ing.
Subjects: Fraud; Computers & computer technology; Computer crime; Newspapers
Type: Feature
Length: Long (31+ col inches)
88016993
Title: The Online Underworld
Authors: Scrogan, Len
Journal: Classroom Computer Learning Vol: 8 Iss: 5 Date: Feb 1988
pp: 58-60
Jrnl Code: GCCL ISSN: 0746-4223 Jrnl Group: SciTech
Abstract: Every educator who introduces kids to telecommunications should also
be aware of the illegal activities which might occur. Teachers need
to communicate the ethics of online behavior to students.
Subjects: Education & schools; Computer crime; Computer programming &
languages; Ethics
Type: Feature
Length: Long (31+ col inches)
88013032
Title: Fighting Computer Crime
Authors: Szabo, Joan C.
Journal: Nation's Business Vol: 76 Iss: 2 Date: Feb 1988 pp: 14
Jrnl Code: NAB ISSN: 0028-047X Jrnl Group: Business
Abstract: A new booklet from the SBA, "A Small Business Guide to Computer
Security," gives guidelines on how small business can protect their
computer operations.
Subjects: Computer crime; Small business; Small Business Administration--SBA
Type: Commentary
Length: Short (1-9 col inches)
88011465
Title: Crime in the Computer Age
Authors: Wood, Chris
Journal: Maclean's Vol: 101 Iss: 5 Date: Jan 25, 1988 pp: 28-30
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
Abstract: A discussion of computer crimes. Photograph
Subjects: Crime & criminals; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)
88010266
Title: Israeli University Offers Cure for Mysterious Computer 'Virus'
Authors: Watzman, Herbert M.
Journal: Chronicle of Higher Education Vol: 34 Iss: 19 Date: Jan 20, 1988
pp: A41
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A electronic 'virus' programmed to damage and destroy software has
been spreading across Israel. Israeli University is handing out a
cure for the 'virus' to those who need it.
Subjects: Computer crime; Israel; Israeli University
Type: News
Length: Medium (10-30 col inches)
red by
federal legislation. Illustration
Subjects: Computer crime; Social conditions & trends
Type: Commentary
Length: Medium (10-30 col inches)
90144244
Title: Risky Business: Tackling Computer Security
Authors: Peterson, Ivars
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
Abstract: In response to concerns about the security of US computer systems, a
National Research Council panel issued a report detailing the
extreme vulnerability of present-day systems. The report is
discussed.
Subjects: Computer crime; Computers & computer technology; National Research
Council
Type: News
Length: Medium (10-30 col inches)
90142863
Title: Law: Breaking and Entering
Authors: Lawren, Bill
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The US government's efforts to crack down on computer crime may
violate the constitutional rights of hackers. The Electronic
Frontier Foundation (EFF) has been formed to fight for those rights.
Illustration
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
Type: Feature
Length: Medium (10-30 col inches)
90128169
Title: Balancing the Books: Spectacular Computer Crimes
Journal: Barron's Date: Oct 1, 1990 pp: 55
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck
BloomBecker about computer crime and the danger it poses to
industry.
Subjects: Computer crime
Names: BloomBecker, Buck
Type: Book Review-Unfavorable
Length: Long (19+ col inches)
90125761
Title: Print Queue: Stomping the Nasties
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
Programs, and Other Threats to Your System," by John McAfee and
Colin Haynes. Illustration
Subjects: Nonfiction; Computer crime; Computer programming & languages;
Computers & computer technology
Names: McAfee, John; Haynes, Colin
Type: Book Review-Favorable
Length: Long (31+ col inches)
90118815
Title: Apple Ad Arresting, but Will Stay in Can
Authors: Johnson, Bradley
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV
commercial before it was aired. Apparently the company thought the
commercial might encourage the theft of Macintosh computers.
Subjects: Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type: News
Length: Short (1-9 col inches)
90109601
Title: Rights and Wrongs of Software
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Software copyrights have received much attention as software piracy
proliferates. Some experts believe software restrictions will
inhibit the development of better products and the growth of small
firms. Photograph; Illustration
Subjects: Software; Copyright; Computer programming & languages; Computer
crime
Type: Feature
Length: Long (31+ col inches)
90108876
Title: Eternal Plague: Computer Viruses
Authors: Cipra, Barry
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
Abstract: Recent findings indicate that there is no way to protect a computer
against all possible viral attacks. Two basic types of computer
viruses, the type that reproduces and the type that infects and
alters an operating system, are described.
Subjects: Computer programming & languages; Software; Operating systems;
Computer crime
Type: Feature
Length: Medium (10-30 col inches)
90099926
Title: Computer Center Certifies First Secure Network
Authors: Anonymous
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
Date: Sep 3, 1990 pp: 42
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
Abstract: The National Computer Center recently certified the first
multi-level secure computer network, the Verdix Secure Local Area
Network (VSLAN).
Subjects: Computer networks; Computer crime; Security systems; National
Computer Center
Type: News
Length: Short (1-9 col inches)
90099517
Title: Computer Hackers: United States v Zod
Authors: Anonymous
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The incompetence involved in the dramatic raids on computer hackers
by the Secret Service is discussed. The question of whether its
seizure of computers is constitutional is addressed. Photograph
Subjects: Computer crime; Computer networks; Law enforcement; Search &
seizure; Secret Service-US
Type: Commentary
Length: Medium (10-30 col inches)
90099086
Title: Computers, Crime, and the Law
Authors: Branwyn, Gareth
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
Socio/Environmental
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
part of an investigation into data piracy and computer crime.
Computer professional's battle for free speech and privacy rights
are detailed.
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type: Commentary
Length: Medium (10-30 col inches)
90144244
Title: Risky Business: Tackling Computer Security
Authors: Peterson, Ivars
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
Abstract: In response to concerns about the security of US computer systems, a
National Research Council panel issued a report detailing the
extreme vulnerability of present-day systems. The report is
discussed.
Subjects: Computer crime; Computers & computer technology; National Research
Council
Type: News
Length: Medium (10-30 col inches)
90142863
Title: Law: Breaking and Entering
Authors: Lawren, Bill
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The US government's efforts to crack down on computer crime may
violate the constitutional rights of hackers. The Electronic
Frontier Foundation (EFF) has been formed to fight for those rights.
Illustration
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
Type: Feature
Length: Medium (10-30 col inches)
90128169
Title: Balancing the Books: Spectacular Computer Crimes
Journal: Barron's Date: Oct 1, 1990 pp: 55
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck
BloomBecker about computer crime and the danger it poses to
industry.
Subjects: Computer crime
Names: BloomBecker, Buck
Type: Book Review-Unfavorable
Length: Long (19+ col inches)
90125761
Title: Print Queue: Stomping the Nasties
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
Programs, and Other Threats to Your System," by John McAfee and
Colin Haynes. Illustration
Subjects: Nonfiction; Computer crime; Computer programming & languages;
Computers & computer technology
Names: McAfee, John; Haynes, Colin
Type: Book Review-Favorable
Length: Long (31+ col inches)
90118815
Title: Apple Ad Arresting, but Will Stay in Can
Authors: Johnson, Bradley
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV
commercial before it was aired. Apparently the company thought the
commercial might encourage the theft of Macintosh computers.
Subjects: Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type: News
Length: Short (1-9 col inches)
90109601
Title: Rights and Wrongs of Software
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Software copyrights have received much attention as software piracy
proliferates. Some experts believe software restrictions will
inhibit the development of better products and the growth of small
firms. Photograph; Illustration
Subjects: Software; Copyright; Computer programming & languages; Computer
crime
Type: Feature
Length: Long (31+ col inches)
90108876
Title: Eternal Plague: Computer Viruses
Authors: Cipra, Barry
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
Abstract: Recent findings indicate that there is no way to protect a computer
against all possible viral attacks. Two basic types of computer
viruses, the type that reproduces and the type that infects and
alters an operating system, are described.
Subjects: Computer programming & languages; Software; Operating systems;
Computer crime
Type: Feature
Length: Medium (10-30 col inches)
90099926
Title: Computer Center Certifies First Secure Network
Authors: Anonymous
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
Date: Sep 3, 1990 pp: 42
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
Abstract: The National Computer Center recently certified the first
multi-level secure computer network, the Verdix Secure Local Area
Network (VSLAN).
Subjects: Computer networks; Computer crime; Security systems; National
Computer Center
Type: News
Length: Short (1-9 col inches)
90099517
Title: Computer Hackers: United States v Zod
Authors: Anonymous
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The incompetence involved in the dramatic raids on computer hackers
by the Secret Service is discussed. The question of whether its
seizure of computers is constitutional is addressed. Photograph
Subjects: Computer crime; Computer networks; Law enforcement; Search &
seizure; Secret Service-US
Type: Commentary
Length: Medium (10-30 col inches)
90099086
Title: Computers, Crime, and the Law
Authors: Branwyn, Gareth
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
Socio/Environmental
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
part of an investigation into data piracy and computer crime.
Computer professional's battle for free speech and privacy rights
are detailed.
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type: Commentary
Length: Medium (10-30 col inches)
90144244
Title: Risky Business: Tackling Computer Security
Authors: Peterson, Ivars
Journal: Science News Vol: 138 Iss: 24 Date: Dec 15, 1990 pp: 373
Jrnl Code: GSCN ISSN: 0036-8423 Jrnl Group: SciTech
Abstract: In response to concerns about the security of US computer systems, a
National Research Council panel issued a report detailing the
extreme vulnerability of present-day systems. The report is
discussed.
Subjects: Computer crime; Computers & computer technology; National Research
Council
Type: News
Length: Medium (10-30 col inches)
90142863
Title: Law: Breaking and Entering
Authors: Lawren, Bill
Journal: Omni Vol: 13 Iss: 3 Date: Dec 1990 pp: 17
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The US government's efforts to crack down on computer crime may
violate the constitutional rights of hackers. The Electronic
Frontier Foundation (EFF) has been formed to fight for those rights.
Illustration
Subjects: Computer crime; Civil rights; Electronic Frontier Foundation
Type: Feature
Length: Medium (10-30 col inches)
90128169
Title: Balancing the Books: Spectacular Computer Crimes
Journal: Barron's Date: Oct 1, 1990 pp: 55
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: Eric J. Savitz reviews "Spectacular Computer Crimes" by Buck
BloomBecker about computer crime and the danger it poses to
industry.
