Copy Link
Add to Bookmark
Report

MOLE 04

eZine's profile picture
Published in 
MOLE
 · 28 Dec 2019

  


+-------------------------------+
| * Hackers * |
| (a short bibliography) |
| newspaper articles |
| |
| 12/20/92 |
| [MOLE04.TXT] |
+-------------------------------+

Search request: FI TW HACKERS
Search result: 67 citations in the Newspaper Articles database


1. Berton, Lee.
Computer break-in. (computer 'hackers' Julio Fernandez and John Lee plead
guilty to conspiring to break into corporate and university computer
systems) (Legal Beat ) (Column)
Wall Street Journal (Thu, Dec 3, 1992):B2(W), B11(E), col 4, 2 col in.
Pub Type: Column.

2. U.S. says hackers tapped into data; Boeing and court said to be targets of
two young men. (Costa George Katsaniotis and Charles Matthew Anderson
charged with conspiracy to defraud the government)
New York Times v142, sec1 (Sun, Nov 15, 1992):18(N), 40(N), col 6, 7 col
in.

3. O'Harrow, Robert, Jr.
Hackers allege harassment at mall. (Pentagon City guards stop meeting of
computer hackers at shopping mall, Washington, D.C.)
Washington Post v115 (Thu, Nov 12, 1992):A1, col 2, 25 col in.

4. Carley, William M.
In-house hackers; rigging computers for fraud or malice is often an inside
job; employees are more adept than outsiders at using and abusing the
systems; discovering a 'logic bomb.'.
Wall Street Journal (Thu, August 27, 1992):A1(W), A1(E), col 1, 40 col in.

Abstract:
Disgruntled or dishonest employees are emerging as big threats to corporate
computer systems because they are more adept at misusing the systems than
outside hackers. Some companies that have been victimized by in-house
computer frauds report losses of more than $1 million, in addition to the
cost of repair and disrupted operations. Even more devastating is a 'logic
bomb', a program that can be timed to crash a system or plant a virus that
can destroy data. Among the more notable cases of in-house computer frauds
are that of AT&T's London office, where three employees were able to funnel
company funds to themselves; General Dynamics Corp, where a disgruntled
employee attempted to sabotage a program that was used for building
missiles; and Charles Schwab and Co, where some employees used the
company's computer system to trade cocaine.

5. Lewyn, Mark.
Hackers scan airwaves for conversations. (eavesdropping on radio
telephones)
Washington Post v115 (Mon, August 17, 1992):A1, col 1, 28 col in.

6. Tabor, Mary B.W.
Urban hackers charged in high-tech crime.
New York Times v141 (Thu, July 23, 1992):A1(N), B1(L), col 2, 40 col in.

Abstract:
An increasing number of computer hackers are engaging in illegal or
destructive activities. Two of the largest and most famous hacker groups,
the Legion of Doom and the Masters of Deception (MOD), have broken into
private networks and stolen or altered records pertaining to credit
histories, telephone bills and corporate data. Hackers in the early 1980s
explored computer networks and endorsed the right to search anywhere they
could as long as they did not alter or abuse the information they acquired.
Some recent hackers have sold information they found and have engaged in
competitive battles to see which hacker group could infiltrate the most
complex system. The MOD and Legion of Doom have participated in duels in
the past few years. The MOD is made up of a racial diversity that is very
different from the hacker groups in the 1980s.

7. Sessions, William S.
FBI must keep up with wonks & hackers. (Federal Bureau of Investigation
seeks to make it easier to tap computer systems) (Letter to the Editor)
Wall Street Journal (Tue, August 4, 1992):A15(W), A15(E), col 2, 7 col in.
Pub Type: Letter to the Editor.

8. Ramirez, Anthony.
How hackers find the password. (methods computer criminals use to
ascertain passwords enabling them to invade computer network systems)
(National Pages)
New York Times v141 (Thu, July 23, 1992):A12(N), B7(L), col 5, 7 col in.

9. Sugawara, Sandra.
5 indicted in computer infiltration. (computer hackers)
Washington Post v115 (Thu, July 9, 1992):D9, col 6, 17 col in.

