+-------------------------------+ | * Hackers * | | (a short bibliography) | | newspaper articles | | | | 12/20/92 | | [MOLE04.TXT] | +-------------------------------+ Search request: FI TW HACKERS Search result: 67 citations in the Newspaper Articles database 1. Berton, Lee. Computer break-in. (computer 'hackers' Julio Fernandez and John Lee plead guilty to conspiring to break into corporate and university computer systems) (Legal Beat ) (Column) Wall Street Journal (Thu, Dec 3, 1992):B2(W), B11(E), col 4, 2 col in. Pub Type: Column. 2. U.S. says hackers tapped into data; Boeing and court said to be targets of two young men. (Costa George Katsaniotis and Charles Matthew Anderson charged with conspiracy to defraud the government) New York Times v142, sec1 (Sun, Nov 15, 1992):18(N), 40(N), col 6, 7 col in. 3. O'Harrow, Robert, Jr. Hackers allege harassment at mall. (Pentagon City guards stop meeting of computer hackers at shopping mall, Washington, D.C.) Washington Post v115 (Thu, Nov 12, 1992):A1, col 2, 25 col in. 4. Carley, William M. In-house hackers; rigging computers for fraud or malice is often an inside job; employees are more adept than outsiders at using and abusing the systems; discovering a 'logic bomb.'. Wall Street Journal (Thu, August 27, 1992):A1(W), A1(E), col 1, 40 col in. Abstract: Disgruntled or dishonest employees are emerging as big threats to corporate computer systems because they are more adept at misusing the systems than outside hackers. Some companies that have been victimized by in-house computer frauds report losses of more than $1 million, in addition to the cost of repair and disrupted operations. Even more devastating is a 'logic bomb', a program that can be timed to crash a system or plant a virus that can destroy data. Among the more notable cases of in-house computer frauds are that of AT&T's London office, where three employees were able to funnel company funds to themselves; General Dynamics Corp, where a disgruntled employee attempted to sabotage a program that was used for building missiles; and Charles Schwab and Co, where some employees used the company's computer system to trade cocaine. 5. Lewyn, Mark. Hackers scan airwaves for conversations. (eavesdropping on radio telephones) Washington Post v115 (Mon, August 17, 1992):A1, col 1, 28 col in. 6. Tabor, Mary B.W. Urban hackers charged in high-tech crime. New York Times v141 (Thu, July 23, 1992):A1(N), B1(L), col 2, 40 col in. Abstract: An increasing number of computer hackers are engaging in illegal or destructive activities. Two of the largest and most famous hacker groups, the Legion of Doom and the Masters of Deception (MOD), have broken into private networks and stolen or altered records pertaining to credit histories, telephone bills and corporate data. Hackers in the early 1980s explored computer networks and endorsed the right to search anywhere they could as long as they did not alter or abuse the information they acquired. Some recent hackers have sold information they found and have engaged in competitive battles to see which hacker group could infiltrate the most complex system. The MOD and Legion of Doom have participated in duels in the past few years. The MOD is made up of a racial diversity that is very different from the hacker groups in the 1980s. 7. Sessions, William S. FBI must keep up with wonks & hackers. (Federal Bureau of Investigation seeks to make it easier to tap computer systems) (Letter to the Editor) Wall Street Journal (Tue, August 4, 1992):A15(W), A15(E), col 2, 7 col in. Pub Type: Letter to the Editor. 8. Ramirez, Anthony. How hackers find the password. (methods computer criminals use to ascertain passwords enabling them to invade computer network systems) (National Pages) New York Times v141 (Thu, July 23, 1992):A12(N), B7(L), col 5, 7 col in. 9. Sugawara, Sandra. 5 indicted in computer infiltration. (computer hackers) Washington Post v115 (Thu, July 9, 1992):D9, col 6, 17 col in. 10. 