Bibliography of Computer Security Issues

Bibliography

This bibliography of computer security documents was prepared by the
National Computer Security Association. Corrections and additions will
be appreciated. Please write us at Suite 309, 4401-A Connecticut
Avenue, NW, Washington DC 20008. Or call voice at (202) 364-1304.
Our BBS number: (202) 364-8252.

Access Control/Fence Industry Monthly Newsletter From
Communication Channel Inc. 6255 Barfield Road Atlanta, GA 30328
(404) 256-9800 $26.95 This newsletter provides a listing of products
and suppliers for the access control industry.

Adler, Stacy “7 Myths of Computer Security.” Security vol 24 no. 1
January 1987 pp. 50-52 This article covers consultants that clear
misconceptions about data protection software.

Armstrong, James R. “Protecting the Corporate Data.” Data Processing
& Communications Security vol 9 no. 4 March/April, 1985 pp. 16-17
This article discusses how most alternative off-site lack the
environmental control, security and accessibility needed. Includes a
discussion on things to consider in selecting an off-site storage facility.

American Society for Industrial Security, Washington, D.C. Chapter
Newsletter Monthly Newsletter From American Society for Industrial
Security 1655 N. Ft. Myer Drive Suite 1200 Arlington, VA 22209 (703)
522-5800 Free to members only. This newsletter provides current
information on industrial security.

Anon. “Computer “Hacking” is No Longer Just a Lark.” Office vol 102
no. 3 September 1985 pp. 90-95 Computer hackers will use computers
to obtain information and resell it, use it for blackmail, extortion, and
espionage. This article discusses techniques for preventing hackers
from getting on a system, and monitoring them if they are discovered.

Anon. “Computer Security: The Menace is Human Error.” Office vol 99
no. 3 March 1984 pp. 119-120 This article stresses that managers
should understand that data security is a people problem and not a
computer problem. People are the ones that either accidentally or
intentionally misuse a computer system.

Anon. “Internal Security.” PC Week vol 2 no. 18 May 1985 pp. 89-91,
106-107 Experts feel that local computer access is more prone to
intrusion than long-distance access. This article discusses how insiders
in a company are the ones most likely to abuse a computer system.

Anon. “Reporting Computer Crime.” Data Processing &
Communications Security vol 8 no. 6 July/August 1984 pp. 20-21 This
article presents a suggested format for a final report to use in
documenting actions surrounding a computer crime.

Anon. “Communications and Systems Security.” Data Processing &
Communications Security vol 9 no. 3 1985 Buyer’s Directory pp. 11-13
This article discusses a wide variety of communications and system
security protection methods. Includes encryption, fiber optics, key
management, optical links, electrical emanations, and dial-up access
protection devices.

Anon. “Computer Communications Security Lexicon.” Data Processing
& Communications Security vol 11 no. 2 Spring 1987 pp. 22-23 This
article is an update containing some new added security definitions of
terms and phrases.

Anon. “Controlling Access To Your Data.” Personal Computing vol 9 no.
9 September 1985 pp. 60-72 Explains measures that can be taken to
protect what’s in a computer. Focuses not only on vandals, but also on
people who accidentally harm the computer.

Anon. “Dial-Up Access Security Products.” Data Processing &
Communications Security vol 9 no. 2 November/December 1984 pp.
21-24 This article presents some new dial-up access security products
and their major features.

Anon. “Enhancements Out For Barrier Security Devices.”
Computerworld vol 18 no. 35 August 1984 pp. 51 This article discusses
the password protection device designed by International Anasazi, Inc.
that will limit access on dial-up lines.

Anon. “Firesign Unwraps Security Feature.” MIS Week vol 5 no. 23
June 1984 pp. 24 This article discusses Firesign Computer Company’s
product that provides for network security by its password system.

Anon. “Security Computer Outsmarts Colorado Bandits.” Data
Management vol 19 no. 7 July 1981 pp. 17-18 This article looks at the
effectiveness of a security system that controls access to several
high-rise buildings in Colorado.

Anon. “Security Lock Ready for PCs.” MIS Week vol 6 no. 26 July 1985
pp. 30 The hard disk security product “Knight Data Security Manager”
is discussed. This product allows password protection in a PC.

Anon. “Automated Contingency Planning.” Data Processing &
Communications Security vol 8 no. 4 March/April 1984 pp. 22 This
article presents a special purpose software package CHI/COR that
deals with the job of documenting the resources needed to implement a
disaster recovery plan.

Anon. “Contingency Planning and the Law.” Data Processing &
Communications Security vol 8 no. 4 March/April 1984 pp. 17-18 This
article reviews the Foreign Corrupt Practices Act and its requirement
for record keeping and internal controls. Other potential legal
liabilities are also reviewed.

Anon. “Computer Power and Environmental Controls.” Data Processing
& Communications Security vol 9 no. 3 1985 Buyer’s Directory pp. 13
This article discusses common power anomalies and equipment
available to overcome them.

Anon. “Computer Back-up Facilities.” Data Processing &
Communications Security vol 8 no. 4 March/April 1984 pp. 19-22 This
article discusses the options of back-up sites including cold sites, hot
sites, or empty shell, or fully equipped recovery sites. Also refers to the
extent of equipment, space, and services provided by these back-up
facilities.

Anon. “Computer Security: Issues and Answers.” Datamation vol no.
September 15, 1984 pp. 16 Pages This 16-page section sponsored by
the Computer Security Institute contains several articles that cover a
variety of computer security issues.

Anon. “Computer Security: Issues and Answers.” Datamation vol no.
September 15 1985 pp. 24 Pages This advertisement section contains
eight articles that discuss a variety of computer security issues. The
authors include FBI Director William Webster and Department of
Defense Computer Security Center Director Robert Brotzman.

Anon. “Making The Case For Computer Security Pure and Simple.”
Datamation vol no. September 1983 pp. This section of Datamation is
sponsored by the Computer Security Institute and covers a broad range
of computer security issues in several different articles.

Anon. “Personal Computers vs. Data Security: the Two Need Not Be
Incompatible.” Data Processing & Communications Security vol 12 no.
1 Winter 1988 pp. 24-26 This article discusses the threat of data loss
either intentional or unintentional. It examines the significant risks
and the data security policies to lower these risks.

Anon. “Protecting Information and Interest.” Computer Management
vol no. October 1981 pp. 33-34, 36 Suppliers, consultants, and services
related to computer security are listed in this directory.

Anon. “Simple Security Precautions Ensure Information Safety.”
Computerworld vol 19 no. 17 April 1985 pp. SR-38 This article applies
many of the security precautions for mainframes to the microcomputer.
MICROCOMPUTER SECURITY

Anon. “Memo: Disaster Plan For Microcomputer Users.” Data
Processing & Communications Security vol 8 no. 4 March/April 1984
pp. 27-29 This article is in the form a memo containing a
microcomputer disaster recovery checklist. It address issues that
should be taken in contingency plans.

Anon. “Media Safes: Countering the Threats of Fire.” Data Processing
& Communications Security vol 9 no. 6 July/August 1985 pp. 18-20
This article is a review of critical basic information on how to select
fire resistant media safes.

Anon. “Protecting The World’s Largest Computer User.” Data
Processing & Communications Security vol 8 no. 4 March/April 1984
pp. 25-26 This article discusses a new high security off-site storage
facility opening in Beltsville, Maryland. It also address concern with
the lack of proper security storage today.

Anon. “Computer Security Awareness: Organizations and Senior.”
Management Concerns Data Processing & Communications Security vol
8 no. 5 May/June 1984 pp. 12-13 This article gives the result of a
survey of general security and computer security personnel, EDP
auditors, and internal auditors to determine the computer security
awareness of their company and senior management.

Anon. “Records Storage and Management.” Data Processing &
Communications Security vol 8 no. 4 March/April 1984 pp. 23-25 This
article addresses the questions which records should be stored off-site,
and how can an off-site facility be evaluated? It also provides an
overview of areas to consider.

Anon. “Computer Security Software.” Data Processing &
Communications Security vol 9 no. 1 September/October 1984 pp. 19-24
This article provides information for using access control software to
protect the terminals, the data and the system itself from unauthorized
use.

Anon. “Computer Security Software.” Data Processing &
Communications Security vol 9 no. 3 1985 Buyer’s Directory pp. 17-18
This article addresses a wide variety of computer security software
programs and their different uses.

Anon. “Protecting Software With Escrow Services.” Data Processing &
Communications Security vol 8 no. 5 May/June 1984 pp. 22-24 This
article addresses some of the problems and answers for protecting
software that concerns major management today.

Ashley, Cliff and Story, Frank Automatic Data Processing Security
Program From Kaiser Engineers Hanford, ATTN: Cliff Ashley, SAS
Manager February 11, 1987 Training & Awareness Free This manual
describes the computer security program used at Kaiser Engineers
Hanford.

Associated Press “Jury Selection In 1st “Virus” Trial Begins.”
Washington Post vol no. 277 September 7, 1988 pp. C1 This article is
about a programmer accused of using a computer “virus” to sabotage
thousands of records at his former work place.

Atkinson, L.V. “Fraud: Input Data Most Vulnerable.” Computerworld
UK vol 2 no. 21 September 2, 1981 pp. 10 Article discusses a survey
which found that the major danger to computers was the alteration of
input data.

Auerbach Data Security Management Bimonthly Journal From
Auerbach Publishers Inc. 6560 N. Park Drive Pennsauken, NJ 08109
(609) 662-5599 $265.00 Annually This journal deals with issues related
to data security management.

Auerbach Information Management Series Monthly Journal From
Auerbach Publishers, Inc. 6560 N. Park Drive Pennsauken, NJ 08109
(609) 662-2070 $750.00 Annually This journal on information security
provides insights, approaches, and products related to security.

Avarne, Simon “How to Find Out a Password.” Data Processing &
Communications Security vol 12 no. 2 Spring 1988 pp. 16-17 This
article gives examples of how to discover someones password and
discusses weaknesses of traditional passwords.

Baker, R.H. “Lining Up Computer Crooks.” Micro Communications vol
2 no. 5 May 1985 pp. 18-22 This article looks at crime patterns of
microcomputer users breaking into mainframes. Ways in which these
patterns can be learned and then stopped is discussed.

Bailey, Cynthia “Information Security: A Pressing Need” Computer
Digest, September, 1989, p. 30, 32.

Bass, Brad “Security Teams Fight Network Invaders” Government
Computer News, September 4, 1989, p. 87.

Beitman, L. “A Practical Guide To Small Business Computer Security.”
Office vol 96 no. 2 August 1982 pp. 86, 90 This article gives advice on
how to obtain computer security in a small business environment. A
checklist is included that will help to prevent accidental and
intentional harm to a system.

ben-Aaron, Diana. “Mailsafe Signs, Seals, and Delivers Files”
InformationWeek, September 15, 1986.

Bequai, A. “What to do About Crime in the Electronic Office.” Office
vol 101 no. 1 January 1985 pp. 101-104 This article discusses the
important role that auditing computer systems plays in preventing
crimes and abuse.

Bequai, August “Federal Computer Crime Legislation is Needed.” Data
Management vol no. May 1981 pp. 22-24 The ways criminals use
loopholes in our present criminal justice system is discussed along with
a history of computer crime legislation.

Berman, A. “Evaluating On-Line Computer Security.” Data
Communications vol 12 no. 7 July 1983 pp. 145-152 The security
problems that have arisen because of on-line processing are discussed
in this article. Covered are the two ways to obtain a secure on-line
system.

Betts, M. “Government’s Computers “Highly Vulnerable” to Abuse.”
Computerworld vol 18 no. 40 October 1984 pp. 4 Discusses how highly
vulnerable the federal government’s computers are to abuse, and a
congressman who is seeking to change that vulnerability.

Betts, M. “NBS Releases Standards For Managing Password Security.”
Computerworld vol 19 no. 28 July 1985 pp. 19 This article talks about
how the National Bureau of Standards has completed a two- part
publication dealing with password systems.

Betts, M. “U.S. Agency Faces Probes, Boosts Security After Audit.”
Computerworld vol 19 no. 24 June 1985 pp. 8 This article discusses an
audit report issued by the inspector general of the U.S. Department of
the Interior in March 1985 which revealed inadequate controls over
passwords, faulty operating procedures, and lack of audit trails by the
Denver Service Center.

Betts, M. “Reagan Systems Security Directive Under Attack.”
Computerworld vol 19 no. 27 July 1985 pp. 1 This article discusses
why members of congress are concerned over how the National
Security Decision Directive 145 on computer security could be abused
by military and intelligence officials.

Betts, Kellyn S. “Foiling Data Thieves” Modern Office Technology April
1985, pp 112 ff.

Bezdek, J. “Across-the-Board Training Protects Data.” Computerworld
vol 18 no. 44 October 1984 pp. SR-10 This special report covers the
four areas that a training program in computer security needs to
include. These are plant physical security, logical security,
administrative security, and the legal and social aspects of security
training.

Bigelow, R.P. “Computer Security And Law.” Infosystems vol 29 no. 12
December 1982 pp. 84 This article looks at how a memo from the legal
department should be structured concerning the protection of assets.

Blakeney, S. “Computer Crime: A Worldwide Concern.” Computerworld
vol 17, 18 no. 52, 1 December 26, 1983, January 1984 pp. 57-60 This
article looks at computer crime as a worldwide problem. The most
common types of computer crimes are given along with the estimated
losses in various countries throughout the world.

Blakeney, S. “Micro Market Going Full Steam Ahead; IDC Predicts
Installed Base of $41.9 Billion by ’86” Computerworld March 28, 1983.

Boebert, W. E., Kain, R.Y. A Practical Alternative to Hierarchical
Integrity Policies Proceeding of the 8th National Computer Security
Conference, Gaithersburg MD, Oct 1985

Boebert, W. E., Ferguson, C.T. A Partial Solution to the Discretionary
Trojan Horse Problem Proceeding of the 8th National Computer
Security Conference, Gaithersburg MD, Oct 1985

Bologna, Jack “Computer Related Crime: The Who, What, Where,
When, Why and How.” Data Processing & Communications Security vol
10 no. 1 Winter 1986 pp. 19-23 This article looks at computer related
crime from the perspectives of the individual criminal, environmental
factors, organization cultures, incidence rate, and security
countermeasures.

Bologna, Jack Computer Crime: Wave of the Future Intended to
demonstrate that the current state of computer technology exceeds by
an order of magnitude our ability to secure our equipment. 102 pp $15.
Computer Protection Systems.

Bologna, Jack The Security Manager’s Handbook 167 pp. $35 Computer
Protection Systems.

Bologna, Jack Strategic Planning for Corporate Directors of Security
and Risk Management. 28 pp $10 Computer Protection Systems.

Bologna, Jack “Forensic Accounting.” Data Processing &
Communications Security vol 8 no. 6 July/August 1984 pp. 16-20 This
article identifies the skills and competency of a forensic accountant.

Bologna, Jack “Disaster/Recovery Planning: A Qualitative Approach.”
Data Processing & Communications Security vol 8 no. 4 March/April
1984 pp. 11-15 Developing a disaster/recovery plan usually involves a
detailed quantitative risk analysis; the author offers a more qualitative
approach that is less time consuming and will obtain a higher level of
commitment from management, D/P staff, and users.

Bologna, Jack “Industrial Security In a Nutshell: A Risk by any
Other.” Name Data Processing & Communications Security vol 9 no. 5
May/June 1985 pp. 12-13 This article discusses properly understanding
risk and how the opposite side of risk is opportunity for growth and
development.

Bologna, Jack “Risk Assessment Guidelines for Fidelity Insurance.”
Data Processing & Communications Security vol 9 no. 4 March/April,
1985 pp. 18-20 This article is a review of the adequacy of asset
protection plans, policies, procedures and controls to enlighten top
management.

Bologna, Jack “Security Planning: The “Tapps” Method.” Data
Processing & Communications Security vol 10 no. 4 Fall 1986 pp. 7-11
This article covers a system approach to assets protection. It discusses
an analytical process called Total Assets Protection Planning System
(TAPPS) which consist of organization, structure and mandate of the
security function.

Bologna, Jack “Selling Computer Security to Top Management.” Data
Processing & Communications Security vol 8 no. 5 May/June 1984 pp.
13-16 This article discusses positive motivational impact, minimizing
risk, and cost feasibility in selling computer security to top managers.

Bologna, Jack “Why the Corporate Security Function is Being
Downsized.” Data Processing & Communications Security vol 11 no. 2
Spring 1987 pp. 20-21 This article discusses the disbanding and
dilution of corporate security functions and how this effects the
security of a firm.

Bound, W.A.J. “Security Protecting Information Resources and Media.”
Information Management vol 18 no. 8 August 1984 pp. 18-19 This
article discusses what a manager must consider when designing an
office security program to protect against the four vulnerabilities of a
system: personnel, physical, administrative, and technical.

Bowmen, Terry “Undercarpet Fiber Optics.” Data Processing &
Communications Security vol 11 no. 2 Spring 1987 pp. 23-26 This
article discusses how fiber optics offer better security than copper cable
undercarpet. It also includes how to plan an undercarpet system.

Bramer, W.L. “Computer and Data Security is Battle Cry to the ’80s.”
Office vol 103 no. 3 March 1986 pp. 78-82 This article discusses the
number of organizations that are looking at their security procedures
and programs to deter computer abuse. The three main causes of
security problems are described.

Branstad, Dennis (editor) Computer Security And The Data Encryption
Standard February 1978 NBS SPEC PUB 500-27 Includes papers and
summaries of presentations made at a l978 conference on computer
security. Subject areas are physical security, risk assessment, software
security, computer network security, applications and implementation
of the Data Encryption Standard.

Brenner, Aaron. “LAN Security”. LAN Magazine, Aug 1989.

Bunzel, Rick. “Flu Season” Connect, Summer 1988.

Burger, Ralf .Computer Viruses:a High-Tech Disease Abacus Software,
1989. For some reason, this book contains virus source code!

Cabell, D. “Network Backups.” Micro Communications vol 2 no. 6 June
1985 pp. 14-18 This article describes how the only way to protect a
LAN, micro, mini, or mainframe from a complete system crash is
adequate backup.

Call, B. “Buttress Against Computer Crime.” PC Week vol 2 no. 18 May
1985 pp. 111, 115 The physical protection of computers is becoming an
area of interest for more organizations. The increased number of
physical security devices illustrates this point and is discussed in this
article.

Carey, Cameron “Data Access Control: Help or Hindrance.” Data
Processing & Communications Security vol 11 no. 4 Fall 1987 pp. 18-20
This article discusses limiting access to data and how to make access
control protection more of a help than a hindrance by developing a set
of priorities about various classes of data.

Cipher Irregular Newsletter From Institute of Electrical and Electronic
Engineers 9800 Savage Road Fort Meade, MD 20755 (301) 859-4376
This newsletter looks at security and privacy from a technical view.

Ciura, J.M. “Vital Records Protection: Identifying Essential
Information.” Information Management vol 19 no. 2 February 1985 pp.
11 This article suggest that the best way to resume business activity
after an emergency or disaster is to have a vital records protection
program.

Clauss, Karl H. “How To Move A Data Center and Avoid a Disaster.”
Infosystems vol no. December 1981 pp. 46-48, 50 This article describes
how ARCO Oil and Gas Company moved their computer center to a
new location and the points a company should consider when moving a
data center.

Clyde, Allen R. “Insider Threat on Automated Information Systems.”
Data Processing & Communications Security vol 11 no. 4 Fall 1987 pp.
11-14 This articles discusses activities to detect sources of abuse that
are not widely implemented.

CM Bulletin Bimonthly Bulletin From National Classification
Management Society, Inc. 6116 Roseland Drive Rockville, MD 20852
(301) 231-9191 Free to members, non-members $15.00 annually This
bulletin contains articles pertaining to information security
management.