Subjects: Computer crime
Names: BloomBecker, Buck
Type: Book Review-Unfavorable
Length: Long (19+ col inches)
90125761
Title: Print Queue: Stomping the Nasties
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 12 Date: Nov 1990 pp: 466-467
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
Programs, and Other Threats to Your System," by John McAfee and
Colin Haynes. Illustration
Subjects: Nonfiction; Computer crime; Computer programming & languages;
Computers & computer technology
Names: McAfee, John; Haynes, Colin
Type: Book Review-Favorable
Length: Long (31+ col inches)
90118815
Title: Apple Ad Arresting, but Will Stay in Can
Authors: Johnson, Bradley
Journal: Advertising Age Vol: 61 Iss: 43 Date: Oct 15, 1990 pp: 6
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: Apple Computer Inc pulled its $350,000 "Computer Crime" TV
commercial before it was aired. Apparently the company thought the
commercial might encourage the theft of Macintosh computers.
Subjects: Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type: News
Length: Short (1-9 col inches)
90109601
Title: Rights and Wrongs of Software
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1736 Date: Sep 29, 1990 pp: 44-48
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Software copyrights have received much attention as software piracy
proliferates. Some experts believe software restrictions will
inhibit the development of better products and the growth of small
firms. Photograph; Illustration
Subjects: Software; Copyright; Computer programming & languages; Computer
crime
Type: Feature
Length: Long (31+ col inches)
90108876
Title: Eternal Plague: Computer Viruses
Authors: Cipra, Barry
Journal: Science Vol: 249 Iss: 4975 Date: Sep 21, 1990 pp: 1381
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: Academic; SciTech
Abstract: Recent findings indicate that there is no way to protect a computer
against all possible viral attacks. Two basic types of computer
viruses, the type that reproduces and the type that infects and
alters an operating system, are described.
Subjects: Computer programming & languages; Software; Operating systems;
Computer crime
Type: Feature
Length: Medium (10-30 col inches)
90099926
Title: Computer Center Certifies First Secure Network
Authors: Anonymous
Journal: Aviation Week & Space Technology Vol: 133 Iss: 10
Date: Sep 3, 1990 pp: 42
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: Business; SciTech
Abstract: The National Computer Center recently certified the first
multi-level secure computer network, the Verdix Secure Local Area
Network (VSLAN).
Subjects: Computer networks; Computer crime; Security systems; National
Computer Center
Type: News
Length: Short (1-9 col inches)
90099517
Title: Computer Hackers: United States v Zod
Authors: Anonymous
Journal: Economist Vol: 316 Iss: 7670 Date: Sep 1, 1990 pp: 23-24
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The incompetence involved in the dramatic raids on computer hackers
by the Secret Service is discussed. The question of whether its
seizure of computers is constitutional is addressed. Photograph
Subjects: Computer crime; Computer networks; Law enforcement; Search &
seizure; Secret Service-US
Type: Commentary
Length: Medium (10-30 col inches)
90099086
Title: Computers, Crime, and the Law
Authors: Branwyn, Gareth
Journal: Futurist Vol: 24 Iss: 5 Date: Sep 1990 pp: 48
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: SciTech;
Socio/Environmental
Abstract: A Mar 1990 raid by the Secret Service on Steve Jackson Games was
part of an investigation into data piracy and computer crime.
Computer professional's battle for free speech and privacy rights
are detailed.
Subjects: Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type: Commentary
Length: Medium (10-30 col inches)
90098358
Title: Artificial Intelligence: Computerized Breaking and Entering
Authors: Goldberg, Jeff
Journal: Omni Vol: 12 Iss: 12 Date: Sep 1990 pp: 18
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: To combat computer "worms," such as the one created by Robert Tappan
Morris, software vendors are offering enhanced security programs.
The pros and cons of security are discussed. Illustration
Subjects: Computer crime; Software; Security systems
Type: Feature
Length: Medium (10-30 col inches)
90096176
Title: Spring Books: Guardian of the Gates
Authors: Dickman, Steven
Journal: Nature Vol: 344 Iss: 6269 Date: Apr 26, 1990 pp: 895-896
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech
Abstract: Steven Dickman reviews "The Cuckoo's Egg," by Clifford Stoll.
Photograph
Subjects: Nonfiction; Espionage; Computer crime
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Medium (10-30 col inches)
90095224
Title: Science and the Citizen: Digital Desperados
Authors: Wallich, Paul
Journal: Scientific American Vol: 263 Iss: 3 Date: Sep 1990 pp: 34-38
Jrnl Code: GSCA ISSN: 0036-8733 Jrnl Group: SciTech
Abstract: Many computer experts feel that the government is acting
overzealousy in its effort to crack down on computer crime. The
definition of computer crime has come into question.
Subjects: Computer crime; Law enforcement
Type: News
Length: Medium (10-30 col inches)
90094490
Title: Off the Hook
Authors: Dibbell, Julian
Journal: Village Voice Vol: 35 Iss: 34 Date: Aug 21, 1990 pp: 8
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: Federal prosecutors dropped charges against Craig M. Neidorf,
better known as the Knight Lightning computer hacker, on Jul 24,
1990. Neidorf had published a document detailing Bellsouth's
emergency 911 system, although corporate officials agreed that the
information was not sensitive.
Subjects: Computer crime; Publishing; Telecommunications industry
Names: Neidorf, Craig M
Companies: BellSouth Corp
Type: News
Length: Short (1-9 col inches)
90091236
Title: Sending a Signal
Authors: Denning, Peter J
Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990
pp: 11, 13
Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic
Abstract: An editorial discusses Robert Morris Jr's criminal sentence. Morris
was convicted in Jan 1990 of releasing a worm program into the
Research Internet in Nov 1988. Morris was given a suspended jail
term, a fine of $10,000 and 400 hours of community service.
Illustration
Subjects: Computer crime; Criminal sentences; Fines & penalties; Crime &
criminals
Names: Morris, Robert T Jr
Type: Editorial
Length: Medium (10-30 col inches)
90091223
Title: Insecurity about Security?
Authors: Neumann, Peter G
Journal: Communications of the ACM Vol: 33 Iss: 8 Date: Aug 1990 pp: 170
Jrnl Code: GACM ISSN: 0001-0782 Jrnl Group: SciTech; Academic
Abstract: The security provided with many computer systems is fundamentally
flawed. Better software and hardware systems are needed to hinder
misuse from within and penetration. Illustration
Subjects: Computers & computer technology; Computer crime; Security systems
Type: Commentary
Length: Medium (10-30 col inches)
90090104
Title: Forum: Playing the Data Game
Authors: Wise, Bob; Scisco, Peter
Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 16
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The Democratic congressman from West Virginia and the editor of
"Compute" magazine offer opinions on privacy and computer security.
Illustration
Subjects: Computer crime; Privacy
Type: Commentary
Length: Medium (10-30 col inches)
90090099
Title: Crime Bytes Back
Authors: Marsa, Linda; Ray, Don
Journal: Omni Vol: 12 Iss: 11 Date: Aug 1990 pp: 34-38+
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The high-tech world of future computer cops and robbers is
breathlessly described. Illustration
Subjects: Computer crime; Law enforcement; Social conditions & trends; Future
Type: Feature
Length: Long (31+ col inches)
90090027
Title: Books: The Cuckoo's Egg
Authors: Connolly, John W D
Journal: Physics Today Vol: 43 Iss: 8 Date: Aug 1990 pp: 75-76
Jrnl Code: GPHT ISSN: 0031-9228 Jrnl Group: SciTech
Abstract: John W. D. Connolly reviews "The Cuckoo's Egg: Tracking a Spy
Through the Maze of Computer Espionage," by Clifford Stoll.
Subjects: Nonfiction; Computer crime; Computer networks; Espionage
Names: Stoll, Clifford
Type: Book Review-Mixed
Length: Medium (10-30 col inches)
90086946
Title: Hacker Trial under Way
Authors: Anderson, G Christopher
Journal: Nature Vol: 343 Iss: 6255 Date: Jan 18, 1990 pp: 200
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: SciTech
Abstract: The trial of Robert Morris Jr, the college student charged with
creating the "Cornell virus" that struck thousands of US computers
in 1988, is detailed. The law under which Morris is being
prosecuted, and its implications for future law enforcement for
computer crimes are examined. Photograph
Subjects: Trials; Computer crime; Law enforcement
Names: Morris, Robert
Type: Feature
Length: Medium (10-30 col inches)
90086606
Title: Viruses? Who You Gonna Call? 'Hackerbusters'
Authors: Schwartz, Evan I; Rothfeder, Jeffrey
Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 71-72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Computer security, where purveyors of special software and
consulting methods offer protection from computer crime, is a $3
billion industry, but some critics claim that there are charlatans
out there. Graph; Illustration
Subjects: Industry profiles; Security systems; Computers & computer
technology; Computer crime; Consultants
Type: Feature
Length: Medium (10-30 col inches)
90086605
Title: Computer Anarchism Calls for a Tough Response
Authors: Rothfeder, Jeffrey; Schwartz, Evan I
Journal: Business Week Iss: 3172 Date: Aug 6, 1990 pp: 72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: While computer break-ins and viruses are admittedly dangerous,
hysteria over the situation is no excuse for violating the
constitutional rights of suspected hackers. Photograph
Subjects: Computer crime; Civil rights
Type: Commentary
Length: Medium (10-30 col inches)
90085769
Title: Theft in the Classroom
Authors: Thornburg, David D
Journal: inCider Vol: 8 Iss: 8 Date: Aug 1990 pp: 88-90
Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech
Abstract: The issue of software piracy as it relates to use of computer
programs in the classroom is discussed. More sources of public
funding are needed so schools won't be inclined to copy programs
illegally.
Subjects: Education & schools; Copyright; Software; Computer crime
Type: Commentary
Length: Medium (10-30 col inches)
90084275
Title: On Line and Out of Bounds
Authors: Dibbell, Julian
Journal: Village Voice Vol: 35 Iss: 30 Date: Jul 24, 1990 pp: 26-32
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: Computer hackers are penetrating some of the country's most
sophisticated systems, and the government is targeting them as a
serious threat to national security. Secret Service raids on
hackers are described. Illustration
Subjects: Computer crime; Computer networks; Classified information; National
security; Secret Service-US
Type: Feature
Length: Long (31+ col inches)
90083828
Title: Crackdown on Hackers 'May Violate Civil Rights'
Authors: Charles, Dan
Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 22
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: The Electronic Frontier Foundation, a computer industry group, says
US efforts to crack down on computer "hackers" may be unlawful and
violate civil rights. Photograph
Subjects: Computer crime; Laws & legislation; Civil rights; United States--US;
Electronic Frontier Foundation
Type: News
Length: Medium (10-30 col inches)
90083805
Title: Private and Confidential
Authors: Reynolds, Chris
Journal: New Scientist Vol: 127 Iss: 1726 Date: Jul 21, 1990 pp: 58
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: The proliferation of electronic mail, bulletin boards and databases
is raising concerns over security and privacy in the computer age.
