Computer Underground Digest--Sat, Oct 12, 1991 (Vol #3.36)

       Moderators: Jim Thomas and Gordon Meyer (TK0JUT2@NIU.BITNET)

CONTENTS, #3.36 ( October 12, 1991)
Subject: File 1-- Intro to Biblio and ResourcesModerators' Corner
Subject: File 2-- General CU-Related Bibliography
Subject: File 3-- Dissertations and Theses
Subject: File 4-- General On-Line and Print Resources
Subject: File 5-- Misc. Books for Fun Reading

Issues of CuD can be found in the Usenet alt.society.cu-digest news
group, on CompuServe in DL0 and DL4 of the IBMBBS SIG, DL1 of LAWSIG,
and DL0 and DL12 of TELECOM, on Genie, on the PC-EXEC BBS at (414)
789-4210, and by anonymous ftp from ftp.cs.widener.edu (147.31.254.20),
chsun1.spc.uchicago.edu, and dagon.acc.stolaf.edu.  To use the U. of
Chicago email server, send mail with the subject "help" (without the
quotes) to archive-server@chsun1.spc.uchicago.edu.

COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.  CuD material may  be reprinted as long as the source
is cited.  Some authors do copyright their material, and they should
be contacted for reprint permission.  It is assumed that non-personal
mail to the moderators may be reprinted unless otherwise specified.
Readers are encouraged to submit reasoned articles relating to the
Computer Underground.  Articles are preferred to short responses.
Please avoid quoting previous posts unless absolutely necessary.

DISCLAIMER: The views represented herein do not necessarily represent
            the views of the moderators. Digest contributors assume all
            responsibility for ensuring that articles submitted do not
            violate copyright protections.

----------------------------------------------------------------------

Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: Intro to Biblio and ResourcesModerators' Corner

We continually receive requests for information about studies, 'zines
and people doing research on cyber issues.  The number of works
appearing in the past two years has dramatically increased. Below is a
select bibliography of some of the oft-cited works. We tried to be
representative rather than inclusive, and selected articles, stories,
or publications that include references to other works or that are
considered classics and must be read to understand the CU. Some
readers may questions the selection or why we excluded particular
items in favor of others. If any glaring omissions occur, send over
your choices and we will add a supplement in a few weeks.

------------------------------

Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: General CU-Related Bibliography

The following list is not intended to be exhaustive, but reflects some
of the basic resource literature relevant to the Computer Underground
and related culture. Journalists specializing in media coverage of the
topic include Joe Abernathy of the Houston Chronicle, John Markoff of
the New York Times, and John Schnieder of Newsweek, and Adam Gaffin,
of the Middlesex News (Framingham, Mass). All are accessible on
internet.  Susan Ross (sross@clutx.clarkson.edu) is currently
comparing Canadian and U.S. civil rights laws as they pertain to
cyberspace.

Allman, William F. 1990. "Computer Hacking goes on Trial." U.S. News
and World Report, January 22: 25.

Barlow, John Perry. 1990 (Forthcoming). "Crime and Puzzlement." Whole
Earth Review.

Bequai, August. 1978. Computer Crime. Lexington (Mass.): Lexington.

Bequai, August. 1987. Technocrimes. Lexington (Mass.): Lexington.

Bloombecker, Jay. 1988. Interview, Hour Magazine. NBC television,
November 23.

Brunner, John. 1989. The Shockwave Rider. New York: Ballantine.

Camper, John. 1989. "Woman Indicted as Computer Hacker Mastermind."
Chicago Tribune, June 21: II-4.

Charles Ess. 1987. "Computers and Ideology: Limits of the Machine."
Quarterly Journal of Ideology. 11(2): 33-39.

"Civil Liberties Hacked to Pieces: Jolyon Jenkins Refuses to Panic
over Computer Crime." New Statesman & Society, February 9: 27.

"Computer Expert's Son Cited as Virus Creator.' 1988. Chicago Tribune,
November 5: 1, 2.

"Computer Hacker Ring with a Bay Area Link." 1990. San Francisco
Chronicle, May 9: A-30.

"Computer Saboteur gets Probation." 1988. Chicago Tribune, Oct. 22: 4.

Conly, Catherine H. and J. Thomas McEwen. 1990. "Computer Crime." NIJ
Reports, 218(January/February): 2-7.

Conly, Catherine H. 1989. Organizing for Computer Crime Investigation
and Prosecution.

Cooley, Ronald B. 1984. "RICO: Modern Weaponry against Software
Pirates." Computer Law-Journal, 5(Fall): 143-162.