Cohen, Fred. Computer Viruses, Theory and Experiments. 7th Security
Conference, DOD/NBS Sept 1984.

Cohen, Fred. “Computer Viruses: Theory and Experiment.” Computers
& Security, Vol. 6 (1987), pp. 22-35.

Cohen, Fred. “On the Implications of Computer Viruses and Methods of
Defense,” Computers & Security, Vol. 7 (1988), pp. 167-184.

Cole, Gerald D. and Frank Heinrich Design Alternatives For Computer
Network Security (vol. 1) The Network Security Center: A System Level
Approach To Computer Network Security (vol. 2) January 1978 NBS
SPEC PUB 500-21 This two-volume study covers network security
requirements and design and implementation requirements of a special
computer dedicated to network security. The approach utilizes a
dedicated minicomputer to check authentication of network users, and,
to some extent, to check authorization. The study focuses on use of the
Data Encryption Standard to protect network data and recommends
procedures for generating, distributing and protecting encryption keys.

Collins, J.A. “Continuous Security Control Clamps Down on Abuse.”
Data Management vol 23 no. 5 May 1985 pp. 56-59 The need for
computer access is discussed in this article that suggest that such
access should be a management, security-oriented process. Computer
security guidelines are also given.

COM-AND (Computer Audit News and Developments) Bimonthly
Newsletter From Management Advisory Services P.O. Box 151 57
Greylock Road Wellesley Hills, MA 02181 (617) 235-2895 $56.00
Annually This newsletter provides auditors with current trends,
practices, and developments in their field.

Computer Age: EDP Weekly Weekly Newsletter From EDP News
Services, Inc. 7043 Wimsatt Road Springfield, VA 22151 (703) 354-9400
$225.00 Annually Weekly roundup of computer industry news. Provides
analysis of computer events and trends. Articles include coverage of
computer security news.

Computer Fraud & Security Bulletin Monthly Newsletter From
Elsevier International 52 Vanderbilt Avenue New York, NY 10017
(212) 916-1250 $240.00 Annually This monthly newsletter deals with
computer crime and preventive measures that can be taken to avoid
misuse.

Computer Law Journal None Specified Journal From Center for
Computer Law Box 3549 Manhattan Beach, CA 90266 (213) 372-0198
$72.00 Annually This journal deals with all aspects of computer law
from copyright protection of software to penalties for abusing
computers.

Computer Law Newsletter Bimonthly Newsletter From Warner &
Stackpole 28 State Street Boston, MA 02109 (617) 725-1400 Free
Various subjects dealing with computer law including computer crime
are covered.

Computer Security Buyers Guide From Computer Security Institute
1988 General Security Members of CSI – Free; Non-members – $75.00
A buyers guide for a wide variety of of computer security products and
services.

Computer Security Digest Monthly Digest From Computer Protection
Systems, Inc. 150 N. Main Street Plymouth, MI 48170 (313) 459-8787
$110.00 Annually This digest addresses issues of current interest in
the area of computer security matters and related crime.

Computer Security Guidelines For Implementing The Privacy Act Of
1974 FIPS PUB 41 May 1975 Provides guidance in the selection of
technical and related procedural methods for protecting personal data
in automated information systems. Discusses categories of risks and
the related safeguards for physical security, information management
practices, and system controls to improve system security.

Computer Security Journal Twice A Year Journal From Computer
Security Institute 360 Church Street Northborough, MA 01532 (617)
393-2600 $60.00 members, $65.00 non-members annually This journal
contains technical papers on a wide variety of computer security
related topics including software, contingency planning, and security
management.

Computer Security Manual for Unclassified Systems From EG&G
Idaho, Inc. Information and Technical Services P.O. Box 1625 Idaho
Falls, ID 83415 April 30, 1987 General Security Call for current cost
(TBD) Discusses a variety of unclassified computer security issues.
Includes password usage, certification and other categories.

Computer Security Newsletter Bimonthly Newsletter Computer Security
Institute 360 Church Street Northborough, MA 01532 (617) 393-2600
$95.00 Annually, for members only. This newsletter covers a broad
range of computer security topics.

Computer Viruses – Proceedings of an Invitational Symposium, Oct
10/11, 1988; Deloitte, Haskins, and Sells; 1989

Computers & Security Six Times a Year Journal From Elsevier
International 52 Vanderbilt Avenue New York, NY 10017 (212)
916-1250 $89.00 Annually This technically oriented journal covers a
variety of topics concerning computer security.

COM-SAC (Computer Security, Audit, and Control) Twice A Year
Journal From Management Advisory Services & Publications P.O. Box
151 57 Greylock Road Wellesley Hills, MA 02181 (617) 235-2895 $55.00
Annually Most of this journal contains brief digests of articles on
computer security that have appeared in other publications, although it
does include some original articles.

Coontz, Constance “Protection through Isolation.” Security Management
vol 31 no. 11 November 1987 pp. 53-55 This article discusses
compartmentalizing valuable data on dedicated PCs or small computer
systems to help protect it from hackers and moles.

CPR-R (Contingency Planning & Recovery Report) Quarterly Journal
From Management Advisory Services P.O. Box 151 57 Greylock Road
Wellesley Hills, MA 02181 (617) 235-2895 $75.00 annually This journal
is solely devoted to issues, practices and developments in contingency
planning, disaster recovery and business continuity.

Data Encryption Standard FIPS PUB 46 January 1977 Specifies an
algorithm to be implemented in electronic hardware devices and used
for the cryptographic protection of sensitive, but unclassified, computer
data. The algorithm uniquely defines the mathematical steps required
to transform computer data into a cryptographic cipher and the steps
required to transform the cipher back to its original form.

Datapro Reports on Information Security (2 Volumes) From Datapro
Research Corporation (609) 764-0100 1985 General Security $790.00
Annualy Includes management information, market surveys, and
product reports.

Data Processing & Communications Security Quarterly Magazine From
Assets Protection Publishing Box 5323 Madison, WI 53704 (608)
274-7751 $48.00 Annually This magazine covers a wide variety of
computer and communications security related topics.

Data Processing Digest Monthly Digest From Data Processing Digest,
Inc. P.O. Box 1249 Los Angelas, CA 90078 (916) 756-5138 This digest
covers more than 130 scientific, business trade, educational, and
computer journals. Articles are selected for the specific needs of DP
and IS management, computer professionals, and corporate executives.

Davidson, Thomas L. and White, Clinton E. Jr. “How to Improve
Network Security.” Infosystems vol 30 no. 6 June 1983 pp. 110-112
This article discusses the need to protect network systems using
software locks, authorization schemes, logs, and data encryption.

Daview, D.W. & W.L. Price Security for Computer Networks: An
Introduction to Data Security in Teleprocessing and Electronic Funds
Transfer. John Wiley & Sons. 416 pp 1984. $34.95

Deitz, Larry “Computer Security in the Micro Age” Computers and
Electronics, June 1984, pp 68 ff

Denning D. E. Cyptography and Data Security Addison Wesley, 1982

Denning, D. E. An Intrusion-Detection Model IEEE Symposium on
Security and Privacy, April 1986.

Denning, Peter J.. “Computer Viruses”. American Scientist, Vol 76,
May-June, 1988.

Denning, Peter J. “The Internet Worm”. American Scientist, Vol 77,
March-April, 1989.

DES Modes Of Operation FIPS PUB 81 December 1980 Defines four
modes of operation for the Data Encryption Standard which may be
used in a wide variety of applications. The modes specify how data will
be encrypted (cryptographically occurrence and the damage protected)
and decrypted (returned to original form). The modes included in this
standard are the Electronic Codebook (ECB) mode, the Cipher Block
Chaining (CBC) mode, the Cipher Feedback (CFB) mode, and the
Output Feedback (OFB) mode.

Dewdney, A. K. “Computer Recreations – In the game called Core War
hostile programs engage in a battle of bits”. Scientific American Mar
1984.

Dewdney, A. K. “Computer Recreations – A Core War bestiary of
viruses, worms and other threats to computer memories”. Scientific
American Mar 1985.

Diamond, F.H. “Computer Network Security: The Need Was Never
Greater.” Office vol 102 no. 2 August 1985 pp. 94-99 This article
discusses the advantages of using the callback approach in computer
networks to prevent hackers from getting onto a system.

Dobberstein, M. “To Have and Not to Have a Disaster.” Computer
Decisions vol 17 no. 18 September 1985 pp. 102-126 This article deals
with the importance of actually testing contingency plans to see if they
work.

DoD Department of Defense Trusted Computer System Evaluation
Criteria, December, 1985. DOD 5200.28-STD. Library No. S225,711.
(the “Orange Book”)

DoD Computer Security Center Computer Security Requirements:
Guidance for Applying the Department of Defense Trusted Computer
System Evaluation Criteria in Specific Environments DoD.
CSC-STD-003-85. 25 June, 1985, 13pp. *

Dvorak, John “Virus Wars: A Serious Warning”. PC Magazine Feb 29,
1988.

EDP Security Bulletin Irregular Bulletin From Royal Canadian
Mounted Police Systems Branch 1200 Alta Vista Drive Ottawa, ON
KIA OR2 Canada This bulletin provides current information in the
field of electronic data processing security.

edpacs: The EDP Audit, Control and Security Newsletter Monthly
Newsletter From Auerbach Publishers 210 South Street Boston, MA
02111 (617) 292-8360 $96.00 Annually This newsletter is meant
primarily for the auditor, although it will benefit others with computer
security responsibility.

EDP Analyzer Monthly Journal From United Communications Group
4550 Montgomery Avenue Ste. 700N Bethesda, MD 20814 (301)
961-8700 Doug O’Boyle $159.00 annually

The EDP Auditor Quarterly Journal From EDP Auditors Association
P.O. Box 88180 373 S. Schmale Road Carol Stream, IL 60188-0180
(312) 682-1200 Available as part of annual membership. This journal is
intended for the EDP auditor and focuses on education and research.

Edwards, M. “The Sting in a Micro’s Tail.” Practical Computing vol 6
no. 12 December 1983 pp. 108-109 How criminals exploit information
technology is described in this article along with ways to stop them.

Elmer-Dewitt, Phillip “Invasion of the Data Snatchers!.” Time
Magazine vol 123 no. 13 September 26, 1988 pp. 62-67 Discusses the
current threat to computer systems posed by computer viruses.
Computer viruses are defined and several examples of viruses are
given.

Epner, S.A. “Computer Security: Plenty of Questions but No Easy
Answers.” Office vol 101 no. 3 March 1985 pp. 74-76 This article covers
the physical security of computer equipment including air conditioning
and power to pass cards and security guards.

Edwards, J. “Ends in Sight for the Copy-Protection Debate.” PC Week
vol 3 no. 1 January 1986 pp. 101 & 105 This protection of software
from unauthorized use may be coming to an end as Microsoft
Corporation has decided to lift the protection from several of its
software programs.

Federal Information Processing Standards Publication 83, Guideline on
User Authentication Techniques for Computer Network Access Control.
National Bureau of Standards, Sept, 1980.

Federal Information Processing Standards Publication 73, Guidelines
for Security of Computer Applications; National Bureau of Standards,
June, 1980.

Federal Information Processing Standards Publication 112, Password
Usage. National Bureau of Standards, May, 1985.

Federal Information Processing Standards Publication 87, Guidelines
for ADP Contingency Planning; National Bureau of Standards, March,
1981.

Fiedler, David and Hunter, Bruce M. UNIX System Administration.
Hayden Books, 1987

Fisher, M.J. “New Security Device “Fingers” Culprit.” MIS Week vol 6
no. 35 September 1985 pp. 12 This article describes a new product that
uses a fingerprint device to verify a user’s identity and then allow
access on the computer system.

Fisher, Sharon “DARPA Sets Up Response Teams to Tackle ARPANET
Emergencies” InfoWorld, March 20, 1989, p. 43.

Fitzgerald, Jerry. Business Data Communications: Basic Concepts,
Security, and Design. John Wiley and Sons, Inc., 1984

Flach, Joseph P. “Increasing Programming Efficiency While Preventing
the “F” Word.” Data Processing & Communications Security vol 11 no.
4 Fall 1987 pp. 15-17 This article gives examples of ways to identify
fraudulent code in a production program.

Flynn, L. “Data Security: How Much is Too Much?” InfoWorld, March
20, 1989, p. 41-43.

Fong, Elizabeth A Data Base Management Approach To Privacy Act
Compliance June 1977 NBS SPEC PUB 500-10 Discusses how
commercially available data base management systems can be used to
implement Privacy Act requirements for the handling of personal data.

Forensic Accounting Review Monthly Newsletter From Computer
Protection Systems, Inc. 150 N. Main Street Plymouth, MI 48170 (313)
459-8787 $110.00 Annually This newsletter takes an in-depth look at
the problems of computer fraud and provides possible solutions.

Gait, Jason Maintenance Testing For The Data Encryption Standard
August 1980 NBS SPEC PUB 500-61 Describes four tests that can be
used by manufacturers and users to check the operation of data
encryption devices. These tests are simple, efficient, and independent
of the implementation of the Data Encryption Standard (FIPS 46).

Gait, Jason Validating The Correctness Of Hardware Implementations
Of The Nbs Data Encryption Standard November 1977 NBS SPEC
PUB 500-20 Describes the design and operation of the NBS testbed
that is used for the validation of hardware implementations of the
Data Encryption Standard (DES). This report provides the full
specification of the DES algorithm, a complete listing of the DES test
set and a detailed description of the interface to the testbed.

GAO: “Financial Integrity Act: Actions Needed to Correct ADP
Internal Control Weaknesses”

GAO: “Computer Security: Compliance with Training Requirements of
the Computer Security Act of 1987”

Gasser, Morrie. Building a Secure Computer System. Van Nostrand
Reinhold, New York, 1988.

Gaydasch, Alexander “Postimplementation Audits – A Quick, Easy
Approach.” Data Management vol no. February 1983 pp. 54, 55, 69
This article describes post- implementation audits and how they help
to determine whether a computer system has met its original criteria.

Gazarek, Kenneth F. “Cabinets for Electromagnetic
Interference/Radio-Frequency Interference and TEMPEST Shielding.”
Data Processing & Communications Security vol 9 no. 6 July/August
1985 pp. 12-13 This article discusses the electromagnetic interference
and radio-frequency interference control options, designing and
building metal cabinets that provide effective shielding.

Gilgor, V.D. On the Design and the Implementation of Secure Xenix
Workstation IEEE Symposium on Security and Privacy, April 1987.

Glossary For Computer Systems Security February 1974 FIPS PUB 39
Evaluating security of computer systems. A reference document
containing approximately 170 terms and definitions pertaining to
privacy and computer security.

Goldstein, Bruce “Information Security: The Information Resource
Management.” Approach Data Processing & Communications Security
vol 8 no. 5 May/June 1984 pp. 18-22 This article addresses information
as a asset that must be protected as any other asset. It also discusses
information research management providing the framework for a
comprehensive information security program.

Grampp, F.T. and Morris, R. H. “UNIX Operating System Security”.
AT&T Bell Laboratories Technical Journal, Oct 1984.

Guidelines For Adp Contingency Planning FIPS PUB 87 March 1981
Describes what should be considered when developing a contingency
plan for an ADP facility. Provides a suggested structure and format
which may be used as a starting point from which to design a plan to
fit each specific operation.

Guidelines For Adp Physical Security And Risk Management June 1974
FIPS PUB 31 Provides guidance to Federal organizations in developing
physical security and risk management programs for their ADP
facilities. Covers security analysis, natural disasters, failure of
supporting utilities, system reliability, procedural measures and
controls, protection of off-site facilities, contingency plans security
awareness, and security audit. Can be used as a checklist for planning.

Guidelines For Automatic Data Processing Risk Analysis FIPS PUB 65
August 1979 Presents a technique for conducting a risk analysis of an
ADP facility and related assets. Provides guidance on collecting,
quantifying, and analyzing data related to the frequency of caused by
adverse events. This guideline describes the characteristics and
attributes of a computer system that must be known for a risk analysis
and gives an example of the risk analysis process.

Guideline For Computer Security Certification And Accreditation FIPS
PUB 102 September 1983 Describes how to establish and how to carry
out a certification and accreditation program for computer security.
Certification consists of a technical evaluation of a sensitive system to
see how well it meets its security requirements. Accreditation is the
official management authorization for the operation of the system and
is based on the certification process.

Guideline On Electrical Power For Adp Installations FIPS PUB 94
September 1982 Provides information on factors in the electrical
environment that affect the operation of ADP systems. Describes the
fundamentals of power, grounding, life-safety, static electricity, and
lightning protection requirements, and provides a checklist for
evaluating ADP sites.

Guidelines On Evaluation Of Techniques For Automated Personal
Identification FIPS PUB 48 April 1977 Discusses the performance of
personal identification devices, how to evaluate them and
considerations for their use within the context of computer system
security.

Guidelines For Security Of Computer Applications FIPS PUB 73 June
1980 Describes the different security objectives for a computer
application, explains the control measures that can be used, and
identifies the decisions that should be made at each stage in the life
cycle of a sensitive computer application. For use in planning,
developing and operating computer systems which require protection.
Fundamental security controls such a data validation, user identity
verification, authorization, journalling, variance detection, and
encryption are discussed.

Guidelines For Implementing And Using The Nbs Data Encryption
Standard FIPS PUB 74 April 1981 Provides guidance for the use of
cryptographic techniques when such techniques are required to protect
sensitive or valuable computer data. For use in conjunction with FIPS
PUB 46 and FIPS PUB 81.

Guidelines On Integrity Assurance And Control In Database
Applications FIPS PUB 88 August 1981 Provides explicit advice on
achieving database integrity and security control. Identifies integrity
and security problems and discusses procedures and methods which
have proven effective in addressing these problems. Provides an
explicit, step-by-step procedure for examining and verifying the
accuracy and completeness of a database.

Guidelines On User Authentication Techniques For Computer Network
Access Control FIPS PUB 83 September 1980 Provides guidance in the
selection and implementation of techniques for authenticating the
users of remote terminals in order to safeguard against unauthorized
access to computers and computer networks. Describes use of
passwords, identification tokens, verification by means of personal
attributes, identification of remote devices, role of encryption in
network access control, and computerized authorization techniques.

Hagopian, Greg “Planning and Implementing a Security Package.”
Data Processing & Communications Security vol 10 no. 4 Fall 1986 pp.
17-20 This article discusses vendor selection and legal issues.

Harris, N.L. “Rigid Administrative Procedures Prevent Computer
Security Failure.” Data Management vol 22 no. 12 December 1984 pp.
13-14, 16 The best way to keep a security program from failing is the
use of strict administrative procedures. This article also discusses why
some systems fail.

Harrison, M.A. and Ruzzo, W.L. Protection in Operating Systems
Comm of the ACM, Aug 1976.

Helsing, Cherly W. “Disaster Recovery Options.” Security vol 24 no. 7
July 1987 pp. 100-103 This article has suggestions on how to find a
recovery plan that fits your firm without damaging your profits.

Highland, Harold J. “From the Editor — Computer Viruses.” Computers
& Security, Aug 1987.

Holtzman, Henry “Keeping Your Offices Safe and Sound” Modern
Office Technology, May 1985 pp 92 ff.

Highland, Harold J. Protecting Your Microcomputer System. John
Wiley & Sons, Inc. N.Y.1984

Horgan, J. “Thwarting The Information Thiefs.” IEEE Spectrum vol 22
no. 7 July 1985 pp. 30-41 Many organizations are protecting their
communication output from electronic interception by trying to detect
and foil the surveillance using a variety of methods.

Hutton’s Building System and Controls Catalog From Hutton
Publishing Co., Inc. 1988 Environmental Security Free This catalog
provides a wide variety of environmental computer security related
products and services.

Industrial Security Letter Irregular Newsletter From Defense
Investigative Service Directorate for Industrial Security 1900 Half
Street, SW Washington, D.C. 20324 Free to qualified readers. This
newsletter provides operating procedures for the Defense Industrial
Security Program (DISP) operations at cleared facilities.