5 New York computer 'hackers' indicted. Los Angeles Times v111 (Thu, July 9, 1992):D3, col 4, 12 col in. 11. Ramirez, Anthony. A wiretap of computers leads to arrest of hackers. (in New York) New York Times v141, sec4 (Sun, July 12, 1992):E2(N), E2(L), col 2, 4 col in. 12. Zachary, G. Pascal. Tech shop: 'theocracy of hackers' rules Autodesk Inc., a strangely run firm; can the latest CEO survive a cabal of programmers who send 'flame mail'?; a most unusual interview. (interview with Autodesk founder... Wall Street Journal (Thu, May 28, 1992):A1(W), A1(E), col 6, 68 col in. Pub Type: Company Profile. Abstract: Autodesk Inc, the world's sixth largest microcomputer software company, is an unusual company that has been described as a 'theocracy of hackers.' Its reclusive founder, John Walker, who gave up management of the firm in 1986 to resume programming, is as eccentric as his Core members, his elite group of programmers. Walker and Core members are unpredictable, given to outbursts displayed through 'flame mail,' the stinging electronic messages they send one another and other executives. Walker is unconventional, giving outside programmer Michael Riddle an unusually generous $10-million royalty for his AutoCad software which became Autodesk's hit product. Walker, who still holds less than four percent or about 869,000 shares of the company, valued at $30 million, returned to company management in 1992 as technology manager for three months to help select a new CEO. In April 1992, Carol Bartz was named the new chairperson and CEO. Income and sales from 1986 to 1990 did not seem affected by the internal conflicts. They rose about five-fold, although not as good as the earlier years when earnings would sometimes grow ten-fold over a certain period. But in 4th qtr FY 1991, earnings dropped about 25 percent below targets. Autodesk's future seems a bit brighter, with a couple of new products, the Windows version of AutoCad and the scientific software HyperChem, out and 25 more to be released at the end of FY 1992. 13. Authorities uncover network of hackers in credit card fraud. (San Diego) Wall Street Journal (Mon, April 20, 1992):A7B(W), A5C(E), col 1, 5 col in. 14. A nationwide computer-fraud ring by young hackers is broken up. (San Diego police breaks network) New York Times v141, secA (Sun, April 19, 1992):A12(N), A25(L), col 1, 9 col in. Abstract: San Diego law enforcement officials claim to have cracked a nationwide network of young computer hackers who have been able to make fraudulent credit card purchases and break into the electronic files of at least one credit-rating agency. Between 1989 and 1992, as many as 1,000 members of the informal network have exchanged information on how to make fraudulent credit card charges and break computer security codes. San Diego police stumbled upon the network while investigating a local case of credit card fraud. Two suspects have been apprehended in Ohio and related computer equipment seized in New York. MasterCard International lost $381 million from credit card fraud worldwide in 1991. Visa International lost $259 million in 1989 for the same reason. 15. Hackers accused of credit card fraud. Los Angeles Times v111 (Sat, April 18, 1992):B6, col 3, 3 col in. 16. Duke, Lynne. The white stuff: a theory of race. (author Andrew Hacker's "Two Nations, Black and White, Separate, Hostile, Unequal") Washington Post v115 (Tue, April 14, 1992):B1, col 5, 50 col in. 17. Wilke, John R. New device could lock the door on hackers. (Northern Telecom tests device to protect key computer and office phone lines) (Column) Wall Street Journal (Mon, March 23, 1992):B1(W), B1(E), col 2, 5 col in. Pub Type: Column. 18. Anderson, Jack; Van Atta, Dale. Computer hackers still playing havoc. (column) Washington Post v114 (Mon, August 12, 1991):B12, col 4, 10 col in. Pub Type: Column. 19. Mosley, Walter. Cyberpunk: Outlaws and Hackers on the Computer Frontier. (book reviews) New York Times Book Review (Sun, August 11, 1991):15, col 1, 18 col in. Pub Type: Review. 