"U.S. to Computer Hackers: Give U.S. a Y2K Break", by Jim Wolf, Wednesday December 15 2:37 AM ET, Yahoo! News.John Koskinen, chairman of the President's Council on Year 2000
Conversion, recently pleaded with computer hackers to delay their
activities until after the New Year's weekend has passed.
"Hacking is no longer merely a prank" by Eric Lundquist, June 7, 1999 9:00 AM ET, PCWeek: "Hacking is neither clever nor funny, nor something to be tossed off as adolescent humor from sci-fi-addled minds. Hacking retards the growth of a Web-accessible government and should hold penalties proportional to the crime."
UK Response: A senior defence industry analyst is contesting computer hackers' claims to have altered the course of one of the UK's military communications satellites, BBC News, 2 March 1999.
Durkin, Keith F., and Clifton D. Bryant, "'Log on to Sex': Some notes on the Carnal
Computer and Erotic Cyberspace as an Emerging Research Frontier." Deviant
Behavior, Vol. 16, No. 3 (July-September, 1995), 179-200. [Available on paper only]
"Hackers attack Mac sites" by Courtney Macavinta Staff Writer, CNET News.com, July 18, 1997, 6:45 p.m. PT:
A Swedish site that dared Netizens to crack its Macintosh Web
server was hit by a "denial of service" attack.
Lee, J.A.N. "Hacking", MacMillan Encylcopedia, New York, 1992 (unpublished).
This piece is a preview excerpt from Masters of Deception: The Gang That Ruled Cyberspace (Harper-Collins, 1995). Michelle Slatalla and Joshua Quittner (email@example.com) are both reporters at Newsday, in New York.
An television program shown in Germany on Monday Jan.22, 1996 showed the means by which a hacker could capture personal information about a home banking activity and then use that information for their own use.
In 1993, Ronald E. Anderson, Deborah G. Johnson,
Donald Gotterbarn and Judith Perrolle published an article "Using the new ACM code of ethics in decision making" (Commmunications of
the ACM, February, 1993) that contained a useful set of references.
"Security Illusion?", Newsweek, WEDNESDAY, October 6, 1999.
Peter Neumann, a computer scientist with the technology thinktank SRI International, also believes that the
underreporting of computer attacks is "enormous." "It's the old story of how many cases are undetected-you
don't know," Neumann told Newsweek.com. Of the portion that are actually detected, he believes only a
fraction are reported. Only now, he adds, are people are beginning to realize how "riddled with vulnerabilities"
the infrastructure really is.
Stronger Research Efforts Needed to Bolster Security,
Reliability of Networked Information Systems - Report from the National Academy of Sciences, September 29, 1998. (News Release) (Full Report)
The Department of Energy Computer Incident Advisory Capability provides a number of bulletins on aspects of computer security to employees and contractors of the United States Department of
Energy. . Beware however, that use of this system constitutes consent to security monitoring and testing. All activity is logged
with your host name and email address.