Illustration
Subjects: Electronic mail; Computers & computer technology; Privacy; Computer
crime
Type: Commentary
Length: Medium (10-30 col inches)
90081730
Title: Print Queue: Our Man in Berkeley
Authors: Kenner, Hugh
Journal: Byte Vol: 15 Iss: 3 Date: Mar 1990 pp: 360-362
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Hugh Kenner reviews "The Cuckoo's Egg: Tracking a Spy Through the
Maze of Computer Espionage," by Clifford Stoll. Illustration
Subjects: Nonfiction; Computer crime; Espionage
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Long (31+ col inches)
90081052
Title: 'Killer' Computer Viruses: An Idea Whose Time Shouldn't Come
Authors: Lewyn, Mark
Journal: Business Week Iss: 3170 Date: Jul 23, 1990 pp: 30
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: The Defense Department's scheme to use a "killer" computer virus to
infiltrate an enemy's computer system is discussed. Although
feasible, the concept could prove to be costly in more ways than
one. Illustration
Subjects: Computer crime; Espionage; Department of Defense
Type: Commentary
Length: Medium (10-30 col inches)
90078513
Title: Hackers of the World, Unite!
Authors: Schwartz, John
Journal: Newsweek Vol: 116 Iss: 1 Date: Jul 2, 1990 pp: 36-37
Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News
Abstract: As law-enforcement officials widen their crackdown on computer
tampering, computer pioneers like Mitch Kapor and Steve Wozniak are
joining in an effort to defend hackers and the freedom of
information. Photograph
Subjects: Computers & computer technology; Law enforcement; Computer crime
Type: News
Length: Long (31+ col inches)
90074799
Title: Man with a Modem
Authors: Campbell, Peter
Journal: New Statesman & Society Vol: 3 Iss: 106 Date: Jun 22, 1990
pp: 54
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
Abstract: Peter Campbell reviews "Beating the System: Hackers, Phreakers and
Electronic Spies," by Owen Bowcott and Sally Hamilton.
Subjects: Nonfiction; Computer crime
Names: Bowcott, Owen; Hamilton, Sally
Type: Book Review-Mixed
Length: Medium (10-30 col inches)
90062822
Title: Microcomputer Security and Control
Authors: Forgione, Dana; Blankley, Alan
Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990 pp: 83-90
Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business
Abstract: Six tips for accountants on maintaining microcomputer security are
offered. Photograph; Table
Subjects: Personal computers; Computer crime; Accounting & accountants
Type: Feature
Length: Long (31+ col inches)
90062815
Title: Book Review: Computer Audit, Control, and Security
Authors: Iacono, Lisa M
Journal: Journal of Accountancy Vol: 169 Iss: 6 Date: Jun 1990
pp: 150-151
Jrnl Code: JAC ISSN: 0021-8448 Jrnl Group: Business
Abstract: Lisa M. Iacono reviews "Computer Audit, Control, and Security," by
Robert R. Moeller.
Subjects: Nonfiction; Accounting & accountants; Computers & computer
technology; Computer crime; Security systems
Names: Moeller, Robert R
Type: Book Review-Favorable
Length: Medium (10-30 col inches)
90062001
Title: The Risk of Computing
Authors: Reynolds, Chris
Journal: New Scientist Vol: 126 Iss: 1718 Date: May 26, 1990 pp: 64
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Chris Reynolds reviews "Viruses, Bugs and Star Wars," by Geoff
Simons. Illustration
Subjects: Nonfiction; Computers & computer technology; Computer crime
Names: Simons, Geoff
Type: Book Review-Unfavorable
Length: Medium (10-30 col inches)
90061371
Title: Thanks for Wiping the Memory
Authors: Thimbleby, Harold
Journal: New Scientist Vol: 126 Iss: 1717 Date: May 19, 1990 pp: 69
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: It is nice to think the computer viruses have a bright side:
forcing programs, professional standards and hardware to improve.
If viruses were unable to corrupt programs, then anything or anyone
else would also find it harder.
Subjects: Computers & computer technology; Computer crime; Software
Type: Commentary
Length: Medium (10-30 col inches)
90047219
Title: Conversations
Authors: Ferrell, Keith
Journal: Compute! Vol: 12 Iss: 5 Date: May 1990 pp: 98
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: According to Buck BloomBecker, the director of the National Center
for Computer Crime Data, there is a potential for computer crime
everywhere computers are located. There is a variety of motivations
that underlie this type of crime. Photograph
Subjects: Computer crime; National Center for Computer Crime Data
Names: BloomBecker, Buck
Type: Commentary
Length: Medium (10-30 col inches)
90046190
Title: The Hacker Dragnet
Authors: Schwartz, John
Journal: Newsweek Vol: 115 Iss: 18 Date: Apr 30, 1990 pp: 50
Jrnl Code: GNEW ISSN: 0028-9604 Jrnl Group: News
Abstract: Federal authorities are in hot pursuit of computer criminals.
However, innocent victims may be being swept up in the hunt.
Illustration
Subjects: Computer crime; Crime & criminals; Law enforcement
Type: News
Length: Medium (10-30 col inches)
90045192
Title: Hackers 'Plan Revenge' for Police Clampdown on Computer Crime
Authors: Charles, Dan; O Neill, Graeme
Journal: New Scientist Vol: 126 Iss: 1713 Date: Apr 21, 1990 pp: 24
Jrnl Code: GNSC ISSN: 0262-4079 Jrnl Group: SciTech
Abstract: Managers of computer networks in the US and Australia have sent out
warnings that "hackers" may try to take revenge for recent attempts
by police to crack down on computer crime.
Subjects: Computers & computer technology; Computer networks; Computer crime;
Crime & criminals
Type: News
Length: Medium (10-30 col inches)
90042567
Title: Busting Computer Viruses: Who Ya Gonna Call?
Authors: Anonymous
Journal: Economist Vol: 315 Iss: 7649 Date: Apr 7, 1990 pp: 78
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The onslaught of damage to computer systems by viruses and hackers
is expected to increase. Halting the problem will mean stricter
control on the use of PCs. Illustration
Subjects: Computers & computer technology; Personal computers; Computer crime
Type: News
Length: Medium (10-30 col inches)
90042105
Title: A 75 (Cent) Discrepancy Propels Astronomer Into a Maze of Computer
Networks and Onto a Best-Seller List
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 36 Iss: 29 Date: Apr 4, 1990
pp: A3
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Clifford Stoll's investigation of a 75-cent discrepancy in some
computer accounts in 1986 led him to track a spy through a maze of
computer networks. Stoll catalogued the techniques the spy used in
his book "The Cuckoo's Egg: Tracking a Spy Through the Maze of
Computer Espionage." Photograph
Subjects: Computers & computer technology; Biographical profiles; Espionage;
Computer crime
Names: Stoll, Clifford
Type: News
Length: Medium (10-30 col inches)
90041088
Title: Computer Whiz Guilty
Authors: Burstyn, Harold L
Journal: ABA Journal Vol: 76 Date: Apr 1990 pp: 20
Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business
Abstract: In one of the first jury trials under the Computer Fraud and Abuse
Act, a federal jury convicted a graduate student named Robert T.
Morris of launching a rogue program called a worm that shut down
hundreds of computers across the US. He intended no malice and was
not sent to jail. Photograph
Subjects: Court rulings; Computers & computer technology; Criminal sentences;
Computer crime
Names: Morris, Robert T Jr
Type: News
Length: Medium (10-30 col inches)
90038941
Title: Books and Arts: Computer Hackers--The 75-Cent Solution
Authors: Anonymous
Journal: Economist Vol: 314 Iss: 7648 Date: Mar 31, 1990 pp: 84-85
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: "The Cuckoo's Egg," by Clifford Stoll, is reviewed.
Subjects: Computer crime; Nonfiction
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Short (1-9 col inches)
90037281
Title: Stranger than Fiction
Authors: Carver, Robert
Journal: New Statesman & Society Vol: 3 Iss: 91 Date: Mar 9, 1990 pp: 38
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
Abstract: Robert Carver reviews "The Cuckoo's Egg," by Clifford Stoll.
Photograph
Subjects: Nonfiction; Computer crime; Espionage; Investigations
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Medium (10-30 col inches)
90034139
Title: Hunt for the Hacker Spy
Authors: Elliott, Lawrence
Journal: Reader's Digest Vol: 136 Iss: 816 Date: Apr 1990 pp: 185-232
Jrnl Code: GRDI ISSN: 0034-0375 Jrnl Group: Lifestyles
Abstract: The mystery began when Clifford Stoll, a systems manager at the
Lawrence Berkeley Laboratory in Berkeley CA, learned of an
unexplained seventy-five-cent charge for computer time. Concerned
that someone was invading the US military networks, Stoll began to
hunt down the hacker. Photograph; Illustration
Subjects: Espionage; Computer crime; Defense industry
Names: Stoll, Clifford
Type: Feature
Length: Long (31+ col inches)
90032796
Title: Hi-Tech Mall Crawl
Authors: Dibbell, Julian
Journal: Village Voice Vol: 35 Iss: 12 Date: Mar 20, 1990 pp: S12
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: Eric Corley, the publisher of a computer hacker's magazine called
"2600," discusses why he and others are lured to messing with the
government's computer systems.
Subjects: Computer crime
Names: Corley, Eric
Type: Feature
Length: Medium (10-30 col inches)
90031482
Title: Tennessee Suspends 19 for Computer Tampering
Authors: Anonymous
Journal: Chronicle of Higher Education Vol: 36 Iss: 26 Date: Mar 14, 1990
pp: A2
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: The University of Tennessee has suspended 19 students for at least
one semester for gaining access to the computer program that
controls the dropping and adding of courses past the deadline. No
grades were changed.
Subjects: Computer crime; Colleges & universities; Students
Type: News
Length: Short (1-9 col inches)
90026028
Title: Computer Security: Gaining the CEO's Support
Authors: Horton, Thomas R
Journal: Vital Speeches of the Day Vol: 56 Iss: 10 Date: Mar 1990
pp: 307-310
Jrnl Code: VSP ISSN: 0042-742X Jrnl Group: Commentary
Abstract: Chief executive officers have been lamentably disinterested in
computer security, occasionally to their misfortune. Communication
is the key to any new program, and computer security personnel must
make it easy for busy CEOs to comprehend their security needs and
options. Confusion among different departments makes implementing
security a challenge.