Inglesby, Tom “Fighting Flash ‘n’ Flicker” Infosystems November, 1984,
pp 88 ff.

Internal Auditor Bimonthly Journal From Institute of Internal
Auditors 249 Maitland Avenue Altamonte Springs, FL 32701 (305)
830-7600 $24.00 Annually This journal looks at techniques and
principles of internal control and auditing.

Israel, Howard “Computer Viruses: Myth or Reality?”. Proceeding of
the 10th National Computer Security Conference, Gaithersburg MD,
Sept 1987.

Isaac, Irene Guide On Selecting Adp Backup Process Alternatives NBS
SPEC PUB 500-134 November 1985 Discusses the selection of ADP
backup processing support in advance of events that cause the loss of
data processing capability. Emphasis is placed on management support
at all levels of the organization for planning, funding, and testing of an
alternate processing strategy. The alternative processing methods and
criteria for selecting the most suitable method are presented, and a
checklist for evaluating the suitability of alternatives is provided.

Jackson, Carl B. “Passwords: Comments from the Information Systems
Security Association.” Security vol 24 no. 7 July 1987 pp. 105 Discusses
relevant security issues and how to bring an appropriate degree of
LAN information security to your organization.

Johnson, B. “Criminal Minds Keep Pace with Technology. Stop, Thief!.”
Computerworld vol 15, 16 no. 52, 1 December 28, 1981, January 4,
1982 pp. This article looks at some of the common problems that the
DP industry faces today including computer security, asset protection,
and computer fraud prevention.

Johnston, R.E. “What You Need To Know.” Infosystems vol 32 no. 1
January 1985 pp. 56 Outlined in this article are those things that
should be considered when establishing a computer security program
or updating an existing program.

Johnston, Stuart J. “Microsoft OS/2 LAN Manager: Network Access
Control Issues Remain” InfoWorld, March 20, 1989, p. 42.

Jordan, Halmuth “The Search for Privacy.” Security Management vol
31 no. 11 November 1987 pp. 32-36 This article focuses on some of the
difficulties the legal profession is having by looking at American and
West German law regarding electronic surveillance.

Joseph, Mark K. “Toward the Elimination of the Effects of Malicious
Logic: Fault Tolerance Approaches” Proceeding of the 10th National
Computer Security Conference, Gaithersburg MD, Sept 1987

Journal of the National Classification Management Society Annually
Journal From National Classification Management Society, Inc. 6116
Roseland Drive Rockville, MD 20852 (301) 231-9191 Free to Members
Only Identifies communications and information processing systems
their vulnerabilities and a range of methods for improving the security
of these systems.

Karser, Paul A. “Limiting the Damage Potential of Discretionary
Trojan Horses” Proceedings of the Symposium on Security and Privacy
1987 Oakland CA, Published by the IEEE.

Kluepfel, Henry M. “Computer Security for the Abuser Friendly
Environment.” Data Processing & Communications Security vol 9 no. 2
November/December 1984 pp. 16-20 This article discusses the
underlying lack of adequate controls in computer systems and their
relation to computer abuse and crime.

Koelle, Jim “What’s in the Cards?.” Security vol 23 no. 12 December
1986 pp. 42-44, and 46 This article discusses microchips and how they
promise to revolutionize access card technology with fast, calculating,
and advanced memories.

Kontur, J.S. and Letham, L. “Locking Up System Security.” Electronic
Week vol 58 no. 7 February 18, 1985 pp. 68-72 This article describes a
system that cannot be broken into by unauthorized users. It uses a
random-number generator and encryption logic.

Korzeniowski, P. “Security Dynamics Releases Two-Part Security
System.” Computerworld vol 19 no. 42 October 1985 pp. 19, 23 This
article discusses a product Security Dynamics has designed that is an
inexpensive security protection device which keeps hackers out of
systems.

Korzeniowski, P. “ADAPSO Making Progress on Software Protection
Device.” Computerworld vol 19 no. 24 June 1985 pp. 8 This article
discusses how the Association of Data Processing Service Organizations
(ADAPSO) is getting ready to announce its progress in creating a
software authorization mechanism.

Kull, D. “How to Make Even E.F. Hutton Listen.” Computer Decisions
vol 17 no. 18 September 1985 pp. 42-50 The most effective way for an
organization to prevent breaches in a computer system is to plug the
holes that have already been used to violate the system and identify
the intruders.

Lapid, Ahituv, and Newmann “Approaches to Handling ‘Trojan Horse’
Threats” Computer & Security Sept 1986.

LaPlante, Alice “Study Finds IS Managers Are More People-Oriented”
InfoWorld, March 20, 1989, p.5

Lasden, Martin “Computer Crime.” Computer Decisions vol no. June
1981 pp. 104-106, 108 112, 116, 118, 120, 122, 124 This article
discusses actual computer crimes that have taken place and the factors
that escalate the risk of an organization from these types of crime.

Lemke, Fred H. “Blackouts and Computer Power Protection.” Data
Processing & Communications Security vol 12 no. 2 Spring 1988 pp.
19-23 This article is a study that was taken to see emerging patterns
of blackouts that may be useful in helping evaluate your level of
blackout vulnerability and then set up appropriate levels of power
protection for your electronic systems.

Lemke, Fred H. “Computer Power Protection.” Data Processing &
Communications Security vol 8 no. 4 March/April 1984 pp. 31-33 This
article gives examples of how to protect your facility against the
harmful effects of an electrical power outage.

Leuser, K.G. “Security Programs: Only as Good as We Make Them.”
Office vol 100 no. 2 August 1984 pp. 91-92 Discusses how an effective
security program helps to foil or discourage people with dishonest
intentions. Looks at the office administrator’s domain to identify areas
of potential vulnerability.

Levitt, Karl N., Peter Neumann, and Lawrence Robinson The SRI
Hierarchical Development Methodology (HDM) And Its Application To
The Development Of Secure Software October 1980 NBS SPEC PUB
500-67 Describes the SRI Hierarchical Development Methodology for
designing large software systems such as operating systems and data
management systems that must meet stringent security requirements.

Linden, Jack “Automated EDP Risk Analysis and Management.” Data
Processing & Communications Security vol 9 no. 1 September/October
1984 pp. 16-18 This article gives a cost effective first step in developing
a successful computer security program using a cost benefit analysis
approach.

Lobel, J. “Third Decade of Concern.” Computerworld vol 16 no. 6
February 8, 1982 pp. 1D/31-34 & 36 The author looks at some of the
issues associated with distributed data processing including privacy,
crime, and security.

Longley, Dennis and Shain, Michael. Data and Computer Security

Lucas, D. “The Invisible Enemy.” Business Computing and
Communication vol no. February 1985 pp. 18-20 This article describes
how home computer users are breaking into some of Britain’s
mainframe computers. Various procedures that can protect against
intrusion are also discussed by the author.

Lundell, Allan. A video based on his book VIRUS! called VIRUS! The
Video. Write him at 175 Flintrock Lane, Ben Lomond, CA 95005.

McCarthy, Charles J. “Passwords.” Data Processing & Communications
Security vol 10 no. 4 Fall 1986 pp. 13-14 This article discusses the two
primary password configurations passwords defined by user, and
passwords assigned to a user. It shows the differences between these
two from a security view.

McGowan, Kevin J. “Computer Power Protection.” Data Processing &
Communications Security vol 9 no. 5 May/June 1985 pp. 21-25 This
article looks at understanding AC power conditions in data processing
site preparation and its criticality for preventing future computer
downtime and disruptions.

McKibbin, W.L. “Who Gets The Blame For Computer Crime.”
Infosystems vol 30 no. 7 July 1983 pp. 34-36 MIS managers are
ultimately responsible for the security of their computers. Since they
are responsible they should make sure upper management is aware of
the vulnerabilities of their computers.

McLellan, Vin “Computer Systems Under Siege” The New York
Times, January 31, 1988.

Meason, Robert “System Security at the Terminal.” Data Processing &
Communications Security vol 10 no. 4 Fall 1986 pp. 16-17 This article
discusses considerations of MIS management protection of the
processor from access by unauthorized users.

Menkus, Belden “Agencies Fail to Appreciate Threat to Data Security”
Government Computer News, April 29, 1988, p. 36.

Miskiewicz, J. “DP Security: A Delicate Balance.” Computer Decisions
vol 17 no. 8 April 1985 pp. 104-106 This article discusses the delicate
balance between protecting vital resources in a data processing facility
and enhancing productivity.

Minoli, D. “Backup Needs Merit Special Attention.” Computerworld vol
19 no. 15 April 1985 pp. 91, 96 This article focuses on the merits of
backing up a data center to prevent a major disaster from critically
affecting a company.

Moore, Gwendolyn B., John L. Kuhns, Jeffrey L. Treffzs and Christine
A. Montgomery Accessing Individual Records From Personal Data Files
Using Nonunique Identifiers NBS SPEC PUB 500-2 February 1977
Analyzes methodologies for retrieving personal information using
nonunique identifiers such as name, address, etc. This study presents
statistical data for judging the accuracy and efficiency of various
methods.

Moulton, R. “Prevention: Better Than Prosecution.” Government Data
Systems vol 10 no. 6 November/December 1981 pp. 20 & 22-23 The
focus of this paper is on deterrence of computer abuse, whether it is
unintentional or intentional.

Munro, N. & Danca, R.A. “Federal Officials Puzzled by Computer Virus
Attacks”, Government Computer News, April 29, 1988.

Murray, W.H. “Security Considerations for Personal Computers,” IBM
System Journal, Vol. 23, No. 3 (1984), pp. 297-304.

Murray, W.H. “Security Risk Assessment in Electronic Data Processing
Systems,” IBM Publication Number G320-9256-0 (1984).

Murray, W.H. “Good Security Practices for Information Systems
Networks,” IBM Publication Number G360-2715-0 (1987).

Murray, W.H. “An Executive Guide to Data Security,” IBM Publication
Number G320-5647-0 (1975).

Murray, W.H. “Security, Auditability, System Control Publications
Bibliography,” IBM Publication Number G320-9279-2 (1987).

Muzerall, Joseph V. and Carty, Thomas J. “COMSEC and Its Need for
Key Management.” Data Processing & Communications Security vol 11
no. 2 Spring 1987 pp. 11-14 This article explains the establishment of
a standard set of protection mechanisms for both the classified and
private user communities.

Mylott, T.R. “Computer Security and the Threats from Within.” Office
vol 101 no. 3 March 1985 pp. 45-46, 190 This article explains that the
greatest computer-related danger to a company may be from internal
threats by employees.

National Computer Security Center, Personal Computer Security
Considerations December, 1985. NCSC-WA-002-85.

National Institute of Justice NIJ Reports Bimonthly Journal From
National Criminal Justice Reference Service Box 6000 Rockville, MD
20850 (301) 251-5500 Free to registered users of the NIJ. This journal
provides summaries of research reports to help keep you up to date
with advances in the field of criminal justice.

NBS Special Publication 500-120. Security of Personal Computer
Systems: A Management Guide. National Bureau of Standards, Jan
1985.

Neugent, William, John Gilligan, Lance Hoffman, and Zella G.
Ruthberg Technology Assessment; Methods For Measuring The Level Of
Computer Security October 1985 NBS SPEC PUB 500-133 The
document covers methods for measuring the level of computer security,
i.e. technical tools or processes which can be used to help establish
positive indications of security adequacy in computer applications,
systems, and installations. The report addresses individual techniques
and approaches, as well as broader methodologies which permit the
formulation of a composite measure of security that uses the results of
these individual techniques and approaches.

Nicolai, Carl “Encryption Decyphered” Computers and Electronics, June
1984, pp 64 ff.

NIST Special Publication 500-166. Computer Viruses and Related
Threats: A Management Guide. National Institute of Standards and
Technology, Aug 1989. Available from Superintendent of Documents,
U.S. Government Printing Office, Washington, D.C. 20402. Order by
stock no. 003-003-02955-6 for $2.50 prepaid. Editors and reporters can
get a copy from the NIST Public Information Division, 301/975-2762.
The guide is intended to help managers prevent and deter virus
attacks, detect when they occur, and contain and recover from an
attack. It provides general guidance for management and users, plus
more specific guidance for multi-user computer environments and for
personal computer environments. It also contains a list of suggested
readings.

Orceyre, Michel J. and Robert H. Cortney, Jr. Edited by Gloria R.
Bolotsky Considerations In The Selection Of Security Measures Of
Automatic Data Processing Systems Details methods and techniques for
protecting data NBS SPEC PUB 500-33 processed by computer and
transmitted via telecommunications lines. This report identifies the
controls that can be instituted to protect ADP systems when risks and
potential losses have been identified.

Parker, D.B. “The Many Faces of Data Vulnerability.” IEEE Spectrum
vol 21 no. 5 May 1984 pp. 46-49 Discussed in this paper are both the
need for new computer security methods and the attainable limits that
can be reached by computer security.

Parker, T. “Public domain software review: Trojans revisited,
CROBOTS, and ATC.” Computer Language. April 1987.

Patrick, Robert L. Performance Assurance And Data Integrity Practices
January 1978 NBS SPEC PUB 500-24 Details practices and methods
that have been successful in preventing or reducing computer system
failures caused by programming and data errors. The methods
described cover large data processing applications, scientific computing
applications, programming techniques and systems design.

Personal Identification News Monthly Newsletter From Personal
Identification News P.O. Box 11018 Washington, DC 20008 (202)
364-8586 $265.00 Annually This newsletter discusses advanced access
control technologies including plastic cards and authentication to
biometrics.

Pieper, Oscar R. “Voice Authentication Wages A War on Data Base
Fraud.” Data Processing & Communications Security vol 8 no. 6
July/August 1984 pp. 12-13 This article reviews the present state of
voice authentication technology and how it applies to secure data bases
from bogus intruders.

Police & Security Bulletin Monthly Newsletter From Lomond
Publications P.O. Box 88 Mt.Airy, MD 21771 (301) 829-1496 $72.00
Annually This newsletter is designed for specialist in law enforcement,
criminal justice and security.

Power, Kevin “Over Half of Agencies Meet Security Training
Deadline” Government Computer News, May 15, 1989, p. 85.

Pozzo, M.M., Gray, T.E. “An approach to containing computer viruses”
Computer & Security, Aug 1987.

Pozza, M.M., Gray, T.E. “Managing Exposure to Potentially Malicious
Rograms” Proceeding of the 9th National Computer Security
Conference, Gaithersburg MD, Sept 1986.

Privacy Journal Monthly Journal From Privacy Journal P.O. Box
15300 Washington, DC 20003 (202) 547-2865 $89.00 Annually This
journal looks at privacy issues and how they relate to all levels of
government and private sectors.

Pujals, J.M. “What is a Contingency Plan?.” Data Processing &
Communications Security vol 12 no. 1 Winter 1988 pp. 19-23 This
article tells how to construct a contingency plan and goes over the
major mandatory steps that have to be taken to end up with a
workable product.

Raimondi, D. “E.F. Hutton Underscores Practicality in Backup Plan.”
Computerworld vol 19 no. 15 April 1985 pp. 19 Describes how E.F.
Hutton has built a new computer room as part of its disaster recovery
plan.

Rames, David “Recovering From Disasters.” Computer Decisions vol no.
September 1981 pp. 108-110, 112, 114, 120, 122, 124, 126-131, 188-189
Described in this article are criteria for developing an emergency
backup plan and examples of emergency backup alternatives.

Reber, Jan “The Essence of Industrial Espionage.” Data Processing &
Communications Security vol 10 no. 1 Winter 1986 pp. 24-25 This
article discusses understanding espionage by a characteristic all spies
have in common “access to the target”.

Reeds, J. A. and Weinberger, P. J. “File Security and the UNIX
Systems Crypt Command” AT&T Bell Laboratories Journal, Oct 1984

Reid, T. R. “Fending Off a ‘Computer Virus’ Means Taking Only a
Few Precautions” Washington Post, Feb 15, 1988.

Rhodes, B. “Micro Security That Makes Sense.” Computer Decisions vol
17 no. 9 May 1985 pp. 72, 74-76 This article describes security
procedures that can be used by employees to solve microcomputer
security problems.

Risk Management Manual (3 Volumes) From The Merrit Company
1985 (Bimonthly Supplements) Risk Management $283.00 This manual
provides easy-to-understand fundamentals and specifics for initiating
and maintaining a risk management program.

Roberts, J.E. “Filing Software Copyrights.” Computerworld vol 19 no.
36 September 1985 pp. 116 This article describes how copyrighting
software is accomplished and what copyrighted software means.

Roberts, Ralph. Computer Viruses COMPUTE! Publications Inc., 1989.

Rosch, W. “Three Products Help Cork Computer Leaks, Feature
Blocked Access, Disk-File Encryption.” PC Week vol 2 no. 18 May 1985
pp. 122-124 This article discusses a trio of products to help prevent
unauthorized access to a computer system.

Rosch, Winn L. “Internal Security” PC Week May 7, 1985 pp 89 ff.

Rosen, Richard D. and Dvorsky, James “Portable Data Carrier
Technology.” Data Processing & Communications Security vol 12 no. 1
Winter 1988 pp. 9-19 This article presents an overview of the general
field of portable data carrier technology. Included are not only smart
cards but other devices and systems that are beginning to emerge in
the marketplace.

Rosenthal, Lynne S. Guideline on Planning and Implementing
Computer Systems Reliability NBS Spec PUB 500-121 January 1985
This report presents guidance to managers and planners on the basic
concepts of computer system reliability and on the implementation of a
management program to improve system reliability. Topics covered
include techniques for quantifying and evaluating data to measure
system reliability, designing systems for reliability, and recovery of a
computer system after it has failed or produced erroneous output. An
appendix contains references and a list of selected readings.

Ruder, Brian and J. D. Madden An Analysis Of Computer Security
Safeguards For Detecting And Preventing Intentional Computer Misuse
January 1978 NBS SPEC PUB 500-25 Analyzes 88 computer safeguard
techniques that could be applied to recorded actual computer misuse
cases. Presents a model for use in classifying and evaluating
safeguards as mechanisms for detecting and preventing misuse.

Ruthberg, Zella G. Audit And Evaluation Of Computer Security Ii:
System Vulnerabilities And Controls April 1980 NBS SPEC PUB
500-57 Proceedings of the second NBS/GAO workshop to develop
improved computer security audit procedures. Covers eight sessions:
three sessions on managerial and organizational vulnerabilities and
controls and five technical sessions on terminals and remote
peripherals, communication components, operating systems,
applications and non-integrated data files, and data base management
systems.

Ruthberg, Zella and Bonnie Fisher Work Priority Scheme For Edp
Audit And Computer Security Review August 1986 NBSIR 86-338 This
publication describes a methodology for prioritizing the work performed
EDP auditors and computer security reviewers. Developed at an
invitational workshop attended by government and private sector
experts, the work plan enables users to evaluate computer systems for
both EDP audit and security review functions and to develop a
measurement of the risk of the systems. Based on this measure of risk,
the auditor can then determine where to spend review time.

Ruthberg, Zella and Robert McKenzie (editors) Audit And Evaluation
Of Computer Security October 1977 NBS SPEC PUB 500-19 Reports on
the recommendations of audit and computer experts to improve
computer security audit procedures. Subjects covered include audit
standards, administrative and physical controls, program and data
integrity, and audit tools and techniques.

Ruthberg, Zella G. and William Neugent Overview Of Computer
Security Certification And Accreditation April 1984 NBS SPEC PUB
500-109 This publication is a summary of and a guide to FIPS PUB
102, Guideline to Computer Security Certification and Accreditation. It
is oriented toward the needs of ADP policy managers, information
resource managers, ADP technical managers, and ADP staff in
understanding the certification and accreditation process.