10. 5 New York computer 'hackers' indicted.
Los Angeles Times v111 (Thu, July 9, 1992):D3, col 4, 12 col in.

11. Ramirez, Anthony.
A wiretap of computers leads to arrest of hackers. (in New York)
New York Times v141, sec4 (Sun, July 12, 1992):E2(N), E2(L), col 2, 4 col
in.

12. Zachary, G. Pascal.
Tech shop: 'theocracy of hackers' rules Autodesk Inc., a strangely run
firm; can the latest CEO survive a cabal of programmers who send 'flame
mail'?; a most unusual interview. (interview with Autodesk founder...
Wall Street Journal (Thu, May 28, 1992):A1(W), A1(E), col 6, 68 col in.
Pub Type: Company Profile.

Abstract:
Autodesk Inc, the world's sixth largest microcomputer software company, is
an unusual company that has been described as a 'theocracy of hackers.' Its
reclusive founder, John Walker, who gave up management of the firm in 1986
to resume programming, is as eccentric as his Core members, his elite group
of programmers. Walker and Core members are unpredictable, given to
outbursts displayed through 'flame mail,' the stinging electronic messages
they send one another and other executives. Walker is unconventional,
giving outside programmer Michael Riddle an unusually generous $10-million
royalty for his AutoCad software which became Autodesk's hit product.
Walker, who still holds less than four percent or about 869,000 shares of
the company, valued at $30 million, returned to company management in 1992
as technology manager for three months to help select a new CEO. In April
1992, Carol Bartz was named the new chairperson and CEO. Income and sales
from 1986 to 1990 did not seem affected by the internal conflicts. They
rose about five-fold, although not as good as the earlier years when
earnings would sometimes grow ten-fold over a certain period. But in 4th
qtr FY 1991, earnings dropped about 25 percent below targets. Autodesk's
future seems a bit brighter, with a couple of new products, the Windows
version of AutoCad and the scientific software HyperChem, out and 25 more
to be released at the end of FY 1992.

13. Authorities uncover network of hackers in credit card fraud. (San Diego)
Wall Street Journal (Mon, April 20, 1992):A7B(W), A5C(E), col 1, 5 col
in.

14. A nationwide computer-fraud ring by young hackers is broken up. (San Diego
police breaks network)
New York Times v141, secA (Sun, April 19, 1992):A12(N), A25(L), col 1, 9
col in.

Abstract:
San Diego law enforcement officials claim to have cracked a nationwide
network of young computer hackers who have been able to make fraudulent
credit card purchases and break into the electronic files of at least one
credit-rating agency. Between 1989 and 1992, as many as 1,000 members of
the informal network have exchanged information on how to make fraudulent
credit card charges and break computer security codes. San Diego police
stumbled upon the network while investigating a local case of credit card
fraud. Two suspects have been apprehended in Ohio and related computer
equipment seized in New York. MasterCard International lost $381 million
from credit card fraud worldwide in 1991. Visa International lost $259
million in 1989 for the same reason.

15. Hackers accused of credit card fraud.
Los Angeles Times v111 (Sat, April 18, 1992):B6, col 3, 3 col in.

16. Duke, Lynne.
The white stuff: a theory of race. (author Andrew Hacker's "Two Nations,
Black and White, Separate, Hostile, Unequal")
Washington Post v115 (Tue, April 14, 1992):B1, col 5, 50 col in.

17. Wilke, John R.
New device could lock the door on hackers. (Northern Telecom tests device
to protect key computer and office phone lines) (Column)
Wall Street Journal (Mon, March 23, 1992):B1(W), B1(E), col 2, 5 col in.
Pub Type: Column.

18. Anderson, Jack; Van Atta, Dale.
Computer hackers still playing havoc. (column)
Washington Post v114 (Mon, August 12, 1991):B12, col 4, 10 col in.
Pub Type: Column.

19. Mosley, Walter.
Cyberpunk: Outlaws and Hackers on the Computer Frontier. (book reviews)
New York Times Book Review (Sun, August 11, 1991):15, col 1, 18 col in.
Pub Type: Review.