Subjects: Computer crime; Security systems; Chief executive officers
Type: Speech
Length: Long (31+ col inches)
90025552
Title: When a Virus Makes Your PC Sneeze
Authors: Wiener, Daniel P
Journal: U.S. News & World Report Vol: 108 Iss: 8 Date: Feb 26, 1990
pp: 62
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: Those who operate personal computers over telephone lines or trade
software with friends increase the risk of contracting a computer
virus. "Blocker" programs, available for PCs, can help one prevent
or track viruses. Illustration
Subjects: Personal computers; Software; Computer crime; Security systems
Type: Feature
Length: Medium (10-30 col inches)
90021932
Title: Is Computer Hacking a Crime?
Authors: Anonymous
Journal: Harper's Vol: 280 Iss: 1678 Date: Mar 1990 pp: 45-57
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
Abstract: A round-table discussion on the ethics of computer hacking is
presented. The panelists include computer hackers, scientists,
activists and media members.
Subjects: Computer crime; Ethics; Social life & customs
Type: Feature
Length: Long (31+ col inches)
90020898
Title: Computers/Communications: Fraud Busters
Authors: Siler, Charles
Journal: Forbes Vol: 145 Iss: 4 Date: Feb 19, 1990 pp: 154-158
Jrnl Code: FBR ISSN: 0015-6914 Jrnl Group: Business
Abstract: More than 50 companies, from Texas Instruments to Spectrix Inc, are
developing tamper-proof computer networks to prevent investors from
being cheated on the futures exchanges. This new technology is
discussed. Photograph; Illustration
Subjects: Computers & computer technology; Company profiles; Computer crime
Companies: Texas Instruments Inc; Spectrix Inc
Type: Feature
Length: Long (31+ col inches)
90020575
Title: Morris Code
Authors: Hafner, Katie
Journal: New Republic Vol: 202 Iss: 8 Date: Feb 19, 1990 pp: 15-16
Jrnl Code: GTNR ISSN: 0028-6583 Jrnl Group: Commentary
Abstract: Robert Tappan Morris, the young man who infiltrated Internet, a
nationwide computer network, has recieved a stiff penalty from the
Justice Department. His crime was actually far less pernicious than
most others.
Subjects: Computer crime; Criminal sentences
Names: Morris, Robert T Jr
Type: Feature
Length: Long (31+ col inches)
90019137
Title: Scenes from Science: Hacking for Adventure
Authors: Cooper, William
Journal: Spectator Vol: 264 Iss: 8431 Date: Feb 10, 1990 pp: 10
Jrnl Code: GSPE ISSN: 0038-6952 Jrnl Group: Commentary
Abstract: The case of the US Justice Department versus Cornell graduate
student Robert Morris Jr will be a forum to evaluate the
effectiveness of the Computer Fraud and Abuse Act.
Subjects: Computer crime; Laws & legislation; Trials
Names: Morris, Robert Jr
Type: News
Length: Short (1-9 col inches)
90019041
Title: Hacked to Pieces
Authors: Jenkins, Jolyon
Journal: New Statesman & Society Vol: 3 Iss: 87 Date: Feb 9, 1990 pp: 27
Jrnl Code: GNES ISSN: 0954-2361 Jrnl Group: Commentary
Abstract: There is a good reason why people other than computer hackers and
high-tech fraudsters should worry about computer crime legislation:
Laws made in response to moral panic usually fail to catch real
criminals and end up restricting civil liberties for everyone.
Subjects: Computer crime; Laws & legislation; Civil rights
Type: Feature
Length: Medium (10-30 col inches)
90015840
Title: Around the Mall and Beyond
Authors: Park, Edwards
Journal: Smithsonian Vol: 20 Iss: 11 Date: Feb 1990 pp: 20-26
Jrnl Code: GSMI ISSN: 0037-7333 Jrnl Group: Socio/Environmental;
SciTech
Abstract: Astronomer-author-hacker Clifford Stoll is interviewed. Stoll is
the author of "The Cuckoo's Egg," a computer-age detective story.
Photograph
Subjects: Scientists; Computer crime; Biographical profiles
Names: Stoll, Clifford
Type: Interview
Length: Long (31+ col inches)
90015267
Title: Deterring Computer Crime
Authors: Rosenblatt, Kenneth
Journal: Technology Review Vol: 93 Iss: 2 Date: Feb 1990 pp: 34-40
Jrnl Code: TCR ISSN: 0040-1692 Jrnl Group: SciTech
Abstract: Computer-illiterate police cannot combat the growing incidence of
electronic theft and vandalism. What's needed are special task
forces and penalties that fit the crime, such as taking away an
offender's computer. Illustration
Subjects: Computers & computer technology; Computer crime; Law enforcement
Type: Feature
Length: Long (31+ col inches)
90008297
Title: Computer Hacking Goes on Trial
Authors: Allman, William F
Journal: U.S. News & World Report Vol: 108 Iss: 3 Date: Jan 22, 1990
pp: 25
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: The trial of Robert Morris, a graduate student who unleashed a
"worm" that caused computers around the US to grind to a halt on Nov
2, 1988, is discussed. Photograph; Illustration
Subjects: Trials; Computer crime
Names: Morris, Robert
Type: News
Length: Medium (10-30 col inches)
89127748
Title: Ethical Responsibility Key to Computer Security
Authors: Lynn, M Stuart
Journal: Educational Record Vol: 70 Iss: 2 Date: Spring 1989 pp: 36-39
Jrnl Code: GEDR ISSN: 0013-1873 Jrnl Group: Academic
Abstract: The recent Computer Worm incident raised the issue of ethical
standards relating to computer networks and information. The
pervasiveness of powerful computers makes ethical behavior morally
and practically necessary. Illustration; References
Subjects: Computer crime; Computers & computer technology; Ethics; Morality
Type: Feature
Length: Long (31+ col inches)
89121419
Title: Hackers: Is a Cure Worse Than the Disease?
Authors: Lewyn, Mark
Journal: Business Week Iss: 3136 Date: Dec 4, 1989 pp: 37-38
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Because of computer hacking, Pentagon officials would like to add
more layers of security to protect their networks. But this would
limit access to university and government scientists, who use the
information the most. Photograph
Subjects: Computer crime; Security systems; Computer networks
Names: Morris, Robert Jr
Type: Commentary
Length: Medium (10-30 col inches)
89106603
Title: Halting Hackers
Authors: Anonymous
Journal: Economist Vol: 313 Iss: 7626 Date: Oct 28, 1989 pp: 18
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: An editorial discusses the need for laws to protect against computer
crimes. Illustration
Subjects: Computer crime; Laws & legislation
Type: Editorial
Length: Short (1-9 col inches)
89104122
Title: If Your Computer Catches a Virus on Friday the 13th, Who You Gonna
Call? John McAfee
Authors: Anonymous
Journal: People Weekly Vol: 32 Iss: 16 Date: Oct 16, 1989 pp: 77
Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles
Abstract: John McAfee, computer virus exterminator "extraordinaire," has
created a so-called disinfectant program that can determine whether
a virus has invaded computer. His program can wipe out the virus
and repair the damage. Photograph
Subjects: Computer crime; Computers & computer technology; Biographical
profiles
Names: McAfee, John
Type: Feature
Length: Medium (10-30 col inches)
89103846
Title: This Morning's Computer Virus--Unlucky for Some
Authors: Anonymous
Journal: Economist Vol: 313 Iss: 7624 Date: Oct 14, 1989 pp: 100-102
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: A recent computer virus called Datacrime, which was designed to
damage databases on Friday, October 13th, has so far infected
thousands of computers in Europe.
Subjects: Computer crime; Software; Data bases
Type: Commentary
Length: Medium (10-30 col inches)
89101302
Title: Short-Circuiting Computer Crime
Authors: Bloombecker, J J
Journal: Datamation Vol: 35 Iss: 19 Date: Oct 1, 1989 pp: 71-72
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech
Abstract: Assessing what other IS managers are doing to safeguard computer
systems is probably the best source of ideas on how to shut down
computer crime, a $500 million a year industry. Graph
Subjects: Computer crime; Security systems; Computers & computer technology;
Industry profiles
Type: Feature
Length: Long (31+ col inches)
89101248
Title: Crimes of the Heart?
Authors: Crabb, Don
Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 144E-144H
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: The person who stole and disseminated the source code to some of
Apple's Macintosh ROM deserves a punishment to fit the horrible
crime. As Apple moves into the first quarter of the 1990 fiscal
year, several products Macintosh users hope to see introduced are
discussed. Illustration
Subjects: Product development; Computer crime
Companies: Apple Computer Inc
Type: Commentary
Length: Long (31+ col inches)
89101228
Title: Goodbye, Mr. Chips
Authors: Wayner, Peter
Journal: Byte Vol: 14 Iss: 10 Date: Oct 1989 pp: 364
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: The computer revolution is threatened with the curse of success.
Once eveyone starts using some new machine, the temptation to make
everything right by regulation comes creeping in.
Subjects: Computers & computer technology; Computer crime; Government
regulation
Type: Commentary
Length: Medium (10-30 col inches)
89096642
Title: Brave New World
Authors: Dibbell, Julian
Journal: Village Voice Vol: 34 Iss: 39 Date: Sep 26, 1989 pp: S7, S10+
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: The software industry has picked up its legal attacks on pirates,
targeting corporate offenders in particular. The steps that the
industry are taking are discussed. Illustration
Subjects: Computers & computer technology; Computer crime
Type: Feature
Length: Long (31+ col inches)
89091613
Title: Coping with a PC Virus
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989
pp: 8PC-10PC
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: The Commercial Appeal, a Memphis TN newspaper, recently had an
encounter with a computer virus. The company was able to remedy the
problem quickly with an anti-viral program.
Subjects: Newspapers; Company profiles; Computers & computer technology;
Computer crime
Companies: Commercial Appeal
Type: Commentary
Length: Long (31+ col inches)
89091612
Title: Combatting PC Viruses
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 122 Iss: 35 Date: Sep 2, 1989
pp: 11PC, 31PC
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: The House Telecommunication and Finance subcommittee will present
legislation that will include stiff penalties against those who
infect computer systems with a virus.
Subjects: Laws & legislation; Computers & computer technology; Viruses;
Computer crime
Type: Commentary
Length: Medium (10-30 col inches)
89089348
Title: Free the Hacker Two
Authors: Corley, Eric
Journal: Harper's Vol: 279 Iss: 1672 Date: Sep 1989 pp: 22-26
Jrnl Code: GHAR ISSN: 0017-789X Jrnl Group: Commentary
Abstract: An editorial urges the release of computer "hackers" imprisoned for
computer crimes. Excerpted from the book "Hackers in Jail."
