Chaos Computer Club Names: Fix, Bernd Type: General Information Length: Medium (10-30 col inches) 88103041 Title: Editorials: Treat Computer Data Like the Crown Jewels Authors: Anonymous Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 108 Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business Abstract: An editorial states that as the complex networks of computers built by business and government assume more and more tasks, they produce a whole new set of risks: computer viruses. Subjects: Computers & computer technology; Computer crime Type: Editorial Length: Medium (10-30 col inches) 88101861 Title: Editorial License Authors: Keizer, Gregg Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 4 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: An editorial discusses the transmission and prevention of computer viruses. Subjects: Computers & computer technology; Computer crime Type: Editorial Length: Medium (10-30 col inches) 88101823 Title: Compute Specific--Off the Mac Wire Authors: Aker, Sharon Zardetto Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 49 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: A computer virus has been showing up on Macintosh systems that destroys files and can randomly erase data. The outbreaks have centered around Dallas and Washington DC. Subjects: Computer crime; Computers & computer technology; Personal computers Type: News Length: Short (1-9 col inches) 88092802 Title: Keeping Out of the Kaos Club Authors: Anonymous Journal: Economist Vol: 308 Iss: 7558 Date: Jul 9, 1988 pp: 78-79 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business Abstract: In response to ever-increasing occurrences of fraudsters, hackers and viruses violating computer networks, the computer industry is strengthening security measures for computer operating systems. Photograph Subjects: Computers & computer technology; Security systems; Computer crime Type: Feature Length: Long (31+ col inches) 88089057 Title: Impact Authors: Thornburg, David D. Journal: Compute! Vol: 10 Iss: 7 Date: Jul 1988 pp: 10 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: Viruses, small programs embedded inside other programs, have the ability to replicate themselves and infect almost any program on a disk, including parts of an operating system. Viruses are, at best, nuisances and, at worst, they can damage computers. Subjects: Computers & computer technology; Computer crime; Computer programming & languages Type: Commentary Length: Medium (10-30 col inches) 88084661 Title: Beware: It's Virus Season Authors: Honan, Patrick Journal: Personal Computing Vol: 12 Iss: 7 Date: Jul 1988 pp: 36 Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech Abstract: An anonymous company is working with Panda Systems to eliminate the software virus, dubbed the Sunnyvale Slug, which Panda Systems has removed from all but one of the company's computers. Photograph Subjects: Computer crime; Computers & computer technology Companies: Panda Systems Type: News Length: Short (1-9 col inches) 88075577 Title: Compute! Specific: Mac--Virus and Vaccine Authors: Aker, Sharon Zardetto Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 44 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: A computer virus is a little program that's usually buried in another program; when the "host" program is run, your computer system catches the virus. A specific Macintosh virus has surfaced, but a cure has been found. Subjects: Computer programming & languages; Computer crime Type: News Length: Short (1-9 col inches) 88075550 Title: News & Notes: New PC Virus Innoculation Authors: Karnes, Clifton Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 81 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: Lasertrieve has announced a revolutionary new service and product package called VirALARM. It is designed to protect a PC from viruses by detecting infestation and alerting the user to their existence early. Illustration Subjects: Computers & computer technology; Computer crime Companies: Lasertrieve Type: News Length: Medium (10-30 col inches) 88071494 Title: The Cost of Computer Crime Authors: San Segundo, Gonzalo Journal: World Press Review Vol: 35 Iss: 6 Date: Jun 1988 pp: 47 Jrnl Code: GWPR ISSN: 0195-8895 Jrnl Group: News Abstract: The average net from a computer crime is about $220,000, while the conventional bank robbery will bring in about $6,600. Only one in 100 cases of computer crimes is punished by law. Subjects: Computer crime; White collar crime; Crime & criminals Type: Commentary Length: Medium (10-30 col inches) 88070487 Title: "The Chairman" and His Board Authors: Bock, Gordon; McWhirter, William Journal: Time Vol: 131 Iss: 22 Date: May 30, 1988 pp: 45 Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News Abstract: Gabriel Taylor, a clerk at the First National Bank of Chicago, electronically transferred funds to accounts under assumed names in Vienna. If the scheme had succeeded, the conspirators would have gotten $68.7 million. Photograph Subjects: Computer crime; Crime & criminals; Embezzlement Names: Taylor, Gabriel Companies: First National Bank of Chicago Type: Feature Length: Medium (10-30 col inches) 88068234 Title: Computer 'Virus' Hits First U.S. Newspaper Authors: Fitzgerald, Mark Journal: Editor & Publisher Vol: 121 Iss: 21 Date: May 21, 1988 pp: 22 Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: A computer virus has invaded the "Providence Journal-Bulletin," making it the first newspaper to succumb to the unauthorized codes which secretly penetrate systems and wreak havoc. Subjects: Newspapers; Computer crime Companies: Providence Journal-Bulletin Type: General Information Length: Medium (10-30 col inches) 88067609 Title: Scientists Track Hacker to Find Flaws in Systems Authors: Turner, Judith Axler Journal: Chronicle of Higher Education Vol: 34 Iss: 36 Date: May 18, 1988 pp: A16 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: Scientists at the Lawrence Berkeley Laboratory tracked a West German computer hacker electronically for almost a year as he tried to enter 450 computers, and invaded 30, throughout the US. Subjects: Computer crime; West Germany; Lawrence Berkeley Laboratory Type: News Length: Short (1-9 col inches) 88060581 Title: Compute! Specific: PC Virus Authors: Karnes, Clifton Journal: Compute! Vol: 10 Iss: 5 Date: May 1988 pp: 39 Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech Abstract: Computer viruses insinuate themselves into an operating system, and after a certain interval, do "something." So far, no viruses have appeared on the IBM forums of CompuServe. Subjects: Computers & computer technology; Software; Computer crime Companies: IBM Corp Type: News Length: Short (1-9 col inches) 88053577 Title: When Bytes Bite Back Authors: Anonymous Journal: Economist Vol: 307 Iss: 7547 Date: Apr 23, 1988 pp: 68 Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business Abstract: Costly problems in commercial computer systems are caused by fraudsters, hackers, disgruntled employees, accidents and human errors. Few companies have adequate network security. Illustration Subjects: Computer crime; Computers & computer technology Type: Feature Length: Short (1-9 col inches) 88030286 Title: Spawning a Computer "Virus" Authors: White, Ron Journal: 80 Micro Iss: 98 Date: Mar 1988 pp: 16-18 Jrnl Code: GEIM ISSN: 0744-7868 Jrnl Group: SciTech Abstract: "Core wars" are battles between rival programs for control of a theoretical computer's operating system. The game is designed for programmers to test their abilities against one another, but the principles behind these programs are similar to those in computer "viruses." Photograph Subjects: Computer programming & languages; Games; Computer crime Type: General Information Length: Long (31+ col inches) 88023137 Title: Companies Say Unauthorized Modifications of Systems to Permit Remote Entry Could Jeopardize Vendor Support Authors: Rosenberg, Jim Journal: Editor & Publisher Vol: 121 Iss: 8 Date: Feb 20, 1988 pp: 35, 37 Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business Abstract: Unauthorized entry into remote classified advertising through newspapers' computers may jeopardize vendor support for the advertising. Subjects: Fraud; Computers & computer technology; Computer crime; Newspapers Type: Feature Length: Long (31+ col inches) 88016993 Title: The Online Underworld Authors: Scrogan, Len Journal: Classroom Computer Learning Vol: 8 Iss: 5 Date: Feb 1988 pp: 58-60 Jrnl Code: GCCL ISSN: 0746-4223 Jrnl Group: SciTech Abstract: Every educator who introduces kids to telecommunications should also be aware of the illegal activities which might occur. Teachers need to communicate the ethics of online behavior to students. Subjects: Education & schools; Computer crime; Computer programming & languages; Ethics Type: Feature Length: Long (31+ col inches) 88013032 Title: Fighting Computer Crime Authors: Szabo, Joan C. Journal: Nation's Business Vol: 76 Iss: 2 Date: Feb 1988 pp: 14 Jrnl Code: NAB ISSN: 0028-047X Jrnl Group: Business Abstract: A new booklet from the SBA, "A Small Business Guide to Computer Security," gives guidelines on how small business can protect their computer operations. Subjects: Computer crime; Small business; Small Business Administration--SBA Type: Commentary Length: Short (1-9 col inches) 88011465 Title: Crime in the Computer Age Authors: Wood, Chris Journal: Maclean's Vol: 101 Iss: 5 Date: Jan 25, 1988 pp: 28-30 Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News Abstract: A discussion of computer crimes. Photograph Subjects: Crime & criminals; Computers & computer technology Type: Feature Length: Long (31+ col inches) 88010266 Title: Israeli University Offers Cure for Mysterious Computer 'Virus' Authors: Watzman, Herbert M. Journal: Chronicle of Higher Education Vol: 34 Iss: 19 Date: Jan 20, 1988 pp: A41 Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic Abstract: A electronic 'virus' programmed to damage and destroy software has been spreading across Israel. Israeli University is handing out a cure for the 'virus' to those who need it. Subjects: Computer crime; Israel; Israeli University Type: News Length: Medium (10-30 col inches)