Rutz, Frank “DOD Fights Off Computer Virus” Government Computer
News Feb 5, 1988.

Samuel, J. “Defense Net Broken Into – Again”, Communications Week,
December 5, 1988, p.1

Schabeck, Timothy A. Computer Crime Investigation Manual From
Assets Protection 1980 Abuse/Misuse/Crime $39.95 Clear and precise
overview of computer hardware, software, operations, and job
functions.

Schiller, Michael “Security at the Touch of a Finger.” Data Processing
& Communications Security vol 9 no. 6 July/August 1985 pp. 15-17
This article discusses using biometric security systems for high-tech
solutions to access control problems.

Schmonsees, Robert J. “Identification and Authentication: The Security
Challenge of the 80’s.” Data Processing & Communications Security vol
9 no. 4 March/April, 1985 pp. 22-23 This article discusses the computer
security issues of identification and authentication showing the
common problems and offering some suggestions for improving by
random passcode.

Schnaidt, Patricia. “Fasten Your Safety Belt”. LAN Magazine, Oct
1987.

Schriever, Joe F. “Structuring for Security.” Data Processing &
Communications Security vol 9 no. 1 September/October 1984 pp. 14-16
This article is a set of guidelines that will remove ambiguities as to
what will be done by whom to provide system security.

Schweig, Barry B. “Decision Matrix: A Risk Handling Decision Aid.”
Data Processing & Communications Security vol 8 no. 4 March/April
1984 pp. 16-18 This article discusses conceptualizing a decision-matrix
as an integral component of a risk management process.

Scoma, Louis “How Secure Is Your Computer Operation From A
Disaster.” Office vol no. August 1981 pp. 96, 98 The failures of
companies to protect their computer centers is discussed along with the
need for recovery systems to serve as backup security.

Security Monthly Magazine From Cahners Publishing Company 275
Washington Street Newton, MA 02158 (617) 964-3030 Free to qualified
readers. This magazine is written for the industrial and commercial
loss-prevention specialist.

Security Awareness Bulletin Irregular Bulletin From Department of
Defense Security Institute (DoDSI) C/O Defense General Supply
Richmond, VA 23297-5091 Free Discusses security awareness and
compliance with security procedures through dissemination of
information to security trainers.

Security Dealer Monthly Magazine From PTN Publishing Co. 210
Crossways Park Drive Woodbury, NJ 11797 (517) 496-8000 $10.00
Annually This magazine contains articles relating to security products
and general security procedures.

Security Distributing & Marketing Monthly Magazine From Cahners
Publishing Company 275 Washington Street Newton, MA 02158 (617)
964-3030 Free to qualified readers. This magazine is written for
dealers, distributors, and installers of loss prevention equipment,
including crime and fire prevention and detection products and
services.

Security Letter Biweekly Newsletter From Security Letter, Inc. 166
East 96th Street New York, NY 10128 (212) 348-1553 $147.00
Annually This newsletter looks at industrial and commercial security,
and emphasizes not only corporate security planning but also physical
security systems and personnel security.

Security Management Monthly Magazine From American Society for
Industrial Security 1655 N. Ft. Meyer Drive Suite 1200 Arlington, VA
22209-3198 (703) 522-5800 $65.00 Annually This magazine was written
for managers in charge of both security and loss prevention.

Security Systems Monthly Magazine From PTN Publishing Company
210 Crossways Park Drive Woodbury, NJ 11797 (516) 496-8000 Free to
qualified readers. This magazine covers topics of interest to the
professional security director- industrial, governmental, institutional, or
retail.

Security Systems Digest Biweekly Digest From Washington Crime
News Service 7043 Wimsatt Road Springfield, VA 22151-4070 (703)
941-6600 $95.00 Annually This digest provides news on the latest
developments in security systems.

Shaw, James K. and Stuart W. Katzke Executive Guide To Adp
Contingency Planning July 1981 NBS SPEC PUB 500-85 This
document provides, in the form of questions and answers, the
background, and basic essential information required to understand the
developmental process for automatic data processing (ADP) contingency
plans. The primary intended audience consists of executives and
managers who depend on ADP resources and services, yet may not be
directly responsible for the daily management or supervision of data
processing activities or facilities.

Shoch, J.F and Hupp, J.A. “The ‘Worm’ Programs: Early Experience
with a Distributed Computation”. Communications of the ACM, Mar
1982.

Shabeck Computer Crime Investigation A comprehensive manual for
investigating computer crimes. 380 pp $39.95 Computer Protection
Systems.

Shabeck Emergency Planning Guide for Data Processing Centers
Provides information necessary for preparing an effective
emergency/disaster plan for your organization. 92 pp $10. Computer
Protection Systems.

Shabeck Managing Microcomputer Security Addresses security in a
wide variety of micro settings. 180 pp $25. Computer Protection
Systems.

Shannon, Terry C., Technical Editor Computer Security Handbook: The
Practitioner’s “Bible” From Computer Security Institute 1985 General
Security $95.00 Contains a number of articles and technical papers
dealing with computer security issues such as training and security
safeguards.

Sharp, Brown “Computer Viruses Invade a Low-Immunity Congress.
Government Computer News, September 4, 1989, p. 11.

Shoch, J. F. and Hupp, J. A. “The Worm Programs: Early Experience
with a Distributed Computation” Communications of the ACM, Mar
1982.

Shoop, Tom & David J. Stang “Beating Back a Virus Attack”
Government Executive, April, 1990, p. 40 ff.

Smid, Miles E. A Key Notarization System For Computer Networks
October 1979 NBS SPEC PUB 500-54 Describes a system for key
notarization, which can be used with an encryption device, to improve
data security in computer networks. The key notarization system can
be used to communicate securely between two users, communicate via
encrypted mail, protect personal files, and provide a digital signature
capability.

Software Protection Monthly Journal From Law and Technology Press
P.O. Box 3280 Manhattan Beach, CA 90266 (213) 470-9976 $187.00
This journal provides current developments oriented around software
protection methods, products, and services.

Spafford, Eugene H. “The Internet Worm Program: An Analysis”.
Purdue Technical Report CSD-TR-823, Nov 28, 1988.

Srinivasan, C.A. and Dascher, P.E. “Computer Security and Integrity:
Problems and Prospects.” Infosystems vol 28 no. 5 May 1981 pp. 5
Pages Various aspects of computer security are discussed including
data security, data privacy, data integrity, etc.

Standard On Computer Data Authentication FIPS PUB 113 May 1985
This standard specifies a Data Authentication Algorithm (DAA) which,
when applied to computer data, automatically and accurately detects
unauthorized modifications, both intentional and accidental. Based on
the Data Encryption Standard (DES), this standard is compatible with
requirements adopted by the Department of Treasury and the banking
community to protect electronic fund transfer transactions.

Standard On Password Usage FIPS PUB 112 May 1985 This standard
defines ten factors to be considered in the design, implementation and
use of access control systems that are based on passwords. It specifies
minimum security criteria for such systems and provides guidance for
selecting additional security criteria for password systems which must
meet higher security requirements.

Stang, David J. Computer Security National Computer Security
Association, Washington, D.C. 1990. Revised every three months or
more often.

Stang, David J. Computer Viruses National Computer Security
Association, Washington, D.C. 1990. Revised every three months or
more often.

Stang, David J. Defend Your Data! A Guide to Data Recovery National
Computer Security Association, Washington, D.C. 1990. Revised every
three months or more often.

Stang, David J. “How to Sell Data Integrity” Reseller Management,
March 1990, p. 131ff.

Stang, David J. “PC Viruses: The Desktop Epidemic” The Washington
Post, January 14, 1990, p. B3.

Steinauer, Dennis D. Security Of Personal Computer Systems – A
Management Guide NBS SPEC PUB 500-120 This publication provides
practical advice on the following issues: physical and environmental
protection system and data access control; integrity of software and
data; backup and contingency planning; auditability; communications
protection. References to additional information, a self-audit checklist,
and a guide to security products for personal computers are included in
the appendices.

Stieglitz, M. “Security For Shared Resources.” Micro Communications
vol 2 no. 6 June 1985 pp. 19-26 This article discusses data security
products and procedures for network use. Includes description of
encryption techniques that are now popular.

Sugawara, S. “Report Says Computers Are at Risk. Government Told
to Tighten Security” The Washington Post, November 22, 1988, p. C1,
C2.

Taft, Darryl K. “Computer Security Center Sees Opportunity in UNIX”
Government Computer News, September 4, 1989, p. 68.

Thompson, Ken. “Reflections on Trusting Trust (Deliberate Software
Bugs)” Communications of the ACM, Vol 27, Aug 1984.

Tinto, Mario. “Computer Viruses: Prevention, Detection, and
Treatment.” National Computer Security Center C1 Tech. Rpt.
C1-001-89, June 1989.

Troy, Eugene F. Security For Dial-up Lines May 1986 NBS SPEC PUB
500-137 Ways to protect computers from intruders via dial- up
telephone lines are discussed in this guide. Highlighted are hardware
devices which can be fitted to computers or used with their dial-up
terminals to provide communications protection for non-classified
computer systems. Six different types of hardware devices and the
ways that they can be used to protect dial-up computer
communications are described. Also discussed are techniques that can
be added to computer operating systems or incorporated into system
management or administrative procedures.

U.S. Government Telecommunications: General Security Requirements
for Equipment Using the Data Encryption Standard Federals Standard
1027.

Vernick, Paul R. “Providing Data Processing Recovery Backup.” Data
Processing & Communications Security vol 9 no. 4 March/April, 1985
pp. 14-16 This article covers some of the major emergency and recovery
planning options available that need to be considered prior to the
occurrence of any serious emergency.

Walsh, Timothy J. and Healy, Richard J. Protection of Assets (4
Volumes) From The Merrit Company 1974 (Updated Monthly) General
Security $285.00 This manual helps you design and maintain an
effective, cost saving, on-going program for total assets protection.

Weber, A. “Effective Security Programs Start with Awareness.” Data
Management vol 23 no. 11 November 1985 pp. 34-35 Educating end
users is the key to helping prevent crime and computer abuse in an
organization.

Weixel, S. “Most accidents happen when companies neglect the basics.”
ComputerWorld, March 13, 1989, p.83.

Weller, Reginald H. “Off-Site Data Storage: A Changing Industry.”
Data Processing & Communications Security vol 9 no. 5 May/June 1985
pp. 18-20 This article discusses selecting a backup site while meeting
the criteria of integrity, reliability, access, reasonable cost, appropriate
location, good security, and comprehensive insurance coverage.

Westin, Alan F. ERS, Personnel Administration, And Citizen Rights
NBS SPEC PUB 500-50 July 1979 Reports on the impact of computers
on citizen computer rights in the field of personnel record keeping.
This study traces the changing patterns of employment and personnel
administration and examines the trends in computer use in personnel
administration. It recommends policy actions to guide the management
of personnel systems that respect citizen rights.

White, Steve, David Chess, & Jimmy Kuo “Coping with Computer
Viruses and Related Problems” IBM, Thomas J. Watson Research
Center, Distribution Services F-11 Stormytown, Post Office Box 218,
Yorktown Heights, New York 10598. 1989.

White, L. “Data Security – You Can’t Work Without It.” Computerworld
vol 19 no. 11A March 1985 pp. 27-30 The problem of the disgruntled
employee or ex-employee who sabotages a computer system is seen as
more of a threat than an outside hacker.

Withrow, J.B. Security Handbook for Small Computer Users From
National Technical Information Service April 1985 Microcomputer
Security $13.95 This manual discusses various security issues dealing
with small computers and the responsibilities users of small computers
have towards security.

Witten, I. H. “Computer (In)security: infiltrating open systems.” Abacus
(USA) Summer 1987.

Wolbrecht, J.E. “Can Your Records Storage Center Stand a Disaster.”
Office vol 102 no. 3 September 1985 pp. 112-113 A manager’s
responsibility to protect a records storage center by recognizing
vulnerable areas and making them more secure is discussed.

Wood, Helen The Use Of Passwords For Controlled Access To Computer
Resources May 1977 NBS SPEC PUB 500-9 Describes the need for and
uses of passwords. Password schemes are categorized according to
selection technique, lifetime, physical characteristics and information
content. Password protection and cost considerations are discussed. A
glossary and annotated bibliography are included.

Wood, Charles Cresson “A New Approach to Computer User
Authentication.” Data Processing & Communications Security vol 10
no. 4 Fall 1986 pp. 21-26 This article gives a new approach to
authentication called dial-guard. It addresses the two problems of
password/users IDs not providing sufficient security and identifying the
location of dial-up users.

Wood, Charles Cresson “Information Security with One-Way
Functions.” Data Processing & Communications Security vol 9 no. 5
May/June 1985 pp. 14-16 This article explains how one-way functions
can be used to safeguard information that is too sensitive to be
protected via encryption.

Wright, J.R. Jr. “User Responsibility for Security.” Government Data
Systems vol 15 no. 1 December 1985 through January 1986 pp. 52-55
This article looks at the circular “Management of Federal Information
Resources” printed by the Office of Management and Budget. This
circular provides guidance to Federal Managers concerning computer
security and the associated responsibilities.

Young, Catherine L. “Taxonomy of Computer Virus Defense
Mechanisms” Proceeding of the 10th National Computer Security
Conference, Gaithersburg MD, Sept 1987.

Zalud, Bill “Security and DP Cooperate to Attack Computer Crime.”
Security vol 24 no. 10 October 1987 pp. 52-56, & 58 This article
stresses teamwork as computer crime becomes a company fact of life by
effectively cuts across a number of functional areas.

Zimmerman, J.S. “P.C. Security: So What’s New.” Datamation vol 31
no. 21 November 1985 pp. 89-92 This article looks at the problems
data security officers are going to encounter even as they implement
safeguards for micros.

Zimmerman, J.S. “Is Your Computer Insecure?” Datamation vol 31 no.
10 May 1985 pp. 119-120 This article challenges widely accepted
notions concerning computer security. It suggest that people’s views
should be changed so that the challenge will be making a security
system work instead of beating it.

How to order ICST publications

These publications are available through the Government Printing
Office (GPO) and the National Technical Information Service (NTIS).
The source and price for each publication are indicated. Orders for
publications should include title of publication, NBS publication
number (Spec. Pub. 000, Tech. Note 000, etc.) and NTIS or GPO
number. Your may order at the price listed; however, prices are subject
to change without notice. Submit payment in the form of postal money
order, express money order or check made out to the Superintendent of
Documents for GPO-stocked documents or to the National Technical
Information Service for NTIS-stocked documents.

Mailing addresses are:

Superintendent of Documents, U.S. Government Printing Office,
Washington, DC 20402

National Technical Information Service, 5285 Port Royal Road,
Springfield, VA 22161

Telephone numbers for information are: GPO Order Desk: (202)
783-3238; NTIS Orders: (703) 487-4780; NTIS Information: (703)
487-4600

About FIPS (Federal Information Processing Standards) Publications

FIPS PUBS are sold by the National Technical Information Service
(NTIS), U.S. Department of Commerce. A list of current FIPS covering
all ICST program areas is available from: Standards Processing
Coordinator (ADP), Institute for Computer Sciences and Technology
Technology Building, B-64, National Bureau of Standards,
Gaithersburg, MD 20899 (30l) 975-2817
Downloaded From P-80 International Information Systems 304-744-2253

List of Abstracts on Computer Crime in various publications

90021932
Title: Is Computer Hacking a Crime?
Authors: Anonymous
Journal: Harper’s Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
Abstract: A round-table discussion on the ethics of computer hacking is
presented. The panelists include computer hackers, scientists,
activists and media members.
Subjects: Computer crime; Ethics; Social life & customs
Type: Feature
Length: Long (31+ col inches)

90008297
Title: Computer Hacking Goes on Trial
Authors: Allman, William F
Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990
pp: 25
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: The trial of Robert Morris, a graduate student who unleashed a
“worm” that caused computers around the US to grind to a halt on Nov
2, 1988, is discussed. Photograph; Illustration
Subjects: Trials; Computer crime
Names: Morris, Robert
Type: News
Length: Medium (10-30 col inches)

89121419
Title: Hackers: Is a Cure Worse Than the Disease?
Authors: Lewyn, Mark
Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Because of computer hacking, Pentagon officials would like to add
more layers of security to protect their networks. But this would
limit access to university and government scientists, who use the
information the most. Photograph
Subjects: Computer crime; Security systems; Computer networks
Names: Morris, Robert Jr
Type: Commentary
Length: Medium (10-30 col inches)

89059272
Title: Let’s Get Reckless
Authors: Gaines, Donna
Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: The developing social importance of computer viruses is explored.
Computer hacking and computer viruses have penetrated the
consciousness of the mainstream media and are being countered by
federal legislation. Illustration
Subjects: Computer crime; Social conditions & trends
Type: Commentary
Length: Medium (10-30 col inches)

90144244
Title: Risky Business: Tackling Computer Security
Authors: Peterson, Ivars
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
Abstract: In response to concerns about the security of US computer systems, a
National Research Council panel issued a report detailing the
extreme vulnerability of present-day systems. The report is
discussed.
Subjects: Computer crime; Computers & computer technology; National Research
Council
Type: News
Length: Medium (10-30 col inches)

90142863
Title: Law: Breaking and Entering
Authors: Lawren, Bill
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The US government’s efforts to crack down on computer crime may
violate the constitutional rights of hackers. The Electronic
Frontier Foundation (EFF) has been formed to fight for those rights.
Illustration
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
Type: Feature
Length: Medium (10-30 col inches)

90128169
Title: Balancing the Books: Spectacular Computer Crimes
Journal: Barron’s Date: Oct 1, 1990 pp: 55
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: Eric J. Savitz reviews “Spectacular Computer Crimes” by Buck
BloomBecker about computer crime and the danger it poses to
industry.
Subjects: Computer crime
Names: BloomBecker, Buck
Type: Book Review-Unfavorable
Length: Long (19+ col inches)

90125761
Title: Print Queue: Stomping the Nasties
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews “Computer Viruses, Worms, Data Diddlers, Killer
Programs, and Other Threats to Your System,” by John McAfee and
Colin Haynes. Illustration
Subjects: Nonfiction; Computer crime; Computer programming & languages;
Computers & computer technology
Names: McAfee, John; Haynes, Colin
Type: Book Review-Favorable
Length: Long (31+ col inches)

90118815
Title: Apple Ad Arresting, but Will Stay in Can
Authors: Johnson, Bradley
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: Apple Computer Inc pulled its $350,000 “Computer Crime” TV
commercial before it was aired. Apparently the company thought the
commercial might encourage the theft of Macintosh computers.
Subjects: Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type: News
Length: Short (1-9 col inches)

90109601
Title: Rights and Wrongs of Software
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Software copyrights have received much attention as software piracy
proliferates. Some experts believe software restrictions will
inhibit the development of better products and the growth of small
firms. Photograph; Illustration
Subjects: Software; Copyright; Computer programming & languages; Computer
crime
Type: Feature
Length: Long (31+ col inches)

90108876
Title: Eternal Plague: Computer Viruses
Authors: Cipra, Barry
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
Abstract: Recent findings indicate that there is no way to protect a computer
against all possible viral attacks. Two basic types of computer
viruses, the type that reproduces and the type that infects and
alters an operating system, are described.
Subjects: Computer programming & languages; Software; Operating systems;
Computer crime
Type: Feature
Length: Medium (10-30 col inches)

90099926
Title: Computer Center Certifies First Secure Network
Authors: Anonymous
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
Date: Sep 3, 1990 pp: 42
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
Abstract: The National Computer Center recently certified the first
multi-level secure computer network, the Verdix Secure Local Area
Network (VSLAN).
Subjects: Computer networks; Computer crime; Security systems; National
Computer Center
Type: News
Length: Short (1-9 col inches)