Subjects: Computer crime
Type: Editorial
Length: Long (31+ col inches)
89083744
Title: Nonfiction: The Cuckoo's Egg
Authors: Stuttaford, Genevieve
Journal: Publishers Weekly Vol: 236 Iss: 6 Date: Aug 11, 1989 pp: 448
Jrnl Code: GPUB ISSN: 0000-0019 Jrnl Group: Commentary; Business
Abstract: Genevieve Stuttaford reviews "The Cuckoo's Egg: Tracking a Spy
through the Maze of Computer Espionage," by Cliff Stoll.
Subjects: Nonfiction; Computer crime
Names: Stoll, Clifford
Type: Book Review-Favorable
Length: Short (1-9 col inches)
89078212
Title: Computer Viruses
Authors: Vasilyev, Dmitri; Novikov, Yevgeni
Journal: Soviet Life Iss: 7 Date: Jul 1989 pp: 37-39
Jrnl Code: GSOV ISSN: 0038-5549 Jrnl Group: Lifestyles;
Commentary
Abstract: The increased use of computers in the Soviet Union brings problems
familiar to Western users, especially computer viruses. Soviet
computer scientists Alfred Ailamazyan and Sergei Abramov are
interviewed about Soviet computer viruses and computer security.
Photograph
Subjects: Computer crime; Security systems; Union of Soviet Socialist
Republics--USSR
Names: Ailamazyan, Alfred; Abramov, Sergei
Type: Interview
Length: Long (31+ col inches)
89077225
Title: The Computer Contagion
Authors: Kenyon, David M
Journal: ABA Journal Vol: 75 Date: Jun 1989 pp: 116-117
Jrnl Code: GABA ISSN: 0747-0088 Jrnl Group: Academic; Business
Abstract: Computer viruses can spread from computer to computer, including
those in law firms. Strategies for protecting against computer
viruses are discussed, including establishing a policy of who may
use the firm's computers and making paper backups of important
material. Illustration
Subjects: Computer crime; Legal professions
Type: Feature
Length: Long (31+ col inches)
89076390
Title: Viruses, Worms, Trojans, and Bombs
Authors: Stover, Dawn
Journal: Popular Science Vol: 235 Iss: 3 Date: Sep 1989 pp: 59-62+
Jrnl Code: GPOS ISSN: 0161-7370 Jrnl Group: SciTech
Abstract: Viruses, worms, trojans, and bombs are electronic infections that
make computers sick. They have actually crippled huge government
networks as well as PCs. Purported preventions, including "vaccine"
programs and protective hardware, are examined. Illustration
Subjects: Computer crime; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)
89074853
Title: Your Family Finances: "Credit Doctors" Can Hurt You
Authors: Plawin, Paul; Kainen, Bertha; Buttenheim, Alison
Journal: Changing Times Vol: 43 Iss: 8 Date: Aug 1989 pp: 78
Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Business;
Socio/Environmental
Abstract: People can steal data from a computerized file and sell the names
and information of people with good credit to people with the same
name whose credit is poor. Illustration
Subjects: Credit; Computer crime; Theft
Type: Commentary
Length: Short (1-9 col inches)
89070945
Title: A Secret No More
Authors: Kerr, Susan
Journal: Datamation Vol: 35 Iss: 13 Date: Jul 1, 1989 pp: 53-55
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: Business; SciTech
Abstract: As distributed processing and applications such as electronic mail
grow, companies are concerned about data security, and they are
evaluating their vulnerability to electronic breaches. Data
encryption is one solution. Illustration
Subjects: Security systems; Computer crime
Type: Feature
Length: Long (31+ col inches)
89070893
Title: 'Virus' Attacks ANPA's Computer
Authors: Fitzgerald, Mark
Journal: Editor & Publisher Vol: 122 Iss: 26 Date: Jul 1, 1989 pp: 34
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: A computer virus recently contaminated all of the software in the
American Newspaper Publishers Association's desktop publishing
laboratory. Three virus cleaners were used to disinfect the
laboratory.
Subjects: Newspapers; Computers & computer technology; Computer crime;
American Newspaper Publishers Association
Type: News
Length: Medium (10-30 col inches)
89066677
Title: Software At-A-Glance: Virex
Authors: Gordon, Molly
Journal: Electronic Learning Vol: 8 Iss: 8 Date: Jun 1989 pp: 51
Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech
Abstract: Molly Gordon reviews Virex, a software package that detects and
repairs contamination by scores, nVir, and Peace viruses. The
package, for the Macintosh Plus/SE/II, is from HJC Software.
Subjects: Software; Computer crime Products: HJC Virex
Companies: HJC Software
Type: Product Review-Favorable
Length: Short (1-9 col inches)
89062041
Title: Colleges Seem Vulnerable to Legal Actions Arising from Computer
Viruses
Authors: Moore, Thomas H
Journal: Chronicle of Higher Education Vol: 35 Iss: 42 Date: Jun 28, 1989
pp: A1, A20
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A report issued by the American Council on Education and the United
Educators Insurance Risk Retention Group concludes that colleges and
universities are unusually vulnerable to lawsuits arising from
computer viruses and must take steps to reduce their liability. The
report is examined.
Subjects: Computer crime; Lawsuits; Colleges & universities; Liability
Type: Feature
Length: Medium (10-30 col inches)
89059272
Title: Let's Get Reckless
Authors: Gaines, Donna
Journal: Village Voice Vol: 34 Iss: 23 Date: Jun 6, 1989 pp: S4, S15
Jrnl Code: GVIV ISSN: 0042-6180 Jrnl Group: Commentary
Abstract: The developing social importance of computer viruses is explored.
Computer hacking and computer viruses have penetrated the
consciousness of the mainstream media and are being countered by
federal legislation. Illustration
Subjects: Computer crime; Social conditions & trends
Type: Commentary
Length: Medium (10-30 col inches)
89053593
Title: The Missing Lists
Authors: Steacy, Anne
Journal: Maclean's Vol: 102 Iss: 20 Date: May 15, 1989 pp: 58
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
Abstract: A series of break-ins at the offices of Toronto Canada-based
environmental groups involving computer lists and data banks have
raised suspicions that Canadian government organizations might be
looking for information to discredit the groups. Photograph
Subjects: Crime & criminals; Computer crime; Environment; Activism; Toronto
Ontario Canada
Type: Feature
Length: Medium (10-30 col inches)
89049351
Title: The Tampa Media-Espionage Case
Authors: Hoyt, Michael
Journal: Columbia Journalism Review Vol: 28 Iss: 1 Date: May 1989
pp: 27-31
Jrnl Code: GCJR ISSN: 0010-194X Jrnl Group: Academic
Abstract: Michael Shapiro, assistant news director at WTSP-TV in St.
Petersburg Fl and computer hacker, is accused of using his computer
modem at home to break into his competitor's files. The case is
discussed. Photograph
Subjects: Computer crime; Television news; Competition; Journalism &
journalists
Names: Shapiro, Michael
Type: Feature
Length: Long (31+ col inches)
89046556
Title: Avoiding Virus Hysteria
Authors: Honan, Patrick
Journal: Personal Computing Vol: 13 Iss: 5 Date: May 1989 pp: 84-92
Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech
Abstract: Common-sense strategies and a few good tools can help keep a
company's data and equipment safe from computer viruses, time bombs
or Trojan horses. Illustration; Photograph
Subjects: Computer crime; Computers & computer technology; Security systems
Type: Feature
Length: Long (31+ col inches)
89037736
Title: Student Acted Alone in Spreading Computer 'Worm,' Cornell Report
Says
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 30 Date: Apr 5, 1989
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A report from Cornell University says that Robert T. Morris Jr, a
graduate student at the university, acted alone in November 1988
when he released on a national research network a computer program
that slowed or halted as many as 6,000 computers in the US.
Subjects: Computer crime; Colleges & universities; Students; Cornell
University
Names: Morris, Robert T Jr
Type: Feature
Length: Medium (10-30 col inches)
89035435
Title: Computer Viruses: An Epidemic Real or Imagined?
Authors: Chaffin, Ellen
Journal: Electronic Learning Vol: 8 Iss: 6 Date: Apr 1989 pp: 36-37
Jrnl Code: GELL ISSN: 0278-3258 Jrnl Group: SciTech
Abstract: Computer viruses have become an unpleasant fact of life. Tips are
given to combat the problems a computer virus may cause. Much of
the damage done by the virus is caused by of carelessness.
Illustration
Subjects: Computer crime; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)
89031460
Title: German Computer Spy Ring Broken
Authors: Marshall, Eliot
Journal: Science Vol: 243 Iss: 4898 Date: Mar 24, 1989 pp: 1545
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic
Abstract: The arrest of three West German techno-vandals in March, 1989 ended
a two year investigation of security breaches of computers from a US
military base in Japan to a laboratory in California to several
German universities and research institutes.
Subjects: Computer crime; Espionage; Investigations; West Germany
Names: Hess, Markus
Type: General Information
Length: Medium (10-30 col inches)
89027847
Title: Art ATMs Easy Targets for Crooks?
Authors: Cole, Patrick; Levine, Jonathan B
Journal: Business Week Iss: 3094 Date: Mar 6, 1989 pp: 30
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Computer systems that monitor electronic transfers are becoming an
easy target for criminal operations. Several recent incidents are
described. Photograph
Subjects: Computer crime; Banks & banking; Automated teller machines--ATM;
Crime & criminals
Type: General Information
Length: Medium (10-30 col inches)
89026462
Title: Information (Mis)management
Authors: Thompson, Tom
Journal: Byte Vol: 14 Iss: 3 Date: Mar 1989 pp: MAC 2
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Computer viruses and worms can destroy data and infect computer
systems. Safeguards are necessary so that viruses do not imperil
the free exchange of information among programmers who fear
infection.
Subjects: Computers & computer technology; Computer crime; Sabotage
Type: Editorial
Length: Medium (10-30 col inches)
89025356
Title: The Global Village under Seige--We've Met the Enemy and He Is Us
Authors: Thornburg, David D
Journal: Compute! Vol: 11 Iss: 3 Date: Mar 1989 pp: 13
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: While personal workstations are good, interconnecting with a network
can provide advantages. Networking is now being challenged by fears
of computer viruses.
Subjects: Computer networks; Computers & computer technology; Computer crime
Type: Commentary
Length: Medium (10-30 col inches)
89018587
Title: The Virus Cure
Authors: McAfee
Journal: Datamation Vol: 35 Iss: 4 Date: Feb 15, 1989 pp: 29-40
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business
Abstract: Computer viruses are plaguing many of the large computer networks.