20. Hafner, Katie; Markoff, John. The day the computers crashed because of Daemon possession (excerpt from "Cyberpunk: Outlaws and Hackers") Los Angeles Times v110 (Sun, August 4, 1991):M6, col 1, 24 col in. 21. Wilke, John R. Start-up claims to invent defense against hackers. (Gatekeeper Telecommunications Systems Inc.) Wall Street Journal (Thu, June 20, 1991):B4(W), B3(E), col 1, 8 col in. 22. Bromberg, Craig. In defense of hackers: computer buffs use modems, money and a new foundation to fight government prosecution. (Electronic Frontier Foundation) New York Times Magazine v140 (Sun, April 21, 1991):44, col 1, 79 col in. Pub Type: Biography. 23. Keller, John J. Hackers open voice-mail door to others' phone lines. Wall Street Journal (Fri, March 15, 1991):B1(W), B1(E), col 3, 23 col in. Abstract: The current trend among computer hackers is to access corporate electronic mail systems and use the office phones to make long distance telephone calls. This illegal practise is under investigation by both the Secret Service and the Federal Bureau of Investigation. Current voice-mail systems have relatively simple access codes which are easy to crack. Some hackers have even changed the corporate passwords, rendering the e-mail system useless to company employees trying to access their messages. The long distance companies' clamp down on their own system abuses has led hackers to this new field of opportunity. Analysts believe that the only way for a corporation to avoid the abuse is to improve phone system security. 24. A new place for getting in some cuts. (Hackers, Hitters, and Hoops multisport complex, New York, New York) New York Times v140 (Mon, Feb 4, 1991):C10(L), col 1, 10 col in. 25. Schmedel, Scott R. Tax hackers drive sales of computer tax programs up sharply, publishers say. (software programs to figure income taxes) (column) Wall Street Journal (Wed, Jan 30, 1991):A1(W), A1(E), col 5, 3 col in. Pub Type: Column. 26. Sudetec, Chuck. Bulgarians linked to computer virus; young hackers said to infect programs in the U.S. and several other nations. (International Pages) New York Times v140 (Fri, Dec 21, 1990):A9(N), A9(L), col 1, 18 col in. 27. Phone theft at NASA. (computer hackers steal telephone service from National Aeronautics and Space Administration's Johnson Space Center) New York Times v140 (Thu, Dec 6, 1990):D2(L), col 4, 5 col in. 28. Suplee, Curt; Richards, Evelyn. Computers vulnerable, panel warns; networks susceptible to hackers, accidents. (National Research Council calls for new standards for hardware and software safety and security) Washington Post v114 (Thu, Dec 6, 1990):A1, col 1, 24 col in. 29. Lewis, Peter H. Can invaders be stopped but civil liberties upheld?; Industry executives have joined to stimulate debate over computer users' rights. (computer hackers, The Executive Computer) New York Times v139 (Sun, Sept 9, 1990):F12(N), F12(L), col 1, 21 col in. Abstract: While computer crime is increasing, many are complaining that the government's response to it has, in many cases, been overly harsh and has in some cases violated civil liberties. To help defend users who have been unfairly abused by prosecuting agencies, a group called the Electronic Frontier Foundation has been established by several prominent computer industry personalities, including founders of Apple Computer and Lotus Development. The foundation's main complaint is that while most hackers are relatively harmless explorers, they are treated by the Secret Service and other investigators as though they were drug smugglers. The complaints point out that laws and law enforcement agencies have fallen behind the technology they are trying to police. 30. Wilke, John R. Open sesame; in the arcane culture of computer hackers, few doors stay closed; Frank Darden easily broke into BellSouth's network, trading tips with others; entering the legion of doom. Wall Street Journal (Wed, August 22, 1990):A1(W), A1(E), col 1, 54 col in. Abstract: Computer hackers are causing increased concern among banks, credit bureaus, telephone companies and other businesses that rely on computers connected by telephone lines. Any company with a computer connected to a phone is at risk of being accessed by hackers, according to observers. Frank Darden is one such hacker who was arrested by Secret Service agents and charged with felony counts of conspiracy and wire fraud for breaking into BellSouth Corp's computer. Darden claims that getting into BellSouth's computer was relatively easy, and that he did it only for the challenge it provided. 