Denning, Dorothy E. 1990. "Concerning Hackers Who Break into
Computers Systems." Paper present at the National Computer Security
Conference, Washington, D.C., Oct. 1-4.

Edwards, Lynda. "Samurai Hackers." Rolling Stone, Sept. 19, 1991:
67-69.

Geertz, Clifford. 1973. The Interpretion of Cultures. New York: Basic
Books. 1973.

Gibson, William. 1984. Neuromancer. New York: Ace.

"Hacker, 18, Gets Prison for Fraud." 1989.  Chicago Tribune, February
15: III-1.

Haffner, Katie and John Markoff.  1991.  Cyberpunk:  Outlaws and
Hackers on the Computer Frontier.  New York:  Simon and Schuster.

Harper's Forum. 1990. "Is Computer Hacking a Crime? A Debate from the
Electronic Underground." Harper's, 280(March): 45-57.

Hollinger, Richard C. and Lonn Lanza-Kaduce. 1988. "The Process of
Criminalization: The Case of Computer Crime Laws." Criminology,
26(February): 101-126.

Hollnger, Richard C. 1990. "Hackers: Computer Heroes or Electronic
Highwaymen?" Paper presented at the American Society of Criminology
annual meetings, Baltimore, Nov. 7.

Jensen, Eric C. 198?. "An Electronic Soapbox: Computer Bulletin
Boards and the First Amendment." Federal Communications Law Journal,
39(3): 217-258.

Kane, Pamela. 1989. V.I.R.U.S. Protection: Vital Information
Resources under Siege. New York: Bantam.

Kling, Rob, and Suzanne Iocono. 1988. "The Mobilization of Support
for Computerization: The Role of Computerization Movements." Social
Problems, 35(June): 226-243.

Landreth, Bill. 1985. Out of the Inner Circle: A Hacker's Guide to
Computer Security. Belleview (Wash.): Microsoft Press.

Langworthy, Robert H. 1989. "Do Stings Control Crime? An Evaluation
of a Police Fencing Operation." Justice Quarterly, 6(March): 27-45.

Levy, Steven. 1984. Hackers: Heroes of the Computer Revolution.
Garden City: Doubleday.

Levy, Steven. 1990. Cloak and Dagger.

Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."
New York Times, April 4, A1, A11.

Markoff, John. 1990a. "3 Arrests Show Global Threat to Computers."
New York Times, April 4, A1, A11.

Markoff, John. 1990b. "Drive to Counter Computer Crime Aims at
Invaders." The New York Times, June 3: 1, 21.

Marx, Gary T. 1988a. Undercover: Police Surveillance in America.
Berkeley: University of California Press.

Marx, Gary T. 1988b. "The Maximum Security Society." Deviance et
Societe, 12(2): 147-166.

Marx, Gary T., and Nancy Reichman. 1985. "Routinizing the Discovery
of Secrets: Computers as Informants." Software Law Journal, 1(Fall):
95-121.

McEwen, J. Thomas. 1989. Dedicated Computer Crime Units. Washington
D.C.: National Institute of Justice.

Meyer, Gordon R. "Hackers, Phreakers, and Pirates: The Semantics of
the Computer Age." 1989. Pp. 74-82 in P. Kane, V.I.R.U.S. Protection:
Vital Information Resources under Siege. New York: Bantam.

Meyer, Gordon R. and Jim Thomas. 1989. "Role Differentiation in the
computer underground." Paper presented at the Society for the Study of
Social Problems annual meetings, Berkeley, August.

Meyer, Gordon R. 1989a. The Social Organization of the computer
underground. Unpublished Masters Thesis, Northern Illinois University.

Michalowski, Raymond J. and Erdwin H. Pfuhl. 1990 (forthcoming).
"Technology, Property, and Law: The Case of Computer Crime."
Contemporary Crisis.

Pope, Kyle, 1990. "U.S. Computer Investigation Targets Austinites."
Austin-American Statesman, March 17, Pp A-1, A-12.

Parker, Donn B. 1983. Fighting Computer Crime. New York: Charles
Scribner's Sons.

Pfuhl, Erdwin H. 1987. "Computer Abuse: Problems of Instrumental
Control." Deviant Behavior, 8(2): 113-130.

Rosenbaum, Ron. 1971. "Secrets of the Little Blue Box." Esquire,
76(October): 116-1125, 222-226.

Rosenblatt, Kenneth. 1990. "Deterring Computer Crime." Technology
Review, 93(FebruaryMarch): 34-40.