Over 300 major virus attacks happened in the first seven months of
1988. Advice on how to prevent viruses and recover when they occur
is given. Illustration
Subjects: Computer crime; Computer networks; Computers & computer technology;
Viruses
Type: Feature
Length: Long (31+ col inches)
89016758
Title: Student Linked to Computer 'Virus' Granted Immunity by U. S.
Attorney
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 22 Date: Feb 8, 1989
pp: A2
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Robert T. Morris, the Cornell University student believed to be the
creator of the computer "virus" that paralyzed a national research
network in 1988, has been granted limited immunity by the US
Attorney's office in Syracuse New York.
Subjects: Computer crime
Names: Morris, Robert T
Type: News
Length: Short (1-9 col inches)
89014959
Title: Avoid It Like the Plague: Protecting Yourself from Computer Virus
Attacks
Authors: Esters, Stephanie D
Journal: Black Enterprise Vol: 19 Iss: 7 Date: Feb 1989 pp: 55-56
Jrnl Code: BEN ISSN: 0006-4165 Jrnl Group: Business;
Socio/Environmental
Abstract: Protecting computer systems against viruses has become a top
priority for government, academia and business. Computer crime is
responsible for $5 billion in losses annually. Several antiviral
programs are described.
Subjects: Computers & computer technology; Computer crime; Software
Type: General Information
Length: Long (31+ col inches)
89012668
Title: Blanket Security
Authors: Perdue, Lewis
Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 164-167
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
Abstract: Computer crime is a serious problem and PC users are fighting back
with extra-strength security precautions. Physical protection, data
encryption and passwords are a few ways to protect these computers.
Table; Illustration
Subjects: Computer crime; Personal computers; Security systems
Type: Feature
Length: Long (31+ col inches)
89012658
Title: Chicken Pox or Chicken Little?
Authors: Dolce, Mary A
Journal: PC World Vol: 7 Iss: 2 Date: Feb 1989 pp: 280
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
Abstract: The fear of computer viruses has been somewhat misleading. Software
saboteurs prefer to attack large companies rather than PC users in
general. Users can take some simple precautions against the threat
of destructive software.
Subjects: Software; Computer crime
Type: Commentary
Length: Medium (10-30 col inches)
89007662
Title: Computer Flu is After You
Authors: Boudette, Neal E.
Journal: Industry Week Vol: 238 Iss: 2 Date: Jan 16, 1989 pp: 39-40
Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business
Abstract: Companies shouldn't think themselves immune to computer viruses.
Companies must reevaluate their computer security policies and
proceedures, and use consultants to fix problems before their
computer systems catch a virus. Illustration
Subjects: Computer crime; Business & industry; Security systems
Type: Feature
Length: Medium (10-30 col inches)
89006239
Title: Drop the Phone
Authors: Anonymous
Journal: Time Vol: 133 Iss: 2 Date: Jan 9, 1989 pp: 49
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Kevin Mitnick, who has a long record of computer crime, is currently
facing a possible 30 years in prison and a $750,000 fine for several
crimes covered by a new federal law that prohibits breaking into an
interstate computer network for criminal purposes. Mitnick commits
most of his crimes via the telephone. Photograph
Subjects: Computer crime; Crime & criminals; Computer networks; Telephones
Names: Mitnick, Kevin
Type: News
Length: Short (1-9 col inches)
89004747
Title: The Data Bandits
Authors: Adney, William M.; Kavanagh, Douglas E.
Journal: Byte Vol: 14 Iss: 1 Date: Jan 1989 pp: 267-270
Jrnl Code: BYT ISSN: 0360-5280 Jrnl Group: SciTech
Abstract: Possible security threats to a LAN are discussed, including viruses,
data theft and accidental data destruction. Tips on making a LAN
more secure are offered. Photograph
Subjects: Computer networks; Computer crime; Security systems
Type: Feature
Length: Long (31+ col inches)
89004699
Title: ComputerScan: Antiviral Shields
Authors: Branwyn, Gareth; Clabaugh, Gavin
Journal: Futurist Vol: 23 Iss: 1 Date: Jan 1989 pp: 38
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
SciTech
Abstract: Branwyn and Clabaugh review InterPath's new anti-computer virus
shield C-4, short for Cylene-4.
Subjects: Software; Computer crime Products: InterPath C-4
Companies: InterPath Corp
Type: Product Review-Favorable
Length: Short (1-9 col inches)
89003483
Title: Disease of the Year: Illness of Glitch
Authors: Vogel, Shawna
Journal: Discover Vol: 10 Iss: 1 Date: Jan 1989 pp: 64-66
Jrnl Code: GDIS ISSN: 0274-7529 Jrnl Group: SciTech
Abstract: The most talked-about virus of 1988 infects computers, not
organisms. Computer viruses are programs that destroy other
programs and data by incessantly replicating themselves, similar to
a viral infection in the body. Illustration; Photograph
Subjects: Computer crime; Computer programming & languages; Viruses
Names: Morris, Robert Jr
Type: Feature
Length: Long (31+ col inches)
89000654
Title: Revenge of the Nerds
Authors: Martin, Nicholas
Journal: Washington Monthly Vol: 20 Iss: 12 Date: Jan 1989 pp: 21-24
Jrnl Code: GTWM ISSN: 0043-0633 Jrnl Group: Commentary
Abstract: The real problem with computer viruses, like the one recently
created by Robert T. Morris Jr, isn't the brilliant programmers,
but the easy access to classified data and the dearth of security
measures. Illustration
Subjects: Computer crime; Computers & computer technology; Security systems;
Classified information
Names: Morris, Robert T Jr
Type: Commentary
Length: Long (31+ col inches)
88178609
Title: Greater Awareness of Security in Aftermath of Computer Worm
Authors: Shulman, Seth; Palca, Joseph
Journal: Nature Vol: 336 Iss: 6197 Date: Nov 24, 1988 pp: 301
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech
Abstract: The recent attack of an unauthorized computer program upon thousands
of computer systems around the US using the ARPANET, Milnet and NSF
Net computer networks and the ensuing debate over the need for
increased security are described. Illustration
Subjects: Computers & computer technology; Computer crime; Security systems
Type: Feature
Length: Medium (10-30 col inches)
88178491
Title: Networked Computers Hit by Intelligent 'Virus'
Authors: Palca, Joseph; Shulman, Seth
Journal: Nature Vol: 336 Iss: 6195 Date: Nov 10, 1988 pp: 97
Jrnl Code: GNAA ISSN: 0028-0836 Jrnl Group: Academic; SciTech
Abstract: Thousands of people using the UNIX computer operating system were
infiltrated via electronic mail during Nov 1988. The virus, which
was created by Robert T. Morris, a graduate student in computer
science at Cornell University in Ithaca NY, is discussed.
Subjects: Computers & computer technology; Computer crime; Electronic mail
Names: Morris, Robert T Jr
Type: News
Length: Medium (10-30 col inches)
88174189
Title: Minding the Store: Part Two
Authors: Hirsch, Rudolph E
Journal: Public Relations Journal Vol: 44 Iss: 5 Date: May 1988 pp: 39
Jrnl Code: PRJ ISSN: 0033-3670 Jrnl Group: Business
Abstract: System unavailability due to human error or natural disasters is a
common computer-security problem. The best precaution against
system unavailability is duplexing, having two of a given component.
The process is described. (Part 2 of a series)
Subjects: Computers & computer technology; Software; Computer crime
Type: Feature
Length: Medium (10-30 col inches)
88165977
Title: The 25 Most Intriguing People: The Cyberpunk
Authors: Anonymous
Journal: People Weekly Vol: 30 Iss: 26 Date: Dec 26, 1988 pp: 50
Jrnl Code: GPEW ISSN: 0093-7673 Jrnl Group: Lifestyles
Abstract: In the world of computer hackers, the "Cyberpunk" probes the
weaknesses in electronic security systems, breaking into computer
networks, altering data, and unleashing microchip mayhem.
Photograph
Subjects: Computer crime
Type: News
Length: Short (1-9 col inches)
88162631
Title: Another Infection
Authors: Anonymous
Journal: Time Vol: 132 Iss: 24 Date: Dec 12, 1988 pp: 33
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Only five weeks after the Defense Department's Arpanet computer
network was infected by a computer virus, the Mitre Corp has warned
the Pentagon that the Milnet military information system has also
been violated.
Subjects: Computer crime; Computer networks; Department of Defense
Companies: Mitre Corp
Type: News
Length: Short (1-9 col inches)
88159822
Title: The Viral Age
Authors: Hodges, Parker
Journal: Datamation Vol: 34 Iss: 24 Date: Dec 1, 1988 pp: 96
Jrnl Code: DAT ISSN: 0011-6963 Jrnl Group: SciTech; Business
Abstract: An editorial reflects on the vulnerability of computer networks to
viruses. Throughout history, crimes have grown naturally from
technology and have become definitive of an era.
Subjects: Computers & computer technology; Computer crime
Type: Editorial
Length: Medium (10-30 col inches)
88158631
Title: Look Out Virus-Spreaders!
Authors: Aycock, Heidi E. H.
Journal: Compute! Vol: 10 Iss: 12 Date: Dec 1988 pp: 7
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: A proposed bill in the US House of Representatives provides criminal
penalties and allows civil suits aginst people who affect, or could
affect, interstate or foreign commerce by inserting viruses in
computer systems.
Subjects: Computer crime; Laws & legislation
Type: News
Length: Medium (10-30 col inches)
88157268
Title: An Ounce of Prevention
Authors: Borts, Andrew D.; Zatz, Martin J.
Journal: inCider Vol: 6 Iss: 12 Date: Dec 1988 pp: 60-61
Jrnl Code: GINC ISSN: 0740-0101 Jrnl Group: SciTech
Abstract: Guidelines are given for avoiding a computer virus. A user should
resist the temptation to download directly to the hard drive to
lessen the chance of a virus.
Subjects: Computer crime; Computers & computer technology
Type: General Information
Length: Short (1-9 col inches)
88152319
Title: Security Officials Ask Researchers Not to Make 'Virus' Copies
Available
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988
pp: A1, A12
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Officials at the National Computer Security Center, a division of
the National Security Agency, have asked researchers not to share
copies of the computer-network virus that attacked 6,000 scientific
and academic computers recently.
Subjects: Computer crime; National Computer Security Center
Type: Feature
Length: Long (31+ col inches)
88152249
Title: Overreaction to External Attacks on Computer Systems Could Be More
Harmful than the Viruses Themselves
Authors: King, Kenneth M.