90099517
Title: Computer Hackers: United States v Zod
Authors: Anonymous
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The incompetence involved in the dramatic raids on computer hackers
by the Secret Service is discussed. The question of whether its
seizure of computers is constitutional is addressed. Photograph
Subjects: Computer crime; Computer networks; Law enforcement; Search &
seizure; Secret Service-US
Type: Commentary
Length: Medium (10-30 col inches)

90099086
Title: Computers, Crime, and the Law
Authors: Branwyn, Gareth
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
Socio/Environmental
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
part of an investigation into data piracy and computer crime.
Computer professional’s battle for free speech and privacy rights
are detailed.
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type: Commentary
Length: Medium (10-30 col inches)

90144244
Title: Risky Business: Tackling Computer Security
Authors: Peterson, Ivars
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
Abstract: In response to concerns about the security of US computer systems, a
National Research Council panel issued a report detailing the
extreme vulnerability of present-day systems. The report is
discussed.
Subjects: Computer crime; Computers & computer technology; National Research
Council
Type: News
Length: Medium (10-30 col inches)

90142863
Title: Law: Breaking and Entering
Authors: Lawren, Bill
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The US government’s efforts to crack down on computer crime may
violate the constitutional rights of hackers. The Electronic
Frontier Foundation (EFF) has been formed to fight for those rights.
Illustration
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
Type: Feature
Length: Medium (10-30 col inches)

90128169
Title: Balancing the Books: Spectacular Computer Crimes
Journal: Barron’s Date: Oct 1, 1990 pp: 55
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: Eric J. Savitz reviews “Spectacular Computer Crimes” by Buck
BloomBecker about computer crime and the danger it poses to
industry.
Subjects: Computer crime
Names: BloomBecker, Buck
Type: Book Review-Unfavorable
Length: Long (19+ col inches)

90125761
Title: Print Queue: Stomping the Nasties
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews “Computer Viruses, Worms, Data Diddlers, Killer
Programs, and Other Threats to Your System,” by John McAfee and
Colin Haynes. Illustration
Subjects: Nonfiction; Computer crime; Computer programming & languages;
Computers & computer technology
Names: McAfee, John; Haynes, Colin
Type: Book Review-Favorable
Length: Long (31+ col inches)

90118815
Title: Apple Ad Arresting, but Will Stay in Can
Authors: Johnson, Bradley
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: Apple Computer Inc pulled its $350,000 “Computer Crime” TV
commercial before it was aired. Apparently the company thought the
commercial might encourage the theft of Macintosh computers.
Subjects: Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type: News
Length: Short (1-9 col inches)

90109601
Title: Rights and Wrongs of Software
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Software copyrights have received much attention as software piracy
proliferates. Some experts believe software restrictions will
inhibit the development of better products and the growth of small
firms. Photograph; Illustration
Subjects: Software; Copyright; Computer programming & languages; Computer
crime
Type: Feature
Length: Long (31+ col inches)

90108876
Title: Eternal Plague: Computer Viruses
Authors: Cipra, Barry
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
Abstract: Recent findings indicate that there is no way to protect a computer
against all possible viral attacks. Two basic types of computer
viruses, the type that reproduces and the type that infects and
alters an operating system, are described.
Subjects: Computer programming & languages; Software; Operating systems;
Computer crime
Type: Feature
Length: Medium (10-30 col inches)

90099926
Title: Computer Center Certifies First Secure Network
Authors: Anonymous
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
Date: Sep 3, 1990 pp: 42
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
Abstract: The National Computer Center recently certified the first
multi-level secure computer network, the Verdix Secure Local Area
Network (VSLAN).
Subjects: Computer networks; Computer crime; Security systems; National
Computer Center
Type: News
Length: Short (1-9 col inches)

90099517
Title: Computer Hackers: United States v Zod
Authors: Anonymous
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The incompetence involved in the dramatic raids on computer hackers
by the Secret Service is discussed. The question of whether its
seizure of computers is constitutional is addressed. Photograph
Subjects: Computer crime; Computer networks; Law enforcement; Search &
seizure; Secret Service-US
Type: Commentary
Length: Medium (10-30 col inches)

90099086
Title: Computers, Crime, and the Law
Authors: Branwyn, Gareth
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
Socio/Environmental
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
part of an investigation into data piracy and computer crime.
Computer professional’s battle for free speech and privacy rights
are detailed.
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type: Commentary
Length: Medium (10-30 col inches)

90144244
Title: Risky Business: Tackling Computer Security
Authors: Peterson, Ivars
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
Abstract: In response to concerns about the security of US computer systems, a
National Research Council panel issued a report detailing the
extreme vulnerability of present-day systems. The report is
discussed.
Subjects: Computer crime; Computers & computer technology; National Research
Council
Type: News
Length: Medium (10-30 col inches)

90142863
Title: Law: Breaking and Entering
Authors: Lawren, Bill
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The US government’s efforts to crack down on computer crime may
violate the constitutional rights of hackers. The Electronic
Frontier Foundation (EFF) has been formed to fight for those rights.
Illustration
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
Type: Feature
Length: Medium (10-30 col inches)

90128169
Title: Balancing the Books: Spectacular Computer Crimes
Journal: Barron’s Date: Oct 1, 1990 pp: 55
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: Eric J. Savitz reviews “Spectacular Computer Crimes” by Buck
BloomBecker about computer crime and the danger it poses to
industry.
Subjects: Computer crime
Names: BloomBecker, Buck
Type: Book Review-Unfavorable
Length: Long (19+ col inches)

90125761
Title: Print Queue: Stomping the Nasties
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews “Computer Viruses, Worms, Data Diddlers, Killer
Programs, and Other Threats to Your System,” by John McAfee and
Colin Haynes. Illustration
Subjects: Nonfiction; Computer crime; Computer programming & languages;
Computers & computer technology
Names: McAfee, John; Haynes, Colin
Type: Book Review-Favorable
Length: Long (31+ col inches)

90118815
Title: Apple Ad Arresting, but Will Stay in Can
Authors: Johnson, Bradley
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: Apple Computer Inc pulled its $350,000 “Computer Crime” TV
commercial before it was aired. Apparently the company thought the
commercial might encourage the theft of Macintosh computers.
Subjects: Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type: News
Length: Short (1-9 col inches)

90109601
Title: Rights and Wrongs of Software
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Software copyrights have received much attention as software piracy
proliferates. Some experts believe software restrictions will
inhibit the development of better products and the growth of small
firms. Photograph; Illustration
Subjects: Software; Copyright; Computer programming & languages; Computer
crime
Type: Feature
Length: Long (31+ col inches)

90108876
Title: Eternal Plague: Computer Viruses
Authors: Cipra, Barry
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
Abstract: Recent findings indicate that there is no way to protect a computer
against all possible viral attacks. Two basic types of computer
viruses, the type that reproduces and the type that infects and
alters an operating system, are described.
Subjects: Computer programming & languages; Software; Operating systems;
Computer crime
Type: Feature
Length: Medium (10-30 col inches)

90099926
Title: Computer Center Certifies First Secure Network
Authors: Anonymous
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
Date: Sep 3, 1990 pp: 42
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
Abstract: The National Computer Center recently certified the first
multi-level secure computer network, the Verdix Secure Local Area
Network (VSLAN).
Subjects: Computer networks; Computer crime; Security systems; National
Computer Center
Type: News
Length: Short (1-9 col inches)

90099517
Title: Computer Hackers: United States v Zod
Authors: Anonymous
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The incompetence involved in the dramatic raids on computer hackers
by the Secret Service is discussed. The question of whether its
seizure of computers is constitutional is addressed. Photograph
Subjects: Computer crime; Computer networks; Law enforcement; Search &
seizure; Secret Service-US
Type: Commentary
Length: Medium (10-30 col inches)

90099086
Title: Computers, Crime, and the Law
Authors: Branwyn, Gareth
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
Socio/Environmental
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
part of an investigation into data piracy and computer crime.
Computer professional’s battle for free speech and privacy rights
are detailed.
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type: Commentary
Length: Medium (10-30 col inches)

90098358
Title: Artificial Intelligence: Computerized Breaking and Entering
Authors: Goldberg, Jeff
Journal: Omni Vol: 12 Iss: 12 Date: Sep 1990 pp: 18
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: To combat computer “worms,” such as the one created by Robert Tappan
Morris, software vendors are offering enhanced security programs.
The pros and cons of security are discussed. Illustration
Subjects: Computer crime; Software; Security systems
Type: Feature
Length: Medium (10-30 col inches)

90096176
Title: Spring Books: Guardian of the Gates
Authors: Dickman, Steven
Journal: Nature Vol: 344 Iss: 6269 Date: Apr 26, 1990 pp: 895-896
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech
Abstract: Steven Dickman reviews “The Cuckoo’s Egg,” by Clifford Stoll.
Photograph
Subjects: Nonfiction; Espionage; Computer crime
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Medium (10-30 col inches)

90095224
Title: Science and the Citizen: Digital Desperados
Authors: Wallich, Paul
Journal: Scientific American Vol: 263 Iss: 3 Date: Sep 1990 pp: 34-38
Jrnl Code: GSCA ISSN: 0036-8733 Jrnl Group: SciTech
Abstract: Many computer experts feel that the government is acting
overzealousy in its effort to crack down on computer crime. The
definition of computer crime has come into question.
Subjects: Computer crime; Law enforcement
Type: News
Length: Medium (10-30 col inches)

90094490
Title: Off the Hook
Authors: Dibbell, Julian
Journal: Village Voice Vol: 35 Iss: 34 Date: Aug 21, 1990 pp: 8
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: Federal prosecutors dropped charges against Craig M. Neidorf,
better known as the Knight Lightning computer hacker, on Jul 24,
1990. Neidorf had published a document detailing Bellsouth’s
emergency 911 system, although corporate officials agreed that the
information was not sensitive.
Subjects: Computer crime; Publishing; Telecommunications industry
Names: Neidorf, Craig M
Companies: BellSouth Corp
Type: News
Length: Short (1-9 col inches)

90091236
Title: Sending a Signal
Authors: Denning, Peter J
Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990
pp: 11, 13
Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic
Abstract: An editorial discusses Robert Morris Jr’s criminal sentence. Morris
was convicted in Jan 1990 of releasing a worm program into the
Research Internet in Nov 1988. Morris was given a suspended jail
term, a fine of $10,000 and 400 hours of community service.
Illustration
Subjects: Computer crime; Criminal sentences; Fines & penalties; Crime &
criminals
Names: Morris, Robert T Jr
Type: Editorial
Length: Medium (10-30 col inches)

90091223
Title: Insecurity about Security?
Authors: Neumann, Peter G
Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990 pp: 170
Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic
Abstract: The security provided with many computer systems is fundamentally
flawed. Better software and hardware systems are needed to hinder
misuse from within and penetration. Illustration
Subjects: Computers & computer technology; Computer crime; Security systems
Type: Commentary
Length: Medium (10-30 col inches)

90090104
Title: Forum: Playing the Data Game
Authors: Wise, Bob; Scisco, Peter
Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 16
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The Democratic congressman from West Virginia and the editor of
“Compute” magazine offer opinions on privacy and computer security.
Illustration
Subjects: Computer crime; Privacy
Type: Commentary
Length: Medium (10-30 col inches)

90090099
Title: Crime Bytes Back
Authors: Marsa, Linda; Ray, Don
Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 34-38+
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The high-tech world of future computer cops and robbers is
breathlessly described. Illustration
Subjects: Computer crime; Law enforcement; Social conditions & trends; Future
Type: Feature
Length: Long (31+ col inches)

90090027
Title: Books: The Cuckoo’s Egg
Authors: Connolly, John W D
Journal: Physics Today Vol: 43 Iss: 8 Date: Aug 1990 pp: 75-76
Jrnl Code: GPHT ISSN: 0031-9228 Jrnl Group: SciTech
Abstract: John W. D. Connolly reviews “The Cuckoo’s Egg: Tracking a Spy
Through the Maze of Computer Espionage,” by Clifford Stoll.
Subjects: Nonfiction; Computer crime; Computer networks; Espionage
Names: Stoll, Clifford
Type: Book Review-Mixed
Length: Medium (10-30 col inches)

90086946
Title: Hacker Trial under Way
Authors: Anderson, G Christopher
Journal: Nature Vol: 343 Iss: 6255 Date: Jan 18, 1990 pp: 200
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech
Abstract: The trial of Robert Morris Jr, the college student charged with
creating the “Cornell virus” that struck thousands of US computers
in 1988, is detailed. The law under which Morris is being
prosecuted, and its implications for future law enforcement for
computer crimes are examined. Photograph
Subjects: Trials; Computer crime; Law enforcement
Names: Morris, Robert
Type: Feature
Length: Medium (10-30 col inches)

90086606
Title: Viruses? Who You Gonna Call? ‘Hackerbusters’
Authors: Schwartz, Evan I; Rothfeder, Jeffrey
Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 71-72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Computer security, where purveyors of special software and
consulting methods offer protection from computer crime, is a $3
billion industry, but some critics claim that there are charlatans
out there. Graph; Illustration
Subjects: Industry profiles; Security systems; Computers & computer
technology; Computer crime; Consultants
Type: Feature
Length: Medium (10-30 col inches)

90086605
Title: Computer Anarchism Calls for a Tough Response
Authors: Rothfeder, Jeffrey; Schwartz, Evan I
Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: While computer break-ins and viruses are admittedly dangerous,
hysteria over the situation is no excuse for violating the
constitutional rights of suspected hackers. Photograph
Subjects: Computer crime; Civil rights
Type: Commentary
Length: Medium (10-30 col inches)

90085769
Title: Theft in the Classroom
Authors: Thornburg, David D
Journal: inCider Vol: 8 Iss: 8 Date: Aug 1990 pp: 88-90
Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech
Abstract: The issue of software piracy as it relates to use of computer
programs in the classroom is discussed. More sources of public
funding are needed so schools won’t be inclined to copy programs
illegally.
Subjects: Education & schools; Copyright; Software; Computer crime
Type: Commentary
Length: Medium (10-30 col inches)

90084275
Title: On Line and Out of Bounds
Authors: Dibbell, Julian
Journal: Village Voice Vol: 35 Iss: 30 Date: Jul 24, 1990 pp: 26-32
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: Computer hackers are penetrating some of the country’s most
sophisticated systems, and the government is targeting them as a
serious threat to national security. Secret Service raids on
hackers are described. Illustration
Subjects: Computer crime; Computer networks; Classified information; National
security; Secret Service-US
Type: Feature
Length: Long (31+ col inches)

90083828
Title: Crackdown on Hackers ‘May Violate Civil Rights’
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 22
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: The Electronic Frontier Foundation, a computer industry group, says
US efforts to crack down on computer “hackers” may be unlawful and
violate civil rights. Photograph
Subjects: Computer crime; Laws & legislation; Civil rights; United States–US;
Electronic Frontier Foundation
Type: News
Length: Medium (10-30 col inches)

90083805
Title: Private and Confidential
Authors: Reynolds, Chris
Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 58
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: The proliferation of electronic mail, bulletin boards and databases
is raising concerns over security and privacy in the computer age.
Illustration
Subjects: Electronic mail; Computers & computer technology; Privacy; Computer
crime
Type: Commentary
Length: Medium (10-30 col inches)

90081730
Title: Print Queue: Our Man in Berkeley
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 3 Date: Mar 1990 pp: 360-362
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews “The Cuckoo’s Egg: Tracking a Spy Through the
Maze of Computer Espionage,” by Clifford Stoll. Illustration
Subjects: Nonfiction; Computer crime; Espionage
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Long (31+ col inches)

90081052
Title: ‘Killer’ Computer Viruses: An Idea Whose Time Shouldn’t Come
Authors: Lewyn, Mark
Journal: Business Week Iss: 3170 Date: Jul 23, 1990 pp: 30
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: The Defense Department’s scheme to use a “killer” computer virus to
infiltrate an enemy’s computer system is discussed. Although
feasible, the concept could prove to be costly in more ways than
one. Illustration
Subjects: Computer crime; Espionage; Department of Defense
Type: Commentary
Length: Medium (10-30 col inches)

90078513
Title: Hackers of the World, Unite!
Authors: Schwartz, John
Journal: Newsweek Vol: 116 Iss: 1 Date: Jul 2, 1990 pp: 36-37
Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News
Abstract: As law-enforcement officials widen their crackdown on computer
tampering, computer pioneers like Mitch Kapor and Steve Wozniak are
joining in an effort to defend hackers and the freedom of
information. Photograph
Subjects: Computers & computer technology; Law enforcement; Computer crime
Type: News
Length: Long (31+ col inches)

90074799
Title: Man with a Modem
Authors: Campbell, Peter
Journal: New Statesman & Society Vol: 3 Iss: 106 Date: Jun 22, 1990
pp: 54
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
Abstract: Peter Campbell reviews “Beating the System: Hackers, Phreakers and
Electronic Spies,” by Owen Bowcott and Sally Hamilton.
Subjects: Nonfiction; Computer crime
Names: Bowcott, Owen; Hamilton, Sally
Type: Book Review-Mixed
Length: Medium (10-30 col inches)

90062822
Title: Microcomputer Security and Control
Authors: Forgione, Dana; Blankley, Alan
Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990 pp: 83-90
Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business
Abstract: Six tips for accountants on maintaining microcomputer security are
offered. Photograph; Table
Subjects: Personal computers; Computer crime; Accounting & accountants
Type: Feature
Length: Long (31+ col inches)

90062815
Title: Book Review: Computer Audit, Control, and Security
Authors: Iacono, Lisa M
Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990
pp: 150-151
Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business
Abstract: Lisa M. Iacono reviews “Computer Audit, Control, and Security,” by
Robert R. Moeller.
Subjects: Nonfiction; Accounting & accountants; Computers & computer
technology; Computer crime; Security systems
Names: Moeller, Robert R
Type: Book Review-Favorable
Length: Medium (10-30 col inches)

90062001
Title: The Risk of Computing
Authors: Reynolds, Chris
Journal: New Scientist Vol: 126 Iss: 1718 Date: May 26, 1990 pp: 64
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Chris Reynolds reviews “Viruses, Bugs and Star Wars,” by Geoff
Simons. Illustration
Subjects: Nonfiction; Computers & computer technology; Computer crime
Names: Simons, Geoff
Type: Book Review-Unfavorable
Length: Medium (10-30 col inches)

90061371
Title: Thanks for Wiping the Memory
Authors: Thimbleby, Harold
Journal: New Scientist Vol: 126 Iss: 1717 Date: May 19, 1990 pp: 69
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: It is nice to think the computer viruses have a bright side:
forcing programs, professional standards and hardware to improve.
If viruses were unable to corrupt programs, then anything or anyone
else would also find it harder.
Subjects: Computers & computer technology; Computer crime; Software
Type: Commentary
Length: Medium (10-30 col inches)

90047219
Title: Conversations
Authors: Ferrell, Keith
Journal: Compute! Vol: 12 Iss: 5 Date: May 1990 pp: 98
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: According to Buck BloomBecker, the director of the National Center
for Computer Crime Data, there is a potential for computer crime
everywhere computers are located. There is a variety of motivations
that underlie this type of crime. Photograph
Subjects: Computer crime; National Center for Computer Crime Data
Names: BloomBecker, Buck
Type: Commentary
Length: Medium (10-30 col inches)

90046190
Title: The Hacker Dragnet
Authors: Schwartz, John
Journal: Newsweek Vol: 115 Iss: 18 Date: Apr 30, 1990 pp: 50
Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News
Abstract: Federal authorities are in hot pursuit of computer criminals.
However, innocent victims may be being swept up in the hunt.
Illustration
Subjects: Computer crime; Crime & criminals; Law enforcement
Type: News
Length: Medium (10-30 col inches)