Sandza, Richard.  1984. "Revenge of the Hackers." Newsweek,
104(December 10): 25.

Sandza, Richard. 1984. "The Night of the Hackers." Newsweek,
104(November 12): 17-18.

Schwartz, Eddie. 1988. "Special on 'Computer Hacking.'" WGN Radio,
Sept 27.

Schwartz, John. 1990. "The Hacker Dragnet: The Feds Put a Tail on
Computer Crooks--and Sideswipe a few Innocent Bystanders." Newsweek,
April 30: 50.

Scientific American. 1991. Special Issue: How to Work, Play and
Thrive in Cyberspace. September.

Sterling, Bruce. 1988. Islands in the Net. New York: Ace Books.

Sterling, Bruce.  Forthcoming. The Hacker Crackdown: The True Story of
the Digital Dragnet of 1990 and the Start of the Electronic Frontier
Foundation.

Stoll, Clifford. 1989. The Cuckoo's Egg: Tracking a Spy through the
Maze of Computer Espionage. New York: Doubleday.

Thomas, Jim and Gordon R. Meyer. 1990. "(Witch)Hunting for the
Computer Underground: Joe McCarthy in a Leisure Suit." The Critical
Criminologist, 2(September): 7-8, 19-20.

Thomas, Jim, and Gordon R. Meyer. 1990a (forthcoming). "The Baudy
World of the Byte Bandit: A Postmodernist Interpretation of the
Computer Underground." In F. Schmalleger (ed.), Computers in Criminal
Justice. Bristol (Ind.): Wyndham Hall.

Thomas, Jim, and Gordon R. Meyer. 1990b. "In Defense of the Computer
Underground: The End of the Frontier?" Paper presented to the American
Society of Criminology annual conference, Baltimore (November).

Tompkins, Joseph B., Jr., and Linda A. Mar. 1986. "The 1984 Federal
Computer Crime Statute: A Partial Answer to a Pervasive Problem."
Computer-Law Journal, 6(Winter): 459-481.

Van, John. 1989. "Oddballs no More, Hackers are now a Threat."
Chicago Tribune, March 5, IV: 4.

Winter, Christine. 1988. "Virus Infects Huge Computer Network."
Chicago Tribune, November 4, 1, 18.

"Yes, You Sound very Sexy, but I Really Need a Probation Officer."
1989. Chicago Tribune, June 13, 10.

Zablit, Jocelyne. 1989. "Fraud Sweep Nabs 2 Michigan Teens in
Computer Ring." Detroit Free Press, 25 May: 1, 18.

------------------------------

Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: Dissertations and Theses

The following come from International Dissertation Abstracts and from
persons who responded to our request for information on theses. The
dissertation list should be fairly complete. It excludes works limited
to computer crime or computer-mediated communication (contact Bitnet's
CMC newsgroup for information on CMC). The thesis list is incomplete
because of the relatively low number of institutions responding. But,
judging from bibliographies and discussions, there seem to be
relatively few CU-related theses. ("Dissertations" are normally done
for a PhD, and "theses" are written for a Master's degree).

                 ++++++++++++++++++++++++
                      DISSERTATIONS
                 ++++++++++++++++++++++++

Friedman, Batya. 1988. SOCIAL JUDGMENTS AND TECHNOLOGICAL INNOVATION:
ADOLESCENT'S CONCEPTIONS OF COMPUTER PIRACY AND PRIVACY. (Director:
none listed). University of California, Berkeley. 186 pp. Order No.
DA 8916665.

Dunn, Thurman Stanley. 1982. METHODOLOGY FOR THE OPTIMIZATION OF
RESOURCES IN THE DETECTION OF COMPUTER FRAUD. (Directory: Jay F.
Nunamaker). The University of Arizona. 198 pp. Order No. DA 8305976.

Baker, Donald R. 1990. RELATIONSHIP SOF INTERNAL ACCOUNTING CONTROLS
AND OCCURRENCES OF COMPUTER FRAUD. (Chair: Edward A. Becker). Nova
University. 133 pp. Order No. DA 9022334.

Esquerra, Ronald Lee. 1982. PERSONAL PRIVACY IN A COMPUTER
INFORMATION SOCIETY. (Director: Jay F. Nunamaker). The University of
Arizona. 377 pp. Order No. DA 8217495

Honan, Ava Smith. 1988. ANALYSIS OF KEYSTROKE PATTERNS FOR THE
DEVELOPMENT OF A SECURITY SYSTEM FOR VALIDATION OF COMPUTER ACCESS.
(Chair, Saeed Maghsoodloo). Auburn University. 115 pp. Order No. DA
8918795.