20. Hafner, Katie; Markoff, John.
The day the computers crashed because of Daemon possession (excerpt from
"Cyberpunk: Outlaws and Hackers")
Los Angeles Times v110 (Sun, August 4, 1991):M6, col 1, 24 col in.

21. Wilke, John R.
Start-up claims to invent defense against hackers. (Gatekeeper
Telecommunications Systems Inc.)
Wall Street Journal (Thu, June 20, 1991):B4(W), B3(E), col 1, 8 col in.

22. Bromberg, Craig.
In defense of hackers: computer buffs use modems, money and a new
foundation to fight government prosecution. (Electronic Frontier
Foundation)
New York Times Magazine v140 (Sun, April 21, 1991):44, col 1, 79 col in.
Pub Type: Biography.

23. Keller, John J.
Hackers open voice-mail door to others' phone lines.
Wall Street Journal (Fri, March 15, 1991):B1(W), B1(E), col 3, 23 col in.

Abstract:
The current trend among computer hackers is to access corporate electronic
mail systems and use the office phones to make long distance telephone
calls. This illegal practise is under investigation by both the Secret
Service and the Federal Bureau of Investigation. Current voice-mail systems
have relatively simple access codes which are easy to crack. Some hackers
have even changed the corporate passwords, rendering the e-mail system
useless to company employees trying to access their messages. The long
distance companies' clamp down on their own system abuses has led hackers
to this new field of opportunity. Analysts believe that the only way for a
corporation to avoid the abuse is to improve phone system security.

24. A new place for getting in some cuts. (Hackers, Hitters, and Hoops
multisport complex, New York, New York)
New York Times v140 (Mon, Feb 4, 1991):C10(L), col 1, 10 col in.

25. Schmedel, Scott R.
Tax hackers drive sales of computer tax programs up sharply, publishers
say. (software programs to figure income taxes) (column)
Wall Street Journal (Wed, Jan 30, 1991):A1(W), A1(E), col 5, 3 col in.
Pub Type: Column.

26. Sudetec, Chuck.
Bulgarians linked to computer virus; young hackers said to infect
programs in the U.S. and several other nations. (International Pages)
New York Times v140 (Fri, Dec 21, 1990):A9(N), A9(L), col 1, 18 col in.

27. Phone theft at NASA. (computer hackers steal telephone service from
National Aeronautics and Space Administration's Johnson Space Center)
New York Times v140 (Thu, Dec 6, 1990):D2(L), col 4, 5 col in.

28. Suplee, Curt; Richards, Evelyn.
Computers vulnerable, panel warns; networks susceptible to hackers,
accidents. (National Research Council calls for new standards for hardware
and software safety and security)
Washington Post v114 (Thu, Dec 6, 1990):A1, col 1, 24 col in.

29. Lewis, Peter H.
Can invaders be stopped but civil liberties upheld?; Industry executives
have joined to stimulate debate over computer users' rights. (computer
hackers, The Executive Computer)
New York Times v139 (Sun, Sept 9, 1990):F12(N), F12(L), col 1, 21 col in.

Abstract:
While computer crime is increasing, many are complaining that the
government's response to it has, in many cases, been overly harsh and has
in some cases violated civil liberties. To help defend users who have been
unfairly abused by prosecuting agencies, a group called the Electronic
Frontier Foundation has been established by several prominent computer
industry personalities, including founders of Apple Computer and Lotus
Development. The foundation's main complaint is that while most hackers are
relatively harmless explorers, they are treated by the Secret Service and
other investigators as though they were drug smugglers. The complaints
point out that laws and law enforcement agencies have fallen behind the
technology they are trying to police.

30. Wilke, John R.
Open sesame; in the arcane culture of computer hackers, few doors stay
closed; Frank Darden easily broke into BellSouth's network, trading tips
with others; entering the legion of doom.
Wall Street Journal (Wed, August 22, 1990):A1(W), A1(E), col 1, 54 col
in.

Abstract:
Computer hackers are causing increased concern among banks, credit bureaus,
telephone companies and other businesses that rely on computers connected
by telephone lines. Any company with a computer connected to a phone is at
risk of being accessed by hackers, according to observers. Frank Darden is
one such hacker who was arrested by Secret Service agents and charged with
felony counts of conspiracy and wire fraud for breaking into BellSouth
Corp's computer. Darden claims that getting into BellSouth's computer was
relatively easy, and that he did it only for the challenge it provided.