90045192
Title: Hackers ‘Plan Revenge’ for Police Clampdown on Computer Crime
Authors: Charles, Dan; O Neill, Graeme
Journal: New Scientist Vol: 126 Iss: 1713 Date: Apr 21, 1990 pp: 24
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Managers of computer networks in the US and Australia have sent out
warnings that “hackers” may try to take revenge for recent attempts
by police to crack down on computer crime.
Subjects: Computers & computer technology; Computer networks; Computer crime;
Crime & criminals
Type: News
Length: Medium (10-30 col inches)

90042567
Title: Busting Computer Viruses: Who Ya Gonna Call?
Authors: Anonymous
Journal: Economist Vol: 315 Iss: 7649 Date: Apr 7, 1990 pp: 78
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The onslaught of damage to computer systems by viruses and hackers
is expected to increase. Halting the problem will mean stricter
control on the use of PCs. Illustration
Subjects: Computers & computer technology; Personal computers; Computer crime
Type: News
Length: Medium (10-30 col inches)

90042105
Title: A 75 (Cent) Discrepancy Propels Astronomer Into a Maze of Computer
Networks and Onto a Best-Seller List
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 36 Iss: 29 Date: Apr 4, 1990
pp: A3
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Clifford Stoll’s investigation of a 75-cent discrepancy in some
computer accounts in 1986 led him to track a spy through a maze of
computer networks. Stoll catalogued the techniques the spy used in
his book “The Cuckoo’s Egg: Tracking a Spy Through the Maze of
Computer Espionage.” Photograph
Subjects: Computers & computer technology; Biographical profiles; Espionage;
Computer crime
Names: Stoll, Clifford
Type: News
Length: Medium (10-30 col inches)

90041088
Title: Computer Whiz Guilty
Authors: Burstyn, Harold L
Journal: ABA Journal Vol: 76 Date: Apr 1990 pp: 20
Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business
Abstract: In one of the first jury trials under the Computer Fraud and Abuse
Act, a federal jury convicted a graduate student named Robert T.
Morris of launching a rogue program called a worm that shut down
hundreds of computers across the US. He intended no malice and was
not sent to jail. Photograph
Subjects: Court rulings; Computers & computer technology; Criminal sentences;
Computer crime
Names: Morris, Robert T Jr
Type: News
Length: Medium (10-30 col inches)

90038941
Title: Books and Arts: Computer Hackers–The 75-Cent Solution
Authors: Anonymous
Journal: Economist Vol: 314 Iss: 7648 Date: Mar 31, 1990 pp: 84-85
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: “The Cuckoo’s Egg,” by Clifford Stoll, is reviewed.
Subjects: Computer crime; Nonfiction
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Short (1-9 col inches)

90037281
Title: Stranger than Fiction
Authors: Carver, Robert
Journal: New Statesman & Society Vol: 3 Iss: 91 Date: Mar 9, 1990 pp: 38
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
Abstract: Robert Carver reviews “The Cuckoo’s Egg,” by Clifford Stoll.
Photograph
Subjects: Nonfiction; Computer crime; Espionage; Investigations
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Medium (10-30 col inches)

90034139
Title: Hunt for the Hacker Spy
Authors: Elliott, Lawrence
Journal: Reader’s Digest Vol: 136 Iss: 816 Date: Apr 1990 pp: 185-232
Jrnl Code: GRDI ISSN: 0034-0375 Jrnl Group: Lifestyles
Abstract: The mystery began when Clifford Stoll, a systems manager at the
Lawrence Berkeley Laboratory in Berkeley CA, learned of an
unexplained seventy-five-cent charge for computer time. Concerned
that someone was invading the US military networks, Stoll began to
hunt down the hacker. Photograph; Illustration
Subjects: Espionage; Computer crime; Defense industry
Names: Stoll, Clifford
Type: Feature
Length: Long (31+ col inches)

90032796
Title: Hi-Tech Mall Crawl
Authors: Dibbell, Julian
Journal: Village Voice Vol: 35 Iss: 12 Date: Mar 20, 1990 pp: S12
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: Eric Corley, the publisher of a computer hacker’s magazine called
“2600,” discusses why he and others are lured to messing with the
government’s computer systems.
Subjects: Computer crime
Names: Corley, Eric
Type: Feature
Length: Medium (10-30 col inches)

90031482
Title: Tennessee Suspends 19 for Computer Tampering
Authors: Anonymous
Journal: Chronicle of Higher Education Vol: 36 Iss: 26 Date: Mar 14, 1990
pp: A2
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: The University of Tennessee has suspended 19 students for at least
one semester for gaining access to the computer program that
controls the dropping and adding of courses past the deadline. No
grades were changed.
Subjects: Computer crime; Colleges & universities; Students
Type: News
Length: Short (1-9 col inches)

90026028
Title: Computer Security: Gaining the CEO’s Support
Authors: Horton, Thomas R
Journal: Vital Speeches of the Day Vol: 56 Iss: 10 Date: Mar 1990
pp: 307-310
Jrnl Code: VSP ISSN: 0042-742X Jrnl Group: Commentary
Abstract: Chief executive officers have been lamentably disinterested in
computer security, occasionally to their misfortune. Communication
is the key to any new program, and computer security personnel must
make it easy for busy CEOs to comprehend their security needs and
options. Confusion among different departments makes implementing
security a challenge.
Subjects: Computer crime; Security systems; Chief executive officers
Type: Speech
Length: Long (31+ col inches)

90025552
Title: When a Virus Makes Your PC Sneeze
Authors: Wiener, Daniel P
Journal: U.S. News & World Report Vol: 108 Iss: 8 Date: Feb 26, 1990
pp: 62
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: Those who operate personal computers over telephone lines or trade
software with friends increase the risk of contracting a computer
virus. “Blocker” programs, available for PCs, can help one prevent
or track viruses. Illustration
Subjects: Personal computers; Software; Computer crime; Security systems
Type: Feature
Length: Medium (10-30 col inches)

90021932
Title: Is Computer Hacking a Crime?
Authors: Anonymous
Journal: Harper’s Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
Abstract: A round-table discussion on the ethics of computer hacking is
presented. The panelists include computer hackers, scientists,
activists and media members.
Subjects: Computer crime; Ethics; Social life & customs
Type: Feature
Length: Long (31+ col inches)

90020898
Title: Computers/Communications: Fraud Busters
Authors: Siler, Charles
Journal: Forbes Vol: 145 Iss: 4 Date: Feb 19, 1990 pp: 154-158
Jrnl Code: FBR ISSN: 0015-6914 Jrnl Group: Business
Abstract: More than 50 companies, from Texas Instruments to Spectrix Inc, are
developing tamper-proof computer networks to prevent investors from
being cheated on the futures exchanges. This new technology is
discussed. Photograph; Illustration
Subjects: Computers & computer technology; Company profiles; Computer crime
Companies: Texas Instruments Inc; Spectrix Inc
Type: Feature
Length: Long (31+ col inches)

90020575
Title: Morris Code
Authors: Hafner, Katie
Journal: New Republic Vol: 202 Iss: 8 Date: Feb 19, 1990 pp: 15-16
Jrnl Code: GTNR ISSN: 0028-6583 Jrnl Group: Commentary
Abstract: Robert Tappan Morris, the young man who infiltrated Internet, a
nationwide computer network, has recieved a stiff penalty from the
Justice Department. His crime was actually far less pernicious than
most others.
Subjects: Computer crime; Criminal sentences
Names: Morris, Robert T Jr
Type: Feature
Length: Long (31+ col inches)

90019137
Title: Scenes from Science: Hacking for Adventure
Authors: Cooper, William
Journal: Spectator Vol: 264 Iss: 8431 Date: Feb 10, 1990 pp: 10
Jrnl Code: GSPE ISSN: 0038-6952 Jrnl Group: Commentary
Abstract: The case of the US Justice Department versus Cornell graduate
student Robert Morris Jr will be a forum to evaluate the
effectiveness of the Computer Fraud and Abuse Act.
Subjects: Computer crime; Laws & legislation; Trials
Names: Morris, Robert Jr
Type: News
Length: Short (1-9 col inches)

90019041
Title: Hacked to Pieces
Authors: Jenkins, Jolyon
Journal: New Statesman & Society Vol: 3 Iss: 87 Date: Feb 9, 1990 pp: 27
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
Abstract: There is a good reason why people other than computer hackers and
high-tech fraudsters should worry about computer crime legislation:
Laws made in response to moral panic usually fail to catch real
criminals and end up restricting civil liberties for everyone.
Subjects: Computer crime; Laws & legislation; Civil rights
Type: Feature
Length: Medium (10-30 col inches)

90015840
Title: Around the Mall and Beyond
Authors: Park, Edwards
Journal: Smithsonian Vol: 20 Iss: 11 Date: Feb 1990 pp: 20-26
Jrnl Code: GSMI ISSN: 0037-7333 Jrnl Group: Socio/Environmental;
SciTech
Abstract: Astronomer-author-hacker Clifford Stoll is interviewed. Stoll is
the author of “The Cuckoo’s Egg,” a computer-age detective story.
Photograph
Subjects: Scientists; Computer crime; Biographical profiles
Names: Stoll, Clifford
Type: Interview
Length: Long (31+ col inches)

90015267
Title: Deterring Computer Crime
Authors: Rosenblatt, Kenneth
Journal: Technology Review Vol: 93 Iss: 2 Date: Feb 1990 pp: 34-40
Jrnl Code: TCR ISSN: 0040-1692 Jrnl Group: SciTech
Abstract: Computer-illiterate police cannot combat the growing incidence of
electronic theft and vandalism. What’s needed are special task
forces and penalties that fit the crime, such as taking away an
offender’s computer. Illustration
Subjects: Computers & computer technology; Computer crime; Law enforcement
Type: Feature
Length: Long (31+ col inches)

90008297
Title: Computer Hacking Goes on Trial
Authors: Allman, William F
Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990
pp: 25
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: The trial of Robert Morris, a graduate student who unleashed a
“worm” that caused computers around the US to grind to a halt on Nov
2, 1988, is discussed. Photograph; Illustration
Subjects: Trials; Computer crime
Names: Morris, Robert
Type: News
Length: Medium (10-30 col inches)

89127748
Title: Ethical Responsibility Key to Computer Security
Authors: Lynn, M Stuart
Journal: Educational Record Vol: 70 Iss: 2 Date: Spring 1989 pp: 36-39
Jrnl Code: GEDR ISSN: 0013-1873 Jrnl Group: Academic
Abstract: The recent Computer Worm incident raised the issue of ethical
standards relating to computer networks and information. The
pervasiveness of powerful computers makes ethical behavior morally
and practically necessary. Illustration; References
Subjects: Computer crime; Computers & computer technology; Ethics; Morality
Type: Feature
Length: Long (31+ col inches)

89121419
Title: Hackers: Is a Cure Worse Than the Disease?
Authors: Lewyn, Mark
Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Because of computer hacking, Pentagon officials would like to add
more layers of security to protect their networks. But this would
limit access to university and government scientists, who use the
information the most. Photograph
Subjects: Computer crime; Security systems; Computer networks
Names: Morris, Robert Jr
Type: Commentary
Length: Medium (10-30 col inches)

89106603
Title: Halting Hackers
Authors: Anonymous
Journal: Economist Vol: 313 Iss: 7626 Date: Oct 28, 1989 pp: 18
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: An editorial discusses the need for laws to protect against computer
crimes. Illustration
Subjects: Computer crime; Laws & legislation
Type: Editorial
Length: Short (1-9 col inches)

89104122
Title: If Your Computer Catches a Virus on Friday the 13th, Who You Gonna
Call? John McAfee
Authors: Anonymous
Journal: People Weekly Vol: 32 Iss: 16 Date: Oct 16, 1989 pp: 77
Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles
Abstract: John McAfee, computer virus exterminator “extraordinaire,” has
created a so-called disinfectant program that can determine whether
a virus has invaded computer. His program can wipe out the virus
and repair the damage. Photograph
Subjects: Computer crime; Computers & computer technology; Biographical
profiles
Names: McAfee, John
Type: Feature
Length: Medium (10-30 col inches)

89103846
Title: This Morning’s Computer Virus–Unlucky for Some
Authors: Anonymous
Journal: Economist Vol: 313 Iss: 7624 Date: Oct 14, 1989 pp: 100-102
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: A recent computer virus called Datacrime, which was designed to
damage databases on Friday, October 13th, has so far infected
thousands of computers in Europe.
Subjects: Computer crime; Software; Data bases
Type: Commentary
Length: Medium (10-30 col inches)

89101302
Title: Short-Circuiting Computer Crime
Authors: Bloombecker, J J
Journal: Datamation Vol: 35 Iss: 19 Date: Oct 1, 1989 pp: 71-72
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech
Abstract: Assessing what other IS managers are doing to safeguard computer
systems is probably the best source of ideas on how to shut down
computer crime, a $500 million a year industry. Graph
Subjects: Computer crime; Security systems; Computers & computer technology;
Industry profiles
Type: Feature
Length: Long (31+ col inches)

89101248
Title: Crimes of the Heart?
Authors: Crabb, Don
Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 144E-144H
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: The person who stole and disseminated the source code to some of
Apple’s Macintosh ROM deserves a punishment to fit the horrible
crime. As Apple moves into the first quarter of the 1990 fiscal
year, several products Macintosh users hope to see introduced are
discussed. Illustration
Subjects: Product development; Computer crime
Companies: Apple Computer Inc
Type: Commentary
Length: Long (31+ col inches)

89101228
Title: Goodbye, Mr. Chips
Authors: Wayner, Peter
Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 364
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: The computer revolution is threatened with the curse of success.
Once eveyone starts using some new machine, the temptation to make
everything right by regulation comes creeping in.
Subjects: Computers & computer technology; Computer crime; Government
regulation
Type: Commentary
Length: Medium (10-30 col inches)

89096642
Title: Brave New World
Authors: Dibbell, Julian
Journal: Village Voice Vol: 34 Iss: 39 Date: Sep 26, 1989 pp: S7, S10+
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: The software industry has picked up its legal attacks on pirates,
targeting corporate offenders in particular. The steps that the
industry are taking are discussed. Illustration
Subjects: Computers & computer technology; Computer crime
Type: Feature
Length: Long (31+ col inches)

89091613
Title: Coping with a PC Virus
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989
pp: 8PC-10PC
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: The Commercial Appeal, a Memphis TN newspaper, recently had an
encounter with a computer virus. The company was able to remedy the
problem quickly with an anti-viral program.
Subjects: Newspapers; Company profiles; Computers & computer technology;
Computer crime
Companies: Commercial Appeal
Type: Commentary
Length: Long (31+ col inches)

89091612
Title: Combatting PC Viruses
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989
pp: 11PC, 31PC
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: The House Telecommunication and Finance subcommittee will present
legislation that will include stiff penalties against those who
infect computer systems with a virus.
Subjects: Laws & legislation; Computers & computer technology; Viruses;
Computer crime
Type: Commentary
Length: Medium (10-30 col inches)

89089348
Title: Free the Hacker Two
Authors: Corley, Eric
Journal: Harper’s Vol: 279 Iss: 1672 Date: Sep 1989 pp: 22-26
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
Abstract: An editorial urges the release of computer “hackers” imprisoned for
computer crimes. Excerpted from the book “Hackers in Jail.”
Subjects: Computer crime
Type: Editorial
Length: Long (31+ col inches)

89083744
Title: Nonfiction: The Cuckoo’s Egg
Authors: Stuttaford, Genevieve
Journal: Publishers Weekly Vol: 236 Iss: 6 Date: Aug 11, 1989 pp: 448
Jrnl Code: GPUB ISSN: 0000-0019 Jrnl Group: Commentary; Business
Abstract: Genevieve Stuttaford reviews “The Cuckoo’s Egg: Tracking a Spy
through the Maze of Computer Espionage,” by Cliff Stoll.
Subjects: Nonfiction; Computer crime
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Short (1-9 col inches)

89078212
Title: Computer Viruses
Authors: Vasilyev, Dmitri; Novikov, Yevgeni
Journal: Soviet Life Iss: 7 Date: Jul 1989 pp: 37-39
Jrnl Code: GSOV ISSN: 0038-5549 Jrnl Group: Lifestyles;
Commentary
Abstract: The increased use of computers in the Soviet Union brings problems
familiar to Western users, especially computer viruses. Soviet
computer scientists Alfred Ailamazyan and Sergei Abramov are
interviewed about Soviet computer viruses and computer security.
Photograph
Subjects: Computer crime; Security systems; Union of Soviet Socialist
Republics–USSR
Names: Ailamazyan, Alfred; Abramov, Sergei
Type: Interview
Length: Long (31+ col inches)

89077225
Title: The Computer Contagion
Authors: Kenyon, David M
Journal: ABA Journal Vol: 75 Date: Jun 1989 pp: 116-117
Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business
Abstract: Computer viruses can spread from computer to computer, including
those in law firms. Strategies for protecting against computer
viruses are discussed, including establishing a policy of who may
use the firm’s computers and making paper backups of important
material. Illustration
Subjects: Computer crime; Legal professions
Type: Feature
Length: Long (31+ col inches)

89076390
Title: Viruses, Worms, Trojans, and Bombs
Authors: Stover, Dawn
Journal: Popular Science Vol: 235 Iss: 3 Date: Sep 1989 pp: 59-62+
Jrnl Code: GPOS ISSN: 0161-7370 Jrnl Group: SciTech
Abstract: Viruses, worms, trojans, and bombs are electronic infections that
make computers sick. They have actually crippled huge government
networks as well as PCs. Purported preventions, including “vaccine”
programs and protective hardware, are examined. Illustration
Subjects: Computer crime; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)

89074853
Title: Your Family Finances: “Credit Doctors” Can Hurt You
Authors: Plawin, Paul; Kainen, Bertha; Buttenheim, Alison
Journal: Changing Times Vol: 43 Iss: 8 Date: Aug 1989 pp: 78
Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Business;
Socio/Environmental
Abstract: People can steal data from a computerized file and sell the names
and information of people with good credit to people with the same
name whose credit is poor. Illustration
Subjects: Credit; Computer crime; Theft
Type: Commentary
Length: Short (1-9 col inches)

89070945
Title: A Secret No More
Authors: Kerr, Susan
Journal: Datamation Vol: 35 Iss: 13 Date: Jul 1, 1989 pp: 53-55
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech
Abstract: As distributed processing and applications such as electronic mail
grow, companies are concerned about data security, and they are
evaluating their vulnerability to electronic breaches. Data
encryption is one solution. Illustration
Subjects: Security systems; Computer crime
Type: Feature
Length: Long (31+ col inches)

89070893
Title: ‘Virus’ Attacks ANPA’s Computer
Authors: Fitzgerald, Mark
Journal: Editor & Publisher Vol: 122 Iss: 26 Date: Jul 1, 1989 pp: 34
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: A computer virus recently contaminated all of the software in the
American Newspaper Publishers Association’s desktop publishing
laboratory. Three virus cleaners were used to disinfect the
laboratory.
Subjects: Newspapers; Computers & computer technology; Computer crime;
American Newspaper Publishers Association
Type: News
Length: Medium (10-30 col inches)

89066677
Title: Software At-A-Glance: Virex
Authors: Gordon, Molly
Journal: Electronic Learning Vol: 8 Iss: 8 Date: Jun 1989 pp: 51
Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech
Abstract: Molly Gordon reviews Virex, a software package that detects and
repairs contamination by scores, nVir, and Peace viruses. The
package, for the Macintosh Plus/SE/II, is from HJC Software.
Subjects: Software; Computer crime Products: HJC Virex
Companies: HJC Software
Type: Product Review-Favorable
Length: Short (1-9 col inches)

89062041
Title: Colleges Seem Vulnerable to Legal Actions Arising from Computer
Viruses
Authors: Moore, Thomas H
Journal: Chronicle of Higher Education Vol: 35 Iss: 42 Date: Jun 28, 1989
pp: A1, A20
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A report issued by the American Council on Education and the United
Educators Insurance Risk Retention Group concludes that colleges and
universities are unusually vulnerable to lawsuits arising from
computer viruses and must take steps to reduce their liability. The
report is examined.
Subjects: Computer crime; Lawsuits; Colleges & universities; Liability
Type: Feature
Length: Medium (10-30 col inches)