31. Zachary, G. Pascal. Group to defend civil rights of hackers founded by computer industry pioneer. (Mitchell Kapor) Wall Street Journal (Wed, July 11, 1990):B4 pB4, col 1, 16 col in. Abstract: Mitchell Kapor, creator of Lotus 1-2-3, and Steve Wozniak, Apple cofounder, inaugurate a new group, the Electronic Frontier Foundation, aiming to provide legal aid for computer hackers facing criminal prosecution and to research legal aspects of computer communications. Kapor says the government's prosecution of hackers thwarts creativity and endangers the rights of computer users. Opponents say many hackers simply exploit holes in compute security in order to steal. 32. Schatz, Willie. Foundation to defend PC users; Lotus inventor: group will fight for rights. (Mitchell Kapor founds Electronic Frontier Foundation to defend civil rights of computer hackers who are targets of Secret Service probe) Washington Post v113 (Wed, July 11, 1990):B9, col 1, 16 col in. 33. Computer hackers plead guilty in case involving BellSouth. (Franklin E. Darden Jr., Adam E. Grant, Robert J. Riggs, computer fraud) Wall Street Journal (Tue, July 10, 1990):B4, col 4, 6 col in. 34. Quimpo, Margie; Schatz, Willie. 3 computer hackers plead guilty; 'legion of doom' members charged with stealing BellSouth codes. (Adam E. Grant, Franklin Darden Jr. and Robert J. Riggs) Washington Post v113 (Tue, July 10, 1990):D4, col 4, 11 col in. 35. Schatz, Willie. The terminal men: crackdown on the 'Legion of Doom' ends an era for computer hackers. Washington Post v113 (Sun, June 24, 1990):H1, col 3, 44 col in. 36. U.S. accepts hacker's sentence. (Robert Tappan Morris convicted in computer virus case) (National Pages) New York Times v139 (Sat, June 2, 1990):10(N), 10(L), col 5, 6 col in. 37. Schatz, Willie. Software pioneer eyes legal aid for hackers. (Mitchell Kapor) Washington Post v113 (Thu, May 31, 1990):E1, col 2, 18 col in. 38. Hackers, beware. (Robert T. Morris, Jr. sentenced for computer fraud) (editorial) Washington Post v113 (Wed, May 9, 1990):A26, col 1, 8 col in. Pub Type: Editorial. 39. Specter, Michael. Revenge on the nerds; sure, jail our hackers - who needs software stars anyway? (Robert Tappan Morris) (column) Washington Post v113 (Sun, Feb 11, 1990):C5, col 1, 26 col in. Pub Type: Column. 40. Burton, Thomas M. Four charged with scheme against phones. (computer hackers disrupting 911 emergency phone service) Wall Street Journal (Wed, Feb 7, 1990):B5(W), B4(E), col 1, 5 col in. 41. Stipp, David. Virus verdict likely to have limited impact. (Robert T. Morris' computer virus conviction not likely to deter computer hackers) Wall Street Journal (Wed, Jan 24, 1990):B1(W), B1(E), col 6, 22 col in. Abstract: In the wake of Robert T. Morris's conviction for perpetrating a disruptive computer virus, experts say little has been accomplished in the way of deterrence or legal landmarks. The conviction is the first under federal law, and prosecutors say it is important because it demonstrates that the law works when it is enforced. Others say the conviction should encourage district attorneys to take on similar cases in the future as tougher new laws are introduced. However, other experts feel the conviction will do little to deter hackers, who seem to be motivated by the challenge and danger involved in cracking security systems. These experts feel that the renewed attention to security issues on systems such as Internet caused by Morris's virus will help prevent future break-ins. 42. Burgess, John. Hacker's case may shape computer security law. (Robert T. Morris, Jr.) Washington Post v113 (Tue, Jan 9, 1990):A4, col 1, 38 col in. 43. Sims, Calvin. Phone-call thieves hitting corporations' switchboards. (computer hackers costing companies millions) New York Times v139 (Mon, Dec 11, 