31. Zachary, G. Pascal.
Group to defend civil rights of hackers founded by computer industry
pioneer. (Mitchell Kapor)
Wall Street Journal (Wed, July 11, 1990):B4 pB4, col 1, 16 col in.

Abstract:
Mitchell Kapor, creator of Lotus 1-2-3, and Steve Wozniak, Apple cofounder,
inaugurate a new group, the Electronic Frontier Foundation, aiming to
provide legal aid for computer hackers facing criminal prosecution and to
research legal aspects of computer communications. Kapor says the
government's prosecution of hackers thwarts creativity and endangers the
rights of computer users. Opponents say many hackers simply exploit holes
in compute security in order to steal.

32. Schatz, Willie.
Foundation to defend PC users; Lotus inventor: group will fight for
rights. (Mitchell Kapor founds Electronic Frontier Foundation to defend
civil rights of computer hackers who are targets of Secret Service probe)
Washington Post v113 (Wed, July 11, 1990):B9, col 1, 16 col in.

33. Computer hackers plead guilty in case involving BellSouth. (Franklin E.
Darden Jr., Adam E. Grant, Robert J. Riggs, computer fraud)
Wall Street Journal (Tue, July 10, 1990):B4, col 4, 6 col in.

34. Quimpo, Margie; Schatz, Willie.
3 computer hackers plead guilty; 'legion of doom' members charged with
stealing BellSouth codes. (Adam E. Grant, Franklin Darden Jr. and Robert J.
Riggs)
Washington Post v113 (Tue, July 10, 1990):D4, col 4, 11 col in.

35. Schatz, Willie.
The terminal men: crackdown on the 'Legion of Doom' ends an era for
computer hackers.
Washington Post v113 (Sun, June 24, 1990):H1, col 3, 44 col in.

36. U.S. accepts hacker's sentence. (Robert Tappan Morris convicted in computer
virus case) (National Pages)
New York Times v139 (Sat, June 2, 1990):10(N), 10(L), col 5, 6 col in.

37. Schatz, Willie.
Software pioneer eyes legal aid for hackers. (Mitchell Kapor)
Washington Post v113 (Thu, May 31, 1990):E1, col 2, 18 col in.

38. Hackers, beware. (Robert T. Morris, Jr. sentenced for computer fraud)
(editorial)
Washington Post v113 (Wed, May 9, 1990):A26, col 1, 8 col in.
Pub Type: Editorial.

39. Specter, Michael.
Revenge on the nerds; sure, jail our hackers - who needs software stars
anyway? (Robert Tappan Morris) (column)
Washington Post v113 (Sun, Feb 11, 1990):C5, col 1, 26 col in.
Pub Type: Column.

40. Burton, Thomas M.
Four charged with scheme against phones. (computer hackers disrupting 911
emergency phone service)
Wall Street Journal (Wed, Feb 7, 1990):B5(W), B4(E), col 1, 5 col in.

41. Stipp, David.
Virus verdict likely to have limited impact. (Robert T. Morris' computer
virus conviction not likely to deter computer hackers)
Wall Street Journal (Wed, Jan 24, 1990):B1(W), B1(E), col 6, 22 col in.

Abstract:
In the wake of Robert T. Morris's conviction for perpetrating a disruptive
computer virus, experts say little has been accomplished in the way of
deterrence or legal landmarks. The conviction is the first under federal
law, and prosecutors say it is important because it demonstrates that the
law works when it is enforced. Others say the conviction should encourage
district attorneys to take on similar cases in the future as tougher new
laws are introduced. However, other experts feel the conviction will do
little to deter hackers, who seem to be motivated by the challenge and
danger involved in cracking security systems. These experts feel that the
renewed attention to security issues on systems such as Internet caused by
Morris's virus will help prevent future break-ins.

42. Burgess, John.
Hacker's case may shape computer security law. (Robert T. Morris, Jr.)
Washington Post v113 (Tue, Jan 9, 1990):A4, col 1, 38 col in.