Journal: Chronicle of Higher Education Vol: 35 Iss: 13 Date: Nov 23, 1988
pp: A36
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: The recent "virus" attack on computers linked to a major research
network may result in resistance to linking instututional computers
to networks, but these networks are important to scholars and
administrators. Illustration
Subjects: Computers & computer technology; Computer networks; Computer crime
Type: Commentary
Length: Long (31+ col inches)
88151032
Title: Computer Abuse: Chain Mail
Authors: Anonymous
Journal: Economist Vol: 309 Iss: 7577 Date: Nov 19, 1988 pp: 98-100
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
Abstract: Robert Morris used a "trap-door" in the Unix electronic mail program
to cause a chain reaction that brought thousands of computers to a
halt. Some lawyers feel that America's computer crime statutes
need to be examined.
Subjects: Computer crime; Laws & legislation; Computer programming &
languages; United States--US
Names: Morris, Robert
Type: Feature
Length: Medium (10-30 col inches)
88150295
Title: Computer 'Viruses' Are Seen as Hard to Stop on Open Academic
Networks
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A13, A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: The computer "virus" that recently infected research networks has
college administrators worried about whether a recurrence can be
prevented. Photograph
Subjects: Computers & computer technology; Colleges & universities; Computer
crime
Type: Feature
Length: Medium (10-30 col inches)
88150291
Title: Computer Infections Can Often Hide in Software and Then Start to
Spread
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Software viruses are hidden in programs, transferred to computer
memories when the programs are run, and then transferred again to
other disks or programs used in the infected computer.
Subjects: Computers & computer technology; Computer crime
Type: General Information
Length: Medium (10-30 col inches)
88150290
Title: A Professor Seeks a Universal Antidote
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: John Robert Cordani believes scientists can find the "theoretical
underpinnings" of computer viruses, and thus develop a universal
antidote.
Subjects: Computer crime
Names: Cordani, John Robert
Type: General Information
Length: Short (1-9 col inches)
88150289
Title: Chances of Catching Viruses Are Slim if Precautions Are Taken,
Experts Say
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 35 Iss: 12 Date: Nov 16, 1988
pp: A18
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Computer experts at Cornell University say that computer viruses may
not be entirely avoidable, but the chances of catching them are slim
if users take precautions.
Subjects: Computers & computer technology; Computer crime
Type: General Information
Length: Short (1-9 col inches)
88149867
Title: Rapid Spread of Virus Confirms Fear about Danger to Computers
Authors: Nordwall, Bruce D.
Journal: Aviation Week & Space Technology Vol: 129 Iss: 20
Date: Nov 14, 1988 pp: 44
Jrnl Code: AWS ISSN: 0005-2175 Jrnl Group: SciTech; Business
Abstract: The virus that infested several thousand computers in November 1988
confirms the growing concern about the security of computer
networks. The virus was reputedly spread by Cornell University
graduate student Robert T. Morris, Jr.
Subjects: Computer crime; Computers & computer technology; Security systems
Names: Morris, Robert T Jr
Type: News
Length: Medium (10-30 col inches)
88148517
Title: Worm Invades Computer Networks
Authors: Marshall, Eliot
Journal: Science Vol: 242 Iss: 4880 Date: Nov 11, 1988 pp: 855-856
Jrnl Code: GSCI ISSN: 0036-8075 Jrnl Group: SciTech; Academic
Abstract: Internet, the major computer network for researchers in the US and
overseas, was disrupted for two days last week due to the presence
of a computer virus. The virus and attempts by computer experts at
the University of California at Berkeley and the Massachusetts
Institute of Technology to cure it are examined.
Subjects: Computer crime; Computer networks; University of
California-Berkeley; Massachusetts Institute of Technology
Type: News
Length: Long (31+ col inches)
88144157
Title: The Assault on Data Security Is Getting a Lot of Attention
Authors: Manuel, Tom; Shandle, Jack; Naegele, Tobias
Journal: Electronics Vol: 61 Iss: 17 Date: Nov 1988 pp: 136-142
Jrnl Code: GELS ISSN: 0883-4989 Jrnl Group: SciTech
Abstract: There are two separate problems to be dealt with in safeguarding
data security: keeping outsiders off the system and preventing
disgruntled or criminally inclined employees from attacking it.
Restricting access is in some ways the hardest to accomplish.
Illustration; Photograph
Subjects: Computers & computer technology; Security systems; Computer crime;
Security personnel
Type: Feature
Length: Long (31+ col inches)
88131293
Title: Vengeance by 'Virus'
Authors: Lord, Lew; Stanglin, Douglas; Galloway, Joseph L.; Rosenberg,
Robert; Satchell, Michael; et al.
Journal: U.S. News & World Report Vol: 105 Iss: 13 Date: Oct 3, 1988
pp: 10
Jrnl Code: GUNW ISSN: 0041-5537 Jrnl Group: News
Abstract: Last week Donald Burleson, an insurance firm's director of computer
security, became the first person ever convicted of destroying
crucial data by implanting codes in computer programs. Burleson's
crime involved an early form of what are now known as "viruses."
Subjects: Computers & computer technology; Crime & criminals; Computer crime
Names: Burleson, Donald
Type: News
Length: Short (1-9 col inches)
88127257
Title: Viruses and Trojans Strike--But Very Rarely
Authors: Getts, Judy
Journal: PC World Vol: 6 Iss: 10 Date: Oct 1988 pp: 72-74
Jrnl Code: GPCW ISSN: 0737-8939 Jrnl Group: SciTech
Abstract: Much of the concern about computer viruses has been exaggerated.
Users who frequently download from bulletin boards or exchange
software via floppy disk are at higher risk. Steps users can take
to protect against viruses are outlined. Illustration
Subjects: Computer crime; Software
Type: General Information
Length: Medium (10-30 col inches)
88117361
Title: 'Virus Attacks'
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988
pp: 19pc, 40pc+
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: A contagion of about 40 computer viruses has prompted a concern
about high-tech hygiene for newspaper PC systems managers,
technicians and engineers.
Subjects: Newspapers; Personal computers; Computer crime
Type: Feature
Length: Long (31+ col inches)
88117355
Title: Avoiding Virus Infection
Authors: Fitzgerald, Mark
Journal: Editor & Publisher Vol: 121 Iss: 36 Date: Sep 3, 1988 pp: 41pc
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: Although the Long Island "Newsday" may seem to be vulnerable to
viruses because it operates the Newsday Electronic Bulletin Board,
there have been no problems so far.
Subjects: Newspapers; Computer crime
Companies: Newsday
Type: News
Length: Short (1-9 col inches)
88116399
Title: Tomorrow's Thieves
Authors: Albanese, Jay S.
Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 24-28
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
SciTech
Abstract: The advent of computers have provided the latest opportunity
resource for criminal misuse. Fraud will likely become the most
prevalent form of theft in the computer age. Photograph; Table
Subjects: Theft; Computer crime; Law enforcement
Type: Feature
Length: Long (31+ col inches)
88116380
Title: Computer Viruses: The "AIDS" of the Information Age?
Authors: Halal, William E.
Journal: Futurist Vol: 22 Iss: 5 Date: Sep 1988 pp: 60
Jrnl Code: FUS ISSN: 0016-3317 Jrnl Group: Socio/Environmental;
SciTech
Abstract: One solution to the problems posed by computer viruses is simply to
be careful when using computers and use safe computing procedures.
Subjects: Computer crime
Type: Commentary
Length: Medium (10-30 col inches)
88115135
Title: On Your Computer: Where's the Viral Epidemic?
Authors: Frailey, Fred W.; Goldwasser, Joan; Willenbrink, Kristin
Journal: Changing Times Vol: 42 Iss: 9 Date: Sep 1988 pp: 98-99
Jrnl Code: GCHT ISSN: 0009-143X Jrnl Group: Socio/Environmental;
Business
Abstract: Computer viruses are most commonly a shareware program that has been
downloaded from a bulletin board or software that someone passed on.
Subjects: Computer crime; Computers & computer technology
Type: General Information
Length: Medium (10-30 col inches)
88110258
Title: The New Office: An RX for Healthy Software
Authors: McCandless, Holloway
Journal: Working Woman Vol: 13 Iss: 9 Date: Sep 1988 pp: 33
Jrnl Code: WKW ISSN: 0145-5761 Jrnl Group: Lifestyles; Business
Abstract: One way companies can protect their software from computer viruses
is by keeping their system as isolated as possible.
Subjects: Computer crime; Software; Business & industry
Type: General Information
Length: Medium (10-30 col inches)
88106102
Title: Sick Computers
Authors: Welter, Therese R.
Journal: Industry Week Vol: 237 Iss: 4 Date: Aug 15, 1988 pp: 51-55
Jrnl Code: IW ISSN: 0039-0895 Jrnl Group: Business
Abstract: Computer viruses, a form of electronic sabotage, are occurring more
frequently nowadays. To help control them, a careful policy needs
to be established on the use of electronic bulletin boards and
public domain software. Illustration
Subjects: Computers & computer technology; Security systems; Computer crime
Type: Feature
Length: Medium (10-30 col inches)
88103547
Title: Ex-Employee Sentenced in Cheyney U. Grade Case
Authors: Anonymous
Journal: Chronicle of Higher Education Vol: 34 Iss: 47 Date: Aug 3, 1988
pp: A2
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Joseph J. Johnson, a former employee of Cheyney State University
has been sentenced to 3 to 23 months in prison for changing the
grades of students who paid him to do so.
Subjects: Students; Crime & criminals; Colleges & universities; Computer
crime; Cheyney University
Names: Johnson, Joseph J
Type: News
Length: Short (1-9 col inches)
88103071
Title: Is Your Computer Secure
Authors: Hafner, Katherine M.; Lewis, Geoff; Kelly, Kevin; Shao, Maria;
Hawkins, Chick; Angiolillo, Paul
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 64-72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: America's information systems are alarmingly vulnerable to high-tech
bandits, hackers, disgruntled workers and natural disasters.
Moreover, as PCs proliferate, the problem can only grow worse.