89059272
Title: Let’s Get Reckless
Authors: Gaines, Donna
Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: The developing social importance of computer viruses is explored.
Computer hacking and computer viruses have penetrated the
consciousness of the mainstream media and are being countered by
federal legislation. Illustration
Subjects: Computer crime; Social conditions & trends
Type: Commentary
Length: Medium (10-30 col inches)

89053593
Title: The Missing Lists
Authors: Steacy, Anne
Journal: Maclean’s Vol: 102 Iss: 20 Date: May 15, 1989 pp: 58
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
Abstract: A series of break-ins at the offices of Toronto Canada-based
environmental groups involving computer lists and data banks have
raised suspicions that Canadian government organizations might be
looking for information to discredit the groups. Photograph
Subjects: Crime & criminals; Computer crime; Environment; Activism; Toronto
Ontario Canada
Type: Feature
Length: Medium (10-30 col inches)

89049351
Title: The Tampa Media-Espionage Case
Authors: Hoyt, Michael
Journal: Columbia Journalism Review Vol: 28 Iss: 1 Date: May 1989
pp: 27-31
Jrnl Code: GCJR ISSN: 0010-194X Jrnl Group: Academic
Abstract: Michael Shapiro, assistant news director at WTSP-TV in St.
Petersburg Fl and computer hacker, is accused of using his computer
modem at home to break into his competitor’s files. The case is
discussed. Photograph
Subjects: Computer crime; Television news; Competition; Journalism &
journalists
Names: Shapiro, Michael
Type: Feature
Length: Long (31+ col inches)

89046556
Title: Avoiding Virus Hysteria
Authors: Honan, Patrick
Journal: Personal Computing Vol: 13 Iss: 5 Date: May 1989 pp: 84-92
Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech
Abstract: Common-sense strategies and a few good tools can help keep a
company’s data and equipment safe from computer viruses, time bombs
or Trojan horses. Illustration; Photograph
Subjects: Computer crime; Computers & computer technology; Security systems
Type: Feature
Length: Long (31+ col inches)

89037736
Title: Student Acted Alone in Spreading Computer ‘Worm,’ Cornell Report
Says
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 30 Date: Apr 5, 1989
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A report from Cornell University says that Robert T. Morris Jr, a
graduate student at the university, acted alone in November 1988
when he released on a national research network a computer program
that slowed or halted as many as 6,000 computers in the US.
Subjects: Computer crime; Colleges & universities; Students; Cornell
University
Names: Morris, Robert T Jr
Type: Feature
Length: Medium (10-30 col inches)

89035435
Title: Computer Viruses: An Epidemic Real or Imagined?
Authors: Chaffin, Ellen
Journal: Electronic Learning Vol: 8 Iss: 6 Date: Apr 1989 pp: 36-37
Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech
Abstract: Computer viruses have become an unpleasant fact of life. Tips are
given to combat the problems a computer virus may cause. Much of
the damage done by the virus is caused by of carelessness.
Illustration
Subjects: Computer crime; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)

89031460
Title: German Computer Spy Ring Broken
Authors: Marshall, Eliot
Journal: Science Vol: 243 Iss: 4898 Date: Mar 24, 1989 pp: 1545
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic
Abstract: The arrest of three West German techno-vandals in March, 1989 ended
a two year investigation of security breaches of computers from a US
military base in Japan to a laboratory in California to several
German universities and research institutes.
Subjects: Computer crime; Espionage; Investigations; West Germany
Names: Hess, Markus
Type: General Information
Length: Medium (10-30 col inches)

89027847
Title: Art ATMs Easy Targets for Crooks?
Authors: Cole, Patrick; Levine, Jonathan B
Journal: Business Week Iss: 3094 Date: Mar 6, 1989 pp: 30
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Computer systems that monitor electronic transfers are becoming an
easy target for criminal operations. Several recent incidents are
described. Photograph
Subjects: Computer crime; Banks & banking; Automated teller machines–ATM;
Crime & criminals
Type: General Information
Length: Medium (10-30 col inches)

89026462
Title: Information (Mis)management
Authors: Thompson, Tom
Journal: Byte Vol: 14 Iss: 3 Date: Mar 1989 pp: MAC 2
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Computer viruses and worms can destroy data and infect computer
systems. Safeguards are necessary so that viruses do not imperil
the free exchange of information among programmers who fear
infection.
Subjects: Computers & computer technology; Computer crime; Sabotage
Type: Editorial
Length: Medium (10-30 col inches)

89025356
Title: The Global Village under Seige–We’ve Met the Enemy and He Is Us
Authors: Thornburg, David D
Journal: Compute! Vol: 11 Iss: 3 Date: Mar 1989 pp: 13
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: While personal workstations are good, interconnecting with a network
can provide advantages. Networking is now being challenged by fears
of computer viruses.
Subjects: Computer networks; Computers & computer technology; Computer crime
Type: Commentary
Length: Medium (10-30 col inches)

89018587
Title: The Virus Cure
Authors: McAfee
Journal: Datamation Vol: 35 Iss: 4 Date: Feb 15, 1989 pp: 29-40
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business
Abstract: Computer viruses are plaguing many of the large computer networks.
Over 300 major virus attacks happened in the first seven months of
1988. Advice on how to prevent viruses and recover when they occur
is given. Illustration
Subjects: Computer crime; Computer networks; Computers & computer technology;
Viruses
Type: Feature
Length: Long (31+ col inches)

89016758
Title: Student Linked to Computer ‘Virus’ Granted Immunity by U. S.
Attorney
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 22 Date: Feb 8, 1989
pp: A2
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Robert T. Morris, the Cornell University student believed to be the
creator of the computer “virus” that paralyzed a national research
network in 1988, has been granted limited immunity by the US
Attorney’s office in Syracuse New York.
Subjects: Computer crime
Names: Morris, Robert T
Type: News
Length: Short (1-9 col inches)

89014959
Title: Avoid It Like the Plague: Protecting Yourself from Computer Virus
Attacks
Authors: Esters, Stephanie D
Journal: Black Enterprise Vol: 19 Iss: 7 Date: Feb 1989 pp: 55-56
Jrnl Code: BEN ISSN: 0006-4165 Jrnl Group: Business;
Socio/Environmental
Abstract: Protecting computer systems against viruses has become a top
priority for government, academia and business. Computer crime is
responsible for $5 billion in losses annually. Several antiviral
programs are described.
Subjects: Computers & computer technology; Computer crime; Software
Type: General Information
Length: Long (31+ col inches)

89012668
Title: Blanket Security
Authors: Perdue, Lewis
Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 164-167
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
Abstract: Computer crime is a serious problem and PC users are fighting back
with extra-strength security precautions. Physical protection, data
encryption and passwords are a few ways to protect these computers.
Table; Illustration
Subjects: Computer crime; Personal computers; Security systems
Type: Feature
Length: Long (31+ col inches)

89012658
Title: Chicken Pox or Chicken Little?
Authors: Dolce, Mary A
Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 280
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
Abstract: The fear of computer viruses has been somewhat misleading. Software
saboteurs prefer to attack large companies rather than PC users in
general. Users can take some simple precautions against the threat
of destructive software.
Subjects: Software; Computer crime
Type: Commentary
Length: Medium (10-30 col inches)

89007662
Title: Computer Flu is After You
Authors: Boudette, Neal E.
Journal: Industry Week Vol: 238 Iss: 2 Date: Jan 16, 1989 pp: 39-40
Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business
Abstract: Companies shouldn’t think themselves immune to computer viruses.
Companies must reevaluate their computer security policies and
proceedures, and use consultants to fix problems before their
computer systems catch a virus. Illustration
Subjects: Computer crime; Business & industry; Security systems
Type: Feature
Length: Medium (10-30 col inches)

89006239
Title: Drop the Phone
Authors: Anonymous
Journal: Time Vol: 133 Iss: 2 Date: Jan 9, 1989 pp: 49
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Kevin Mitnick, who has a long record of computer crime, is currently
facing a possible 30 years in prison and a $750,000 fine for several
crimes covered by a new federal law that prohibits breaking into an
interstate computer network for criminal purposes. Mitnick commits
most of his crimes via the telephone. Photograph
Subjects: Computer crime; Crime & criminals; Computer networks; Telephones
Names: Mitnick, Kevin
Type: News
Length: Short (1-9 col inches)

89004747
Title: The Data Bandits
Authors: Adney, William M.; Kavanagh, Douglas E.
Journal: Byte Vol: 14 Iss: 1 Date: Jan 1989 pp: 267-270
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Possible security threats to a LAN are discussed, including viruses,
data theft and accidental data destruction. Tips on making a LAN
more secure are offered. Photograph
Subjects: Computer networks; Computer crime; Security systems
Type: Feature
Length: Long (31+ col inches)

89004699
Title: ComputerScan: Antiviral Shields
Authors: Branwyn, Gareth; Clabaugh, Gavin
Journal: Futurist Vol: 23 Iss: 1 Date: Jan 1989 pp: 38
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
SciTech
Abstract: Branwyn and Clabaugh review InterPath’s new anti-computer virus
shield C-4, short for Cylene-4.
Subjects: Software; Computer crime Products: InterPath C-4
Companies: InterPath Corp
Type: Product Review-Favorable
Length: Short (1-9 col inches)

89003483
Title: Disease of the Year: Illness of Glitch
Authors: Vogel, Shawna
Journal: Discover Vol: 10 Iss: 1 Date: Jan 1989 pp: 64-66
Jrnl Code: GDIS ISSN: 0274-7529 Jrnl Group: SciTech
Abstract: The most talked-about virus of 1988 infects computers, not
organisms. Computer viruses are programs that destroy other
programs and data by incessantly replicating themselves, similar to
a viral infection in the body. Illustration; Photograph
Subjects: Computer crime; Computer programming & languages; Viruses
Names: Morris, Robert Jr
Type: Feature
Length: Long (31+ col inches)

89000654
Title: Revenge of the Nerds
Authors: Martin, Nicholas
Journal: Washington Monthly Vol: 20 Iss: 12 Date: Jan 1989 pp: 21-24
Jrnl Code: GTWM ISSN: 0043-0633 Jrnl Group: Commentary
Abstract: The real problem with computer viruses, like the one recently
created by Robert T. Morris Jr, isn’t the brilliant programmers,
but the easy access to classified data and the dearth of security
measures. Illustration
Subjects: Computer crime; Computers & computer technology; Security systems;
Classified information
Names: Morris, Robert T Jr
Type: Commentary
Length: Long (31+ col inches)

88178609
Title: Greater Awareness of Security in Aftermath of Computer Worm
Authors: Shulman, Seth; Palca, Joseph
Journal: Nature Vol: 336 Iss: 6197 Date: Nov 24, 1988 pp: 301
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech
Abstract: The recent attack of an unauthorized computer program upon thousands
of computer systems around the US using the ARPANET, Milnet and NSF
Net computer networks and the ensuing debate over the need for
increased security are described. Illustration
Subjects: Computers & computer technology; Computer crime; Security systems
Type: Feature
Length: Medium (10-30 col inches)

88178491
Title: Networked Computers Hit by Intelligent ‘Virus’
Authors: Palca, Joseph; Shulman, Seth
Journal: Nature Vol: 336 Iss: 6195 Date: Nov 10, 1988 pp: 97
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech
Abstract: Thousands of people using the UNIX computer operating system were
infiltrated via electronic mail during Nov 1988. The virus, which
was created by Robert T. Morris, a graduate student in computer
science at Cornell University in Ithaca NY, is discussed.
Subjects: Computers & computer technology; Computer crime; Electronic mail
Names: Morris, Robert T Jr
Type: News
Length: Medium (10-30 col inches)

88174189
Title: Minding the Store: Part Two
Authors: Hirsch, Rudolph E
Journal: Public Relations Journal Vol: 44 Iss: 5 Date: May 1988 pp: 39
Jrnl Code: PRJ ISSN: 0033-3670 Jrnl Group: Business
Abstract: System unavailability due to human error or natural disasters is a
common computer-security problem. The best precaution against
system unavailability is duplexing, having two of a given component.
The process is described. (Part 2 of a series)
Subjects: Computers & computer technology; Software; Computer crime
Type: Feature
Length: Medium (10-30 col inches)

88165977
Title: The 25 Most Intriguing People: The Cyberpunk
Authors: Anonymous
Journal: People Weekly Vol: 30 Iss: 26 Date: Dec 26, 1988 pp: 50
Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles
Abstract: In the world of computer hackers, the “Cyberpunk” probes the
weaknesses in electronic security systems, breaking into computer
networks, altering data, and unleashing microchip mayhem.
Photograph
Subjects: Computer crime
Type: News
Length: Short (1-9 col inches)

88162631
Title: Another Infection
Authors: Anonymous
Journal: Time Vol: 132 Iss: 24 Date: Dec 12, 1988 pp: 33
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Only five weeks after the Defense Department’s Arpanet computer
network was infected by a computer virus, the Mitre Corp has warned
the Pentagon that the Milnet military information system has also
been violated.
Subjects: Computer crime; Computer networks; Department of Defense
Companies: Mitre Corp
Type: News
Length: Short (1-9 col inches)

88159822
Title: The Viral Age
Authors: Hodges, Parker
Journal: Datamation Vol: 34 Iss: 24 Date: Dec 1, 1988 pp: 96
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business
Abstract: An editorial reflects on the vulnerability of computer networks to
viruses. Throughout history, crimes have grown naturally from
technology and have become definitive of an era.
Subjects: Computers & computer technology; Computer crime
Type: Editorial
Length: Medium (10-30 col inches)

88158631
Title: Look Out Virus-Spreaders!
Authors: Aycock, Heidi E. H.
Journal: Compute! Vol: 10 Iss: 12 Date: Dec 1988 pp: 7
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: A proposed bill in the US House of Representatives provides criminal
penalties and allows civil suits aginst people who affect, or could
affect, interstate or foreign commerce by inserting viruses in
computer systems.
Subjects: Computer crime; Laws & legislation
Type: News
Length: Medium (10-30 col inches)

88157268
Title: An Ounce of Prevention
Authors: Borts, Andrew D.; Zatz, Martin J.
Journal: inCider Vol: 6 Iss: 12 Date: Dec 1988 pp: 60-61
Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech
Abstract: Guidelines are given for avoiding a computer virus. A user should
resist the temptation to download directly to the hard drive to
lessen the chance of a virus.
Subjects: Computer crime; Computers & computer technology
Type: General Information
Length: Short (1-9 col inches)

88152319
Title: Security Officials Ask Researchers Not to Make ‘Virus’ Copies
Available
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988
pp: A1, A12
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Officials at the National Computer Security Center, a division of
the National Security Agency, have asked researchers not to share
copies of the computer-network virus that attacked 6,000 scientific
and academic computers recently.
Subjects: Computer crime; National Computer Security Center
Type: Feature
Length: Long (31+ col inches)

88152249
Title: Overreaction to External Attacks on Computer Systems Could Be More
Harmful than the Viruses Themselves
Authors: King, Kenneth M.
Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988
pp: A36
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: The recent “virus” attack on computers linked to a major research
network may result in resistance to linking instututional computers
to networks, but these networks are important to scholars and
administrators. Illustration
Subjects: Computers & computer technology; Computer networks; Computer crime
Type: Commentary
Length: Long (31+ col inches)

88151032
Title: Computer Abuse: Chain Mail
Authors: Anonymous
Journal: Economist Vol: 309 Iss: 7577 Date: Nov 19, 1988 pp: 98-100
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
Abstract: Robert Morris used a “trap-door” in the Unix electronic mail program
to cause a chain reaction that brought thousands of computers to a
halt. Some lawyers feel that America’s computer crime statutes
need to be examined.
Subjects: Computer crime; Laws & legislation; Computer programming &
languages; United States–US
Names: Morris, Robert
Type: Feature
Length: Medium (10-30 col inches)

88150295
Title: Computer ‘Viruses’ Are Seen as Hard to Stop on Open Academic
Networks
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A13, A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: The computer “virus” that recently infected research networks has
college administrators worried about whether a recurrence can be
prevented. Photograph
Subjects: Computers & computer technology; Colleges & universities; Computer
crime
Type: Feature
Length: Medium (10-30 col inches)

88150291
Title: Computer Infections Can Often Hide in Software and Then Start to
Spread
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Software viruses are hidden in programs, transferred to computer
memories when the programs are run, and then transferred again to
other disks or programs used in the infected computer.
Subjects: Computers & computer technology; Computer crime
Type: General Information
Length: Medium (10-30 col inches)

88150290
Title: A Professor Seeks a Universal Antidote
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: John Robert Cordani believes scientists can find the “theoretical
underpinnings” of computer viruses, and thus develop a universal
antidote.
Subjects: Computer crime
Names: Cordani, John Robert
Type: General Information
Length: Short (1-9 col inches)

88150289
Title: Chances of Catching Viruses Are Slim if Precautions Are Taken,
Experts Say
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Computer experts at Cornell University say that computer viruses may
not be entirely avoidable, but the chances of catching them are slim
if users take precautions.
Subjects: Computers & computer technology; Computer crime
Type: General Information
Length: Short (1-9 col inches)

88149867
Title: Rapid Spread of Virus Confirms Fear about Danger to Computers
Authors: Nordwall, Bruce D.
Journal: Aviation Week & Space Technology Vol: 129 Iss: 20
Date: Nov 14, 1988 pp: 44
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: SciTech; Business
Abstract: The virus that infested several thousand computers in November 1988
confirms the growing concern about the security of computer
networks. The virus was reputedly spread by Cornell University
graduate student Robert T. Morris, Jr.
Subjects: Computer crime; Computers & computer technology; Security systems
Names: Morris, Robert T Jr
Type: News
Length: Medium (10-30 col inches)

88148517
Title: Worm Invades Computer Networks
Authors: Marshall, Eliot
Journal: Science Vol: 242 Iss: 4880 Date: Nov 11, 1988 pp: 855-856
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic
Abstract: Internet, the major computer network for researchers in the US and
overseas, was disrupted for two days last week due to the presence
of a computer virus. The virus and attempts by computer experts at
the University of California at Berkeley and the Massachusetts
Institute of Technology to cure it are examined.
Subjects: Computer crime; Computer networks; University of
California-Berkeley; Massachusetts Institute of Technology
Type: News
Length: Long (31+ col inches)

88144157
Title: The Assault on Data Security Is Getting a Lot of Attention
Authors: Manuel, Tom; Shandle, Jack; Naegele, Tobias
Journal: Electronics Vol: 61 Iss: 17 Date: Nov 1988 pp: 136-142
Jrnl Code: GELS ISSN: 0883-4989 Jrnl Group: SciTech
Abstract: There are two separate problems to be dealt with in safeguarding
data security: keeping outsiders off the system and preventing
disgruntled or criminally inclined employees from attacking it.
Restricting access is in some ways the hardest to accomplish.
Illustration; Photograph
Subjects: Computers & computer technology; Security systems; Computer crime;
Security personnel
Type: Feature
Length: Long (31+ col inches)

88131293
Title: Vengeance by ‘Virus’
Authors: Lord, Lew; Stanglin, Douglas; Galloway, Joseph L.; Rosenberg,
Robert; Satchell, Michael; et al.
Journal: U.S. News & World Report Vol: 105 Iss: 13 Date: Oct 3, 1988
pp: 10
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: Last week Donald Burleson, an insurance firm’s director of computer
security, became the first person ever convicted of destroying
crucial data by implanting codes in computer programs. Burleson’s
crime involved an early form of what are now known as “viruses.”
Subjects: Computers & computer technology; Crime & criminals; Computer crime
Names: Burleson, Donald
Type: News
Length: Short (1-9 col inches)