Lu, Wen-Pai. 1986. SECURITY OF COMMUNICATION IN COMPUTER NETWORKS.
(Director: Malur K. Sundareshan). The University of Arizona. 282 pp.
Order No. DA 8702350.

Pozzo, Maria Mildred. 1990. TOWARDS COMPUTER VIRUS PREVENTION.
(Chair: David G. Cantor). University of California, Los Angeles. 202
pp. Order No. DA 9033944

Shamp, Scott A. 1989. MECHANOMORPHISM AND THE PERCEPTION OF COMPUTER
COMMUNICATION PARTNERS (University of Utah).  Contact:  sshamp@uga.bitnet

                 ++++++++++++++++++++++++
                      MASTERS' THESES
                 ++++++++++++++++++++++++

Meyer, Gordon. 1988. THE SOCIAL ORGANIZATION OF THE
COMPUTER UNDERGROUND. (Chair: James Massey). Northern Illinois
University. Contact: Gordon Meyer: "72307.1502@COMPUSERVE.COM"

Wang, Shenhsien J. 1986. DETECTIVE SECURITY SYSTEM THAT MEASURES AND
PREVENTS NETWORK VIOLATIONS. (Chair: Kenneth C. Kung). Northrop
University. 109 pp. Order No. MA 132853

Lankewicz, Linda Bright. 1986. RESOURCE UTILIZATION AND SECURITY.
(Major Professor: Marino J. Niccolai). University of South Alabama.
190 pp. Order No. ??).

                 ++++++++++++++++++++++++
                     WORKS IN PROGRESS
                 ++++++++++++++++++++++++

(The following include projects in the planning stage as well as
those nearing completion)

William Curran (Arizona State University). Writing a Masters Thesis on
the introduction of wide area and local nets into the Soviet Union,
combining technological and sociological analysis that summarizes the
changes and prospects for early nineties.  Contact:
WCURRAN@CARAT.ARIZONA.EDU

Mark Smith (Sociology, University of California, Los Angeles).
Dissertation (in progress) that focuses on the power and politics of the
"information society".  Recurring themes include the role of time/space
compression and surveillance in society.  Significant influences include
David Harvey, Michel Foucault, Mark Poster, Herbert expand.  One issue
includes the clash between Enlightenment rhetoric and post-modern
technology.  Contact: SMITHM@DUVM.BITNET

Peter S. Markham (University of Melbourne, Dept. of Criminology).
Masters' Thesis in progress on a comparative study of the
Criminalisation of Computer Misuse in the United States, United Kingdom
and Australia.  Contact: pmark@ARIEL.UCS.UNIMELB.EDU.AU

Elizabeth M. Reid (University of Melbourne). Supervisor: Donna
Merwick.  Honours Thesis on computer-Mediated Communication
communication processes in synchronous conferencing, including
computer networks, internet, and electronic mail.  The focus is on
cultural themes of communication, including power, interpreting social
contexts, socialization and learning, from a deconstructionist
perspective.  ((Moderators' note:  We've read a draft, and it's
first-rate)).  Contact:  "emr%munagin.ee.mu.oz.au@uunet.uu.net"

Paul Taylor (University of Edinburgh). Finishing a dissertation on
hacking/viruses and the politics behind them.  Focus includes hackers
and their computer security industry counterparts.  Examines the issue
of technological determinism and the "information revolution" and also
the idea of hackers being perhaps an extension or most recent
development of an alternative culture. It also raises the whole issue of
the exact nature of cyberspace and the implications it holds: Are we
entering a new realm of informational colonialism? What is information?
Who has rights over it, and are hackers/the computer underground
fighting a battle of principle the importance of which has passed most
people by?  Contact:  "p.a.taylor@edinburgh.ac.uk"

Robert Berry (U. of North Carolina at Chapel Hill, Journalism).  M.A.
Thesis on the First Amendment implications of computer-based
communication technologies.  The focus includes a political analysis
of the history of governmental harassment of hackers and how that
harassment threatens to infringe the First Amendment rights associated
with this new technology.  The analysis centers around Operation Sun
Devil and the related prosecutions that have taken place during the
past few years.  Contact: rrberry@SHELTIE.CHAPEL-HILL.NC.US

------------------------------

Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: General On-Line and Print Resources

The following "phreak/hacker" newsletters and magazines provide
insights into the culture of the CU. Some are defunct, others are
still publishing. An (*) indicates continued publication.  (E)
indicates published in electronic format, (H) indicates hardcopy.
Most are available in the CuD ftp archives.