Computer crime is examined. Photograph; Illustration; Graph
Subjects: Computers & computer technology; Computer crime; High tech
industries
Type: Feature
Length: Long (31+ col inches)
88103070
Title: How Uncle Sam's Cloak-And-Data Boys Are Fighting Back
Authors: Port, Otis
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 72
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Penetration of government computers--particularly military
systems--is a deadly serious matter for the National Security Agency
and for counterintelligence agents at the FBI. Photograph
Subjects: Computer crime; National security; Classified information; National
Security Agency
Type: General Information
Length: Medium (10-30 col inches)
88103057
Title: A German Hackers' Club that Promotes Creative Chaos
Authors: Schares, Gail
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 71
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Hackers with the Hamburg, West Germany-based Chaos Computer Club use
their computing skills to increase public access to information
instead of sabotaging databases. Members believe that access to
electronic information cost too much in Germany. Photograph
Subjects: Computers & computer technology; Computer crime; Chaos Computer Club
Names: Fix, Bernd
Type: General Information
Length: Medium (10-30 col inches)
88103041
Title: Editorials: Treat Computer Data Like the Crown Jewels
Authors: Anonymous
Journal: Business Week Iss: 3063 Date: Aug 1, 1988 pp: 108
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: An editorial states that as the complex networks of computers built
by business and government assume more and more tasks, they produce
a whole new set of risks: computer viruses.
Subjects: Computers & computer technology; Computer crime
Type: Editorial
Length: Medium (10-30 col inches)
88101861
Title: Editorial License
Authors: Keizer, Gregg
Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 4
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: An editorial discusses the transmission and prevention of computer
viruses.
Subjects: Computers & computer technology; Computer crime
Type: Editorial
Length: Medium (10-30 col inches)
88101823
Title: Compute Specific--Off the Mac Wire
Authors: Aker, Sharon Zardetto
Journal: Compute! Vol: 10 Iss: 8 Date: Aug 1988 pp: 49
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: A computer virus has been showing up on Macintosh systems that
destroys files and can randomly erase data. The outbreaks have
centered around Dallas and Washington DC.
Subjects: Computer crime; Computers & computer technology; Personal computers
Type: News
Length: Short (1-9 col inches)
88092802
Title: Keeping Out of the Kaos Club
Authors: Anonymous
Journal: Economist Vol: 308 Iss: 7558 Date: Jul 9, 1988 pp: 78-79
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
Abstract: In response to ever-increasing occurrences of fraudsters, hackers
and viruses violating computer networks, the computer industry is
strengthening security measures for computer operating systems.
Photograph
Subjects: Computers & computer technology; Security systems; Computer crime
Type: Feature
Length: Long (31+ col inches)
88089057
Title: Impact
Authors: Thornburg, David D.
Journal: Compute! Vol: 10 Iss: 7 Date: Jul 1988 pp: 10
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: Viruses, small programs embedded inside other programs, have the
ability to replicate themselves and infect almost any program on a
disk, including parts of an operating system. Viruses are, at best,
nuisances and, at worst, they can damage computers.
Subjects: Computers & computer technology; Computer crime; Computer
programming & languages
Type: Commentary
Length: Medium (10-30 col inches)
88084661
Title: Beware: It's Virus Season
Authors: Honan, Patrick
Journal: Personal Computing Vol: 12 Iss: 7 Date: Jul 1988 pp: 36
Jrnl Code: PSC ISSN: 0192-5490 Jrnl Group: SciTech
Abstract: An anonymous company is working with Panda Systems to eliminate the
software virus, dubbed the Sunnyvale Slug, which Panda Systems has
removed from all but one of the company's computers. Photograph
Subjects: Computer crime; Computers & computer technology
Companies: Panda Systems
Type: News
Length: Short (1-9 col inches)
88075577
Title: Compute! Specific: Mac--Virus and Vaccine
Authors: Aker, Sharon Zardetto
Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 44
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: A computer virus is a little program that's usually buried in
another program; when the "host" program is run, your computer
system catches the virus. A specific Macintosh virus has surfaced,
but a cure has been found.
Subjects: Computer programming & languages; Computer crime
Type: News
Length: Short (1-9 col inches)
88075550
Title: News & Notes: New PC Virus Innoculation
Authors: Karnes, Clifton
Journal: Compute! Vol: 10 Iss: 6 Date: Jun 1988 pp: 81
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: Lasertrieve has announced a revolutionary new service and product
package called VirALARM. It is designed to protect a PC from
viruses by detecting infestation and alerting the user to their
existence early. Illustration
Subjects: Computers & computer technology; Computer crime
Companies: Lasertrieve
Type: News
Length: Medium (10-30 col inches)
88071494
Title: The Cost of Computer Crime
Authors: San Segundo, Gonzalo
Journal: World Press Review Vol: 35 Iss: 6 Date: Jun 1988 pp: 47
Jrnl Code: GWPR ISSN: 0195-8895 Jrnl Group: News
Abstract: The average net from a computer crime is about $220,000, while the
conventional bank robbery will bring in about $6,600. Only one in
100 cases of computer crimes is punished by law.
Subjects: Computer crime; White collar crime; Crime & criminals
Type: Commentary
Length: Medium (10-30 col inches)
88070487
Title: "The Chairman" and His Board
Authors: Bock, Gordon; McWhirter, William
Journal: Time Vol: 131 Iss: 22 Date: May 30, 1988 pp: 45
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Gabriel Taylor, a clerk at the First National Bank of Chicago,
electronically transferred funds to accounts under assumed names in
Vienna. If the scheme had succeeded, the conspirators would have
gotten $68.7 million. Photograph
Subjects: Computer crime; Crime & criminals; Embezzlement
Names: Taylor, Gabriel
Companies: First National Bank of Chicago
Type: Feature
Length: Medium (10-30 col inches)
88068234
Title: Computer 'Virus' Hits First U.S. Newspaper
Authors: Fitzgerald, Mark
Journal: Editor & Publisher Vol: 121 Iss: 21 Date: May 21, 1988 pp: 22
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: A computer virus has invaded the "Providence Journal-Bulletin,"
making it the first newspaper to succumb to the unauthorized codes
which secretly penetrate systems and wreak havoc.
Subjects: Newspapers; Computer crime
Companies: Providence Journal-Bulletin
Type: General Information
Length: Medium (10-30 col inches)
88067609
Title: Scientists Track Hacker to Find Flaws in Systems
Authors: Turner, Judith Axler
Journal: Chronicle of Higher Education Vol: 34 Iss: 36 Date: May 18, 1988
pp: A16
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: Scientists at the Lawrence Berkeley Laboratory tracked a West German
computer hacker electronically for almost a year as he tried to
enter 450 computers, and invaded 30, throughout the US.
Subjects: Computer crime; West Germany; Lawrence Berkeley Laboratory
Type: News
Length: Short (1-9 col inches)
88060581
Title: Compute! Specific: PC Virus
Authors: Karnes, Clifton
Journal: Compute! Vol: 10 Iss: 5 Date: May 1988 pp: 39
Jrnl Code: GCOE ISSN: 0194-357X Jrnl Group: SciTech
Abstract: Computer viruses insinuate themselves into an operating system, and
after a certain interval, do "something." So far, no viruses have
appeared on the IBM forums of CompuServe.
Subjects: Computers & computer technology; Software; Computer crime
Companies: IBM Corp
Type: News
Length: Short (1-9 col inches)
88053577
Title: When Bytes Bite Back
Authors: Anonymous
Journal: Economist Vol: 307 Iss: 7547 Date: Apr 23, 1988 pp: 68
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: News; Business
Abstract: Costly problems in commercial computer systems are caused by
fraudsters, hackers, disgruntled employees, accidents and human
errors. Few companies have adequate network security. Illustration
Subjects: Computer crime; Computers & computer technology
Type: Feature
Length: Short (1-9 col inches)
88030286
Title: Spawning a Computer "Virus"
Authors: White, Ron
Journal: 80 Micro Iss: 98 Date: Mar 1988 pp: 16-18
Jrnl Code: GEIM ISSN: 0744-7868 Jrnl Group: SciTech
Abstract: "Core wars" are battles between rival programs for control of a
theoretical computer's operating system. The game is designed for
programmers to test their abilities against one another, but the
principles behind these programs are similar to those in computer
"viruses." Photograph
Subjects: Computer programming & languages; Games; Computer crime
Type: General Information
Length: Long (31+ col inches)
88023137
Title: Companies Say Unauthorized Modifications of Systems to Permit Remote
Entry Could Jeopardize Vendor Support
Authors: Rosenberg, Jim
Journal: Editor & Publisher Vol: 121 Iss: 8 Date: Feb 20, 1988 pp: 35, 37
Jrnl Code: GEDP ISSN: 0013-094X Jrnl Group: Business
Abstract: Unauthorized entry into remote classified advertising through
newspapers' computers may jeopardize vendor support for the
advertising.
Subjects: Fraud; Computers & computer technology; Computer crime; Newspapers
Type: Feature
Length: Long (31+ col inches)
88016993
Title: The Online Underworld
Authors: Scrogan, Len
Journal: Classroom Computer Learning Vol: 8 Iss: 5 Date: Feb 1988
pp: 58-60
Jrnl Code: GCCL ISSN: 0746-4223 Jrnl Group: SciTech
Abstract: Every educator who introduces kids to telecommunications should also
be aware of the illegal activities which might occur. Teachers need
to communicate the ethics of online behavior to students.
Subjects: Education & schools; Computer crime; Computer programming &
languages; Ethics
Type: Feature
Length: Long (31+ col inches)
88013032
Title: Fighting Computer Crime
Authors: Szabo, Joan C.
Journal: Nation's Business Vol: 76 Iss: 2 Date: Feb 1988 pp: 14
Jrnl Code: NAB ISSN: 0028-047X Jrnl Group: Business
Abstract: A new booklet from the SBA, "A Small Business Guide to Computer
Security," gives guidelines on how small business can protect their
computer operations.
Subjects: Computer crime; Small business; Small Business Administration--SBA
Type: Commentary
Length: Short (1-9 col inches)
88011465
Title: Crime in the Computer Age
Authors: Wood, Chris
Journal: Maclean's Vol: 101 Iss: 5 Date: Jan 25, 1988 pp: 28-30
Jrnl Code: GMAC ISSN: 0024-9262 Jrnl Group: News
Abstract: A discussion of computer crimes. Photograph
Subjects: Crime & criminals; Computers & computer technology
Type: Feature
Length: Long (31+ col inches)
88010266
Title: Israeli University Offers Cure for Mysterious Computer 'Virus'
Authors: Watzman, Herbert M.
Journal: Chronicle of Higher Education Vol: 34 Iss: 19 Date: Jan 20, 1988
pp: A41
Jrnl Code: GCHE ISSN: 0009-5982 Jrnl Group: Academic
Abstract: A electronic 'virus' programmed to damage and destroy software has
been spreading across Israel. Israeli University is handing out a
cure for the 'virus' to those who need it.
Subjects: Computer crime; Israel; Israeli University
Type: News
Length: Medium (10-30 col inches)