88127257
Title: Viruses and Trojans Strike–But Very Rarely
Authors: Getts, Judy
Journal: PC World Vol: 6 Iss: 10 Date: Oct 1988 pp: 72-74
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
Abstract: Much of the concern about computer viruses has been exaggerated.
Users who frequently download from bulletin boards or exchange
software via floppy disk are at higher risk. Steps users can take
to protect against viruses are outlined. Illustration
Subjects: Computer crime; Software
Type: General Information
Length: Medium (10-30 col inches)

88117361
Title: ‘Virus Attacks’
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988
pp: 19pc, 40pc+
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: A contagion of about 40 computer viruses has prompted a concern
about high-tech hygiene for newspaper PC systems managers,
technicians and engineers.
Subjects: Newspapers; Personal computers; Computer crime
Type: Feature
Length: Long (31+ col inches)

88117355
Title: Avoiding Virus Infection
Authors: Fitzgerald, Mark
Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988 pp: 41pc
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: Although the Long Island “Newsday” may seem to be vulnerable to
viruses because it operates the Newsday Electronic Bulletin Board,
there have been no problems so far.
Subjects: Newspapers; Computer crime
Companies: Newsday
Type: News
Length: Short (1-9 col inches)

88116399
Title: Tomorrow’s Thieves
Authors: Albanese, Jay S.
Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 24-28
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
SciTech
Abstract: The advent of computers have provided the latest opportunity
resource for criminal misuse. Fraud will likely become the most
prevalent form of theft in the computer age. Photograph; Table
Subjects: Theft; Computer crime; Law enforcement
Type: Feature
Length: Long (31+ col inches)

88116380
Title: Computer Viruses: The “AIDS” of the Information Age?
Authors: Halal, William E.
Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 60
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
SciTech
Abstract: One solution to the problems posed by computer viruses is simply to
be careful when using computers and use safe computing procedures.
Subjects: Computer crime
Type: Commentary
Length: Medium (10-30 col inches)

88115135
Title: On Your Computer: Where’s the Viral Epidemic?
Authors: Frailey, Fred W.; Goldwasser, Joan; Willenbrink, Kristin
Journal: Changing Times Vol: 42 Iss: 9 Date: Sep 1988 pp: 98-99
Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Socio/Environmental;
Business
Abstract: Computer viruses are most commonly a shareware program that has been
downloaded from a bulletin board or software that someone passed on.
Subjects: Computer crime; Computers & computer technology
Type: General Information
Length: Medium (10-30 col inches)

88110258
Title: The New Office: An RX for Healthy Software
Authors: McCandless, Holloway
Journal: Working Woman Vol: 13 Iss: 9 Date: Sep 1988 pp: 33
Jrnl Code: WKW ISSN: 0145-5761 Jrnl Group: Lifestyles; Business
Abstract: One way companies can protect their software from computer viruses
is by keeping their system as isolated as possible.
Subjects: Computer crime; Software; Business & industry
Type: General Information
Length: Medium (10-30 col inches)

88106102
Title: Sick Computers
Authors: Welter, Therese R.
Journal: Industry Week Vol: 237 Iss: 4 Date: Aug 15, 1988 pp: 51-55
Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business
Abstract: Computer viruses, a form of electronic sabotage, are occurring more
frequently nowadays. To help control them, a careful policy needs
to be established on the use of electronic bulletin boards and
public domain software. Illustration
Subjects: Computers & computer technology; Security systems; Computer crime
Type: Feature
Length: Medium (10-30 col inches)

88103547
Title: Ex-Employee Sentenced in Cheyney U. Grade Case
Authors: Anonymous
Journal: Chronicle of Higher Education Vol: 34 Iss: 47 Date: Aug 3, 1988
pp: A2
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Joseph J. Johnson, a former employee of Cheyney State University
has been sentenced to 3 to 23 months in prison for changing the
grades of students who paid him to do so.
Subjects: Students; Crime & criminals; Colleges & universities; Computer
crime; Cheyney University
Names: Johnson, Joseph J
Type: News
Length: Short (1-9 col inches)

88103071
Title: Is Your Computer Secure
Authors: Hafner, Katherine M.; Lewis, Geoff; Kelly, Kevin; Shao, Maria;
Hawkins, Chick; Angiolillo, Paul
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 64-72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: America’s information systems are alarmingly vulnerable to high-tech
bandits, hackers, disgruntled workers and natural disasters.
Moreover, as PCs proliferate, the problem can only grow worse.
Computer crime is examined. Photograph; Illustration; Graph
Subjects: Computers & computer technology; Computer crime; High tech
industries
Type: Feature
Length: Long (31+ col inches)

88103070
Title: How Uncle Sam’s Cloak-And-Data Boys Are Fighting Back
Authors: Port, Otis
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Penetration of government computers–particularly military
systems–is a deadly serious matter for the National Security Agency
and for counterintelligence agents at the FBI. Photograph
Subjects: Computer crime; National security; Classified information; National
Security Agency
Type: General Information
Length: Medium (10-30 col inches)

88103057
Title: A German Hackers’ Club that Promotes Creative Chaos
Authors: Schares, Gail
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 71
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Hackers with the Hamburg, West Germany-based Chaos Computer Club use
their computing skills to increase public access to information
instead of sabotaging databases. Members believe that access to
electronic information cost too much in Germany. Photograph
Subjects: Computers & computer technology; Computer crime; Chaos Computer Club
Names: Fix, Bernd
Type: General Information
Length: Medium (10-30 col inches)

88103041
Title: Editorials: Treat Computer Data Like the Crown Jewels
Authors: Anonymous
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 108
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: An editorial states that as the complex networks of computers built
by business and government assume more and more tasks, they produce
a whole new set of risks: computer viruses.
Subjects: Computers & computer technology; Computer crime
Type: Editorial
Length: Medium (10-30 col inches)

88101861
Title: Editorial License
Authors: Keizer, Gregg
Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 4
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: An editorial discusses the transmission and prevention of computer
viruses.
Subjects: Computers & computer technology; Computer crime
Type: Editorial
Length: Medium (10-30 col inches)

88101823
Title: Compute Specific–Off the Mac Wire
Authors: Aker, Sharon Zardetto
Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 49
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: A computer virus has been showing up on Macintosh systems that
destroys files and can randomly erase data. The outbreaks have
centered around Dallas and Washington DC.
Subjects: Computer crime; Computers & computer technology; Personal computers
Type: News
Length: Short (1-9 col inches)

88092802
Title: Keeping Out of the Kaos Club
Authors: Anonymous
Journal: Economist Vol: 308 Iss: 7558 Date: Jul 9, 1988 pp: 78-79
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
Abstract: In response to ever-increasing occurrences of fraudsters, hackers
and viruses violating computer networks, the computer industry is
strengthening security measures for computer operating systems.
Photograph
Subjects: Computers & computer technology; Security systems; Computer crime
Type: Feature
Length: Long (31+ col inches)

88089057
Title: Impact
Authors: Thornburg, David D.
Journal: Compute! Vol: 10 Iss: 7 Date: Jul 1988 pp: 10
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: Viruses, small programs embedded inside other programs, have the
ability to replicate themselves and infect almost any program on a
disk, including parts of an operating system. Viruses are, at best,
nuisances and, at worst, they can damage computers.
Subjects: Computers & computer technology; Computer crime; Computer
programming & languages
Type: Commentary
Length: Medium (10-30 col inches)

88084661
Title: Beware: It’s Virus Season
Authors: Honan, Patrick
Journal: Personal Computing Vol: 12 Iss: 7 Date: Jul 1988 pp: 36
Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech
Abstract: An anonymous company is working with Panda Systems to eliminate the
software virus, dubbed the Sunnyvale Slug, which Panda Systems has
removed from all but one of the company’s computers. Photograph
Subjects: Computer crime; Computers & computer technology
Companies: Panda Systems
Type: News
Length: Short (1-9 col inches)

88075577
Title: Compute! Specific: Mac–Virus and Vaccine
Authors: Aker, Sharon Zardetto
Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 44
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: A computer virus is a little program that’s usually buried in
another program; when the “host” program is run, your computer
system catches the virus. A specific Macintosh virus has surfaced,
but a cure has been found.
Subjects: Computer programming & languages; Computer crime
Type: News
Length: Short (1-9 col inches)

88075550
Title: News & Notes: New PC Virus Innoculation
Authors: Karnes, Clifton
Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 81
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: Lasertrieve has announced a revolutionary new service and product
package called VirALARM. It is designed to protect a PC from
viruses by detecting infestation and alerting the user to their
existence early. Illustration
Subjects: Computers & computer technology; Computer crime
Companies: Lasertrieve
Type: News
Length: Medium (10-30 col inches)

88071494
Title: The Cost of Computer Crime
Authors: San Segundo, Gonzalo
Journal: World Press Review Vol: 35 Iss: 6 Date: Jun 1988 pp: 47
Jrnl Code: GWPR ISSN: 0195-8895 Jrnl Group: News
Abstract: The average net from a computer crime is about $220,000, while the
conventional bank robbery will bring in about $6,600. Only one in
100 cases of computer crimes is punished by law.
Subjects: Computer crime; White collar crime; Crime & criminals
Type: Commentary
Length: Medium (10-30 col inches)

88070487
Title: “The Chairman” and His Board
Authors: Bock, Gordon; McWhirter, William
Journal: Time Vol: 131 Iss: 22 Date: May 30, 1988 pp: 45
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Gabriel Taylor, a clerk at the First National Bank of Chicago,
electronically transferred funds to accounts under assumed names in
Vienna. If the scheme had succeeded, the conspirators would have
gotten $68.7 million. Photograph
Subjects: Computer crime; Crime & criminals; Embezzlement
Names: Taylor, Gabriel
Companies: First National Bank of Chicago
Type: Feature
Length: Medium (10-30 col inches)

88068234
Title: Computer ‘Virus’ Hits First U.S. Newspaper
Authors: Fitzgerald, Mark
Journal: Editor & Publisher Vol: 121 Iss: 21 Date: May 21, 1988 pp: 22
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: A computer virus has invaded the “Providence Journal-Bulletin,”
making it the first newspaper to succumb to the unauthorized codes
which secretly penetrate systems and wreak havoc.
Subjects: Newspapers; Computer crime
Companies: Providence Journal-Bulletin
Type: General Information
Length: Medium (10-30 col inches)

88067609
Title: Scientists Track Hacker to Find Flaws in Systems
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 34 Iss: 36 Date: May 18, 1988
pp: A16
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Scientists at the Lawrence Berkeley Laboratory tracked a West German
computer hacker electronically for almost a year as he tried to
enter 450 computers, and invaded 30, throughout the US.
Subjects: Computer crime; West Germany; Lawrence Berkeley Laboratory
Type: News
Length: Short (1-9 col inches)

88060581
Title: Compute! Specific: PC Virus
Authors: Karnes, Clifton
Journal: Compute! Vol: 10 Iss: 5 Date: May 1988 pp: 39
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: Computer viruses insinuate themselves into an operating system, and
after a certain interval, do “something.” So far, no viruses have
appeared on the IBM forums of CompuServe.
Subjects: Computers & computer technology; Software; Computer crime
Companies: IBM Corp
Type: News
Length: Short (1-9 col inches)

88053577
Title: When Bytes Bite Back
Authors: Anonymous
Journal: Economist Vol: 307 Iss: 7547 Date: Apr 23, 1988 pp: 68
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
Abstract: Costly problems in commercial computer systems are caused by
fraudsters, hackers, disgruntled employees, accidents and human
errors. Few companies have adequate network security. Illustration
Subjects: Computer crime; Computers & computer technology
Type: Feature
Length: Short (1-9 col inches)

88030286
Title: Spawning a Computer “Virus”
Authors: White, Ron
Journal: 80 Micro Iss: 98 Date: Mar 1988 pp: 16-18
Jrnl Code: GEIM ISSN: 0744-7868 Jrnl Group: SciTech
Abstract: “Core wars” are battles between rival programs for control of a
theoretical computer’s operating system. The game is designed for
programmers to test their abilities against one another, but the
principles behind these programs are similar to those in computer
“viruses.” Photograph
Subjects: Computer programming & languages; Games; Computer crime
Type: General Information
Length: Long (31+ col inches)

88023137
Title: Companies Say Unauthorized Modifications of Systems to Permit Remote
Entry Could Jeopardize Vendor Support
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 121 Iss: 8 Date: Feb 20, 1988 pp: 35, 37
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: Unauthorized entry into remote classified advertising through
newspapers’ computers may jeopardize vendor support for the
advertising.
Subjects: Fraud; Computers & computer technology; Computer crime; Newspapers
Type: Feature
Length: Long (31+ col inches)

88016993
Title: The Online Underworld
Authors: Scrogan, Len
Journal: Classroom Computer Learning Vol: 8 Iss: 5 Date: Feb 1988
pp: 58-60
Jrnl Code: GCCL ISSN: 0746-4223 Jrnl Group: SciTech
Abstract: Every educator who introduces kids to telecommunications should also
be aware of the illegal activities which might occur. Teachers need
to communicate the ethics of online behavior to students.
Subjects: Education & schools; Computer crime; Computer programming &
languages; Ethics
Type: Feature
Length: Long (31+ col inches)

88013032
Title: Fighting Computer Crime
Authors: Szabo, Joan C.
Journal: Nation’s Business Vol: 76 Iss: 2 Date: Feb 1988 pp: 14
Jrnl Code: NAB ISSN: 0028-047X Jrnl Group: Business
Abstract: A new booklet from the SBA, “A Small Business Guide to Computer
Security,” gives guidelines on how small business can protect their
computer operations.
Subjects: Computer crime; Small business; Small Business Administration–SBA
Type: Commentary
Length: Short (1-9 col inches)

88011465
Title: Crime in the Computer Age
Authors: Wood, Chris
Journal: Maclean’s Vol: 101 Iss: 5 Date: Jan 25, 1988 pp: 28-30
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
Abstract: A discussion of computer crimes. Photograph
Subjects: Crime & criminals; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)

88010266
Title: Israeli University Offers Cure for Mysterious Computer ‘Virus’
Authors: Watzman, Herbert M.
Journal: Chronicle of Higher Education Vol: 34 Iss: 19 Date: Jan 20, 1988
pp: A41
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A electronic ‘virus’ programmed to damage and destroy software has
been spreading across Israel. Israeli University is handing out a
cure for the ‘virus’ to those who need it.
Subjects: Computer crime; Israel; Israeli University
Type: News
Length: Medium (10-30 col inches)

DOMAIN NAMES TRANSITION

This memo is intended to remind all host personnel that at 0800 EST on
March 21, 1984 every host on the MILNET/ARPANET will acquire a new
official host name in accordance with RFC 897, the “Domain Name System
Implementation Schedule”. Briefly, all existing official names will
become nicknames, and the new official name will be formed by adding
the domain name “.ARPA” to the old official name. Special attention
should be paid to the possible problems that your site software may
encounter with the new names.

For example, the old entry for USC-ISIF is:

HOST : 10.2.0.52 : USC-ISIF,ISIF : DEC-1090T : TOPS20 :
TCP/TELNET,TCP/SMTP,TCP/FTP,TCP/FINGER,UDP/TFTP :

The new entry will be:

HOST : 10.2.0.52 : USC-ISIF.ARPA,USC-ISIF,ISIF : DEC-1090T : TOPS20
: TCP/TELNET,TCP/SMTP,TCP/FTP,TCP/FINGER,UDP/TFTP :

For some hosts and programs this will cause no disruptions, but for
others some problems may arise. For example, with over five hundred
entries in the table, the addition of 500 names could exceed the space
allocated to store the table in some programs. Another possible
problem is that period (or dot, “.”) is not now a legal character in
host names, and some programs may not be able to parse these new
names.

An experimental domain-style name table has been available in parallel
with the regular table for several months on the SRI-NIC machine, as
<NETINFO>DHOSTS.TXT. No new domains are being introduced during the
changeover. There will be only one top-level domain to begin with,
and that is “.ARPA”. Other top-level domain names such as “.DDN”,
will be announced at a later date. The revised table simply appends a
domain name to each of the official host names included in the ARPA
domain. Thus, programs can be constructed to deal with domain style
names in a general way, without requiring any special programming to
add or delete the string “.ARPA” to or from host names.

The introduction of new domains is tied to the provision of domain
servers by those domains. As new domains meet the requirements and
are authorized, the domain names will also be included in the NIC host
table.

Eventually, the Internet will become too complex and will change too
rapidly to keep a master table of all the hosts. The future plan is
to simplify the master table by reducing it to entries for the domain
names only. By the time this happens, all normal translation of host
names into addresses across domains should take place by consulting
the appropriate domain servers.

DDN subscribers (including MILNET subscribers) are not required to
implement Domain Name servers or protocols until a DDN Domain Names
schedule is published, which will not be prior to Oct 1984. MILNET
subscribers who choose to participate in the DARPA Internet on a
voluntary basis are free to do so, and may implement Domain Names
according to the Internet Schedule. The NIC will continue to maintain
a complete host table of DDN subscribers until the (as yet
unscheduled) complete transition of DDN subscribers to the Domain
Names approach takes place.

Please see RFC 881 [2] and RFC 897 [3] for further discussion of the
Internet schedule, and RFC 882 [4] and RFC 883 [5] for information on
the design and implementation of the domain style name service.

References:

[1] Harrenstien, K., V. White, and E. Feinler, “Hostnames Server”
RFC 811, Network Information Center, SRI International, March
1982.

[2] Postel, J., “The Domain Names Plan and Schedule”, RFC 881, USC
Information Sciences Institute, November 1983.

[3] Postel, J., “Domain Name System Implementation Schedule”, RFC 897,
USC Information Sciences Institute, February 1984.

[4] Mockapetris, P., “Domain Names – Concepts and Facilities”,
RFC 882, USC Information Sciences Institute, November 1983.

[5] Mockapetris, P., “Domain Names – Implementation and
Specification”, RFC 883, USC Information Sciences Institute,
November 1983.

Top 23 things learned at DEF CON 1 – By The White Ninja

Top 23(!) things learned at DEF CON 1
By The White Ninja

“Jesus Hacks! Why don’t YOU?”

This text file idea blatantly leeched from:
SummerCon!

1. Casino offices can be full of fun!!

2. Casinos generally don’t appreciate it when you explore their offices….

3. Yes, some people ARE capable of gambling away $167 in an hour!

4. You can get resonable conference discounts on prostitution in Nevada.

5. One can survive for 3 days in Vegas on $12 and a gift certificate.

6. Viruses are our friends.

7. Give a Casino security guard a walki-talki and he’ll swear he’s the center
of the universe.

8. Don’t commit a felony in front of Gail Thackery.

9. The people who work at the Death Star throw the darndest things in the
trash!

10. Pirates and Theives ONLY!

11. If you harass a hotel telephone operator long enough she WILL send
security.

12. When using ITT ask for BOB…

13. Metal plates screwed to your hotel room ceiling generally constitute a
bad sign.

14. Don’t forget to Hack the BED!

15. You know your in deep shit when THEY aim an IR-Mic at your window.

16. Setting 11 fires in selected parts of the city is probably a bad idea.

17. The guy who looks most like a fed probably writes for LOOMPANICS.

18. The guy who looks least like a fed probably does security for SUN.

19. As a general rule, don’t hack the hotel PBX unless your giving them a
better credit rating.

20. If your wondering where all those C-64 warez kidz went, try talking to
some of the beggars in Vegas.

21. Those COCOTS were gold plated for a REASON!

22. If you plan to stay the night in a hotel, make sure you get a room there.

23. “0K, <00L |>00|>eZ!
Ba|> LeGaL A|>\/I.C.E.:
‘\/\/HaT T0 |>0 \/\/HeN THe PiGZ <0Me!’
G00|> LeGaL A|>\/I.C.E.:
‘\/\/HaT N0T T0 |>0 S0 THe PiGZ \/\/0N’T <0Me!'”
GAiL tHACKery