TAP (*H): General phreak/hack information. Contact TAP, PO Box 20264
Louisville, KY 40250.

ATI (*E): Political oriented posts. Appears every few months.  Contact
gzero@tronsbox.xei.com

NIA (Network Information Access) (*E): News digest and p/h
information.

NIA (*E): National Information Access, appears every few months.
Contact nuchat!samp@uunet.uu.net.

P/Hun (E): Five issues appeared. Primarily technical information.

PIRATE (E): News related to software piracy. Five issues appeared.

LoD/TJ (E): Hacker technical journal with occasional news.  Four issue
appeared.

Weltanschaaung (*E): Political and editorial information focusing on
cyber issues.  Began August, 1991. Contact fox@nuchat.sccsi.com

2600--The Hacker Quarterly (*H): Quarterly issue devoted to
hacker-related technical information and news. Contact
emmanuel@well.sf.ca.us

Boardwatch Magazine (*H): Published monthly; Billed as a "guide to the
world of online services," focus is on BBS world.  Essential reading
for serious modemers. Contact jrickard@teal.csn.org

MONDO 2000 (*H): A slick, "postmodernist" oriented magazine, Mondo
covers music, art, and other cultural topics as well as cyber culture.
Contact rusirius@well.sf.ca.us

EFFECTOR (*HE): The newsletter of the Electronic Frontier Foundation.
Mainly covers EFF activities and summaries of its involvement in
various projects. Contact eff@org

RISKS Digest (*E): An on-line, moderated newsgroup identifying
computer risks to society. Available through Usenet.  Contact
risks@csl.sri.com

TELECOM Digest (*E):  A on-line, moderated newsgroup focusing on
telecommunications issues and the related social, ethical, and
political problems.  Available through Usenet. Contact
telecom@eecs.nwu.edu

CuD (*EH): On-line magazine/journal specializing in legal, ethical,
and social issues related to the computer culture. Available through
Usenet. Contact tk0jut1@mvs.cso.niu.edu.

CuD ftp archives (*E): A collection of legal and academic papers and
phreak/hacker/pirate 'zines and newsletters. Collection also includes
a variety of state and federal laws and university policies along with
other CU-related documents.  Contact:  chsun1.spc.uchicago.edu or
ftp.cs.widener.edu

VIRUS-L Digest:  on-line moderated newsgroup for discussions of
computer viruses.  Available through Usenet. Contact virus-l@lehiibm1

Comp.org.eff.talk (*E): Unmoderated newsgroup for discussion of issues
related to cyberspace. Available through Usenet.

Computer/Law Journal (*H): Legal journal devoted to all legal aspects
of computer technology, including security, privacy, and copyright.

Chalisti (*E): German hacker newsletter (written in German) covering
European hacker news and technology.

------------------------------

Date: 12 Oct 91 11:21:19 CDT
From: Moderators <tk0jut2@mvs.cso.niu.edu>
Subject: Misc. Books for Fun Reading

                      (Compiled by "Dark Mage")

Title                        Author
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Johnny Zed                   Betancourt, John Gregory
When Gravity Fails           Effinger, George Alec
The Long Orbit               Farren, Mick
The Company Man              Faust, Clifford
A Death of Honor             Faust, Clifford
Cyber Way                    Foster, Alan Dean
Neuromancer                  Gibson, William
Mona Lisa Overdrive          Gibson, William
Count Zero                   Gibson, William
Burning Chrome               Gibson, William
Barking Dogs                 Green, Terrence M.
The Glass Hammer             Jeter, K.W.
Farewell Horizontal          Jeter, K.W.
Bad Voltage                  Littel, Jonathan
Armageddon Blues             Moran, Daniel Keys
Emerald Eyes                 Moran, Daniel Keys
Yesterdays Pawn              Quick, W.T.
Dreams of Flesh and Sand     Quick, W.T.
Dreams of Gods and Men       Quick, W.T.
Systems                      Quick, W.T.
Eclipse Penumbra             Shirley, John
Eclipse                      Shirley, John
Little Heroes                Spinrad, Norman
Other Americas               Spinrad, Norman
Islands in the Net           Spinrad, Norman
Mercedes Nights              Weaver, Michael D.
Angel Station                Williams, Walter Jon
Hardwired                    Williams, Walter Jon
Voice of the Whirlwind       Williams, Walter Jon

------------------------------

End of Computer Underground Digest #3.36
************************************