1989):C1(N), D1(L), col 1, 24 col in. Abstract: Computer hackers are increasingly using long distance access codes stolen from corporations to make free phone calls, costing corporation hundreds of millions of dollars a year. The codes are obtained using software on a home computer. The software tries various combinations of four digits, repeatedly calling a corporation's switchboard until an access code works. The codes are then posted on hackers' electronic bulletin boards. Long distance carriers suggest several steps to preventing this form of computer crime. Companies should make access codes longer, cancel access codes of former employees immediately, alert switchboard operators to the various schemes, block international calls except to countries where legitimate business is conducted and monitor daily phone records closely. 44. Garfinkel, Simson L. Lax security lets hackers attack: despite alarms about 'viruses' and 'worms,' few networks take steps to prevent invasions. (computers) Christian Science Monitor v81, n223 (Fri, Oct 13, 1989):12, col 1, 33 col in. 45. Calling all hackers: NTT issues security challenge. (Nippon Telegraph & Telephone Corp. issues challenge to hackers to break into its computer system) Wall Street Journal (Thu, August 31, 1989):B6(E), col 3, 2 col in. 46. McCartney, Robert J. Computer hackers face spy charges; W. Germany indicts 3 accused of selling data to Soviet KGB agent. Washington Post v112 (Thu, August 17, 1989):A32, col 4, 18 col in. 47. Hackers penetrated EEC computer files two times in April. (European Economic Community) Wall Street Journal (Mon, May 15, 1989):A7A(W), col 2, 5 col in. 48. Marshall, Tyler. 'Hackers' add new twist to Bonn's troubles with spies. (espionage centered on computer hackers) Los Angeles Times v108, secI (Sun, March 5, 1989):7, col 1, 20 col in. 49. Dye, Lee. U.S. scientist foiled 'hackers' spy ring. (computer hackers access secret U.S. data) Los Angeles Times v108, secI (Sat, March 4, 1989):4, col 1, 30 col in. 50. Markoff, John. Bonn suspect denies espionage was goal of computer intrusions. (West German computer hackers accused of spying for Soviets, theft of US military computer data) (International Pages) New York Times v138 (Sat, March 4, 1989):3(N), 3(L), col 1, 16 col in. 51. McCartney, Robert J. German computer hackers held for spying for Soviets; KGB said to gain access to Pentagon data. (Department of Defense) Washington Post v112 (Fri, March 3, 1989):A1, col 1, 28 col in. 52. Bagai, Eric. Give hackers honorable mention; most computer hobbyists are content to tinker. (column) Los Angeles Times v108, secII (Sat, Jan 21, 1989):8, col 4, 19 col in. Pub Type: Column. 53. Richards, Evelyn. As U.S.-Soviet computer links grow, so do connections between hackers. Washington Post v112 (Mon, Jan 2, 1989):WB6, col 1, 7 col in. 54. Clayton, Mark. Hackers expand their illegal skills to voice mail. Christian Science Monitor v81, n22 (Tue, Dec 27, 1988):14, col 3, 30 col in. 55. Stipp, David; Davis, Bob. New computer break-ins suggest 'virus' may have spurred hackers. (computer virus) Wall Street Journal (Fri, Dec 2, 1988):B4(W), B2(E), col 3, 15 col in. 56. Markoff, John. Cyberpunks seek thrills in computerized mischief. (computer hackers) New York Times v138 (Sat, Nov 26, 1988):1(N), 1(L), col 1, 31 col in. 57. Sanger, David E. In Japan, land of computers, the first stirrings of hackers. New York Times v138 (Sat, Nov 19, 1988):1(N), 4(L), col 4, 22 col in. 58. Sanger, David E. In Japan, land of computers, the first stirrings of hackers. New York Times v138, n47,694 (Nov 19, 1988):1 (2 pages). Abstract: Japanese high-tech greets the first signs of hacker activity with mixed feelings. The Japanese, generally speaking, are pleased that their nation's half a million programmers are well behaved, rarely breaking into computer systems as programmers in America so often do. But the Japanese are sometimes envious of an imaginative creativity that such computer crime seems to signify. This year, 1988, a primitive computer virus struck a 48,000-user personal-computer network run by NEC; another virus struck at Fujitsu, which makes mainframes; and a Japanese hacker has been arrested for breaking a Tokyo bank's automatic teller machine code, accessing the bank's funds. These cases are unusual because the viruses were homegrown in Japan, not imported. Some Japanese computer experts point out, with pride, that hacking is a problem that afflicts societies that have mastered the computer. 59. Wysocki, Bernard, Jr. Cracking the hackers; police in Silicon Valley deploy high-tech cops for high-tech criminals. Wall Street Journal (Mon, Nov 14, 1988):R48(W), col 3, 25 col in. 60. Gillette, Robert. Computers stumped by ethics code. (computer hackers) Los Angeles Times v107, secI (Sat, Nov 12, 1988):1, col 1, 56 col in. 61. Klein, Frederick C. Tennis: hackers' helper. (Paul Whiteneir, Jr. patents StrokeMaker to aid tennis players) Wall Street Journal (Fri, Nov 11, 1988):A13(W), A13(E), col 1, 20 col in. 62. Specter, Michael. Hackers' easy ride: MIT students fear that in wake of 'virus,' files will be closed, creativity stifled. (Massachusetts Institute of Technology's Artificial Intelligence Laboratory) Washington Post v111 (Fri, Nov 11, 1988):A1, col 1, 36 col in. 63. Burgess, John. Hackers find new way to tap long-distance phone lines: illegal users ring up big bills for companies by gaining access to message systems. Washington Post v111 (Thu, Oct 6, 1988):F1, col 3, 13 col in. 64. Keppel, Bruce. Telecommunications expert warn of hacker's growing sophistication. (computer hackers) Los Angeles Times v107, secIV (Sat, July 23, 1988):2, col 1, 18 col in. 65. Markoff, John; Pollock, Andrew. Computer 'hackers' seen as peril to security of the phone system. New York Times v137 (Fri, July 22, 1988):1(N), A1(L), col 5, 40 col in. 66. Markoff, John; Pollack, Andrew. Computer 'hackers' seen as peril to security of the phone system. New York Times v137, n47,574 (July 22, 1988):1 (2 pages). Abstract: Sophisticated personal computer users cause industry observers and law enforcement officials to question the security of the nation's telephone system. Switches that route calls are, now, mostly electronic; phone systems, now, are like large computers. Such systems are vulnerable because computers that control switches can be accessed from outside - phone companies purposely designed them this way, for convenience. For example, phone companies designed ways for technicians in the field to dial into circuits in central offices; and a capability to eavesdrop is included, so that an operator can check on a line's status - and according to one anonymous source, so that law enforcement personnel can easily wiretap. Intruders with the proper commands can violate a system's integrity in various ways: eavesdropping; altering or destroying data; stealing facsimile documents; rerouting calls; or changing bills. 67. Hackers raid U.S. lab file. (computer raiders at Jet Propulsion Laboratory) New York Times v137 (Sat, June 18, 1988):29(N), 45(L), col 3, 4 col in. NEWS-> X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X Another file downloaded from: NIRVANAnet(tm) &TOTSE 510/935-5845 Walnut Creek, CA Taipan Enigma Burn This Flag 408/363-9766 San Jose, CA Zardoz realitycheck 415/666-0339 San Francisco, CA Poindexter Fortran Governed Anarchy 510/226-6656 Fremont, CA Eightball New Dork Sublime 805/823-1346 Tehachapi, CA Biffnix Lies Unlimited 801/278-2699 Salt Lake City, UT Mick Freen Atomic Books 410/669-4179 Baltimore, MD Baywolf Sea of Noise 203/886-1441 Norwich, CT Mr. Noise The Dojo 713/997-6351 Pearland, TX Yojimbo Frayed Ends of Sanity 503/965-6747 Cloverdale, OR Flatline The Ether Room 510/228-1146 Martinez, CA Tiny Little Super Guy Hacker Heaven 860/456-9266 Lebanon, CT The Visionary The Shaven Yak 510/672-6570 Clayton, CA Magic Man El Observador 408/372-9054 Salinas, CA El Observador Cool Beans! 415/648-7865 San Francisco, CA G.A. Ellsworth DUSK Til Dawn 604/746-5383 Cowichan Bay, BC Cyber Trollis The Great Abyss 510/482-5813 Oakland, CA Keymaster "Raw Data for Raw Nerves" X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X