43. Sims, Calvin.
Phone-call thieves hitting corporations' switchboards. (computer hackers
costing companies millions)
New York Times v139 (Mon, Dec 11, 1989):C1(N), D1(L), col 1, 24 col in.

Abstract:
Computer hackers are increasingly using long distance access codes stolen
from corporations to make free phone calls, costing corporation hundreds of
millions of dollars a year. The codes are obtained using software on a home
computer. The software tries various combinations of four digits,
repeatedly calling a corporation's switchboard until an access code works.
The codes are then posted on hackers' electronic bulletin boards. Long
distance carriers suggest several steps to preventing this form of computer
crime. Companies should make access codes longer, cancel access codes of
former employees immediately, alert switchboard operators to the various
schemes, block international calls except to countries where legitimate
business is conducted and monitor daily phone records closely.

44. Garfinkel, Simson L.
Lax security lets hackers attack: despite alarms about 'viruses' and
'worms,' few networks take steps to prevent invasions. (computers)
Christian Science Monitor v81, n223 (Fri, Oct 13, 1989):12, col 1, 33 col
in.

45. Calling all hackers: NTT issues security challenge. (Nippon Telegraph &
Telephone Corp. issues challenge to hackers to break into its computer
system)
Wall Street Journal (Thu, August 31, 1989):B6(E), col 3, 2 col in.

46. McCartney, Robert J.
Computer hackers face spy charges; W. Germany indicts 3 accused of
selling data to Soviet KGB agent.
Washington Post v112 (Thu, August 17, 1989):A32, col 4, 18 col in.

47. Hackers penetrated EEC computer files two times in April. (European
Economic Community)
Wall Street Journal (Mon, May 15, 1989):A7A(W), col 2, 5 col in.

48. Marshall, Tyler.
'Hackers' add new twist to Bonn's troubles with spies. (espionage
centered on computer hackers)
Los Angeles Times v108, secI (Sun, March 5, 1989):7, col 1, 20 col in.

49. Dye, Lee.
U.S. scientist foiled 'hackers' spy ring. (computer hackers access secret
U.S. data)
Los Angeles Times v108, secI (Sat, March 4, 1989):4, col 1, 30 col in.

50. Markoff, John.
Bonn suspect denies espionage was goal of computer intrusions. (West
German computer hackers accused of spying for Soviets, theft of US military
computer data) (International Pages)
New York Times v138 (Sat, March 4, 1989):3(N), 3(L), col 1, 16 col in.

51. McCartney, Robert J.
German computer hackers held for spying for Soviets; KGB said to gain
access to Pentagon data. (Department of Defense)
Washington Post v112 (Fri, March 3, 1989):A1, col 1, 28 col in.

52. Bagai, Eric.
Give hackers honorable mention; most computer hobbyists are content to
tinker. (column)
Los Angeles Times v108, secII (Sat, Jan 21, 1989):8, col 4, 19 col in.
Pub Type: Column.

53. Richards, Evelyn.
As U.S.-Soviet computer links grow, so do connections between hackers.
Washington Post v112 (Mon, Jan 2, 1989):WB6, col 1, 7 col in.

54. Clayton, Mark.
Hackers expand their illegal skills to voice mail.
Christian Science Monitor v81, n22 (Tue, Dec 27, 1988):14, col 3, 30 col
in.

55. Stipp, David; Davis, Bob.
New computer break-ins suggest 'virus' may have spurred hackers.
(computer virus)
Wall Street Journal (Fri, Dec 2, 1988):B4(W), B2(E), col 3, 15 col in.

56. Markoff, John.
Cyberpunks seek thrills in computerized mischief. (computer hackers)
New York Times v138 (Sat, Nov 26, 1988):1(N), 1(L), col 1, 31 col in.

57. Sanger, David E.
In Japan, land of computers, the first stirrings of hackers.
New York Times v138 (Sat, Nov 19, 1988):1(N), 4(L), col 4, 22 col in.

58. Sanger, David E.
In Japan, land of computers, the first stirrings of hackers.
New York Times v138, n47,694 (Nov 19, 1988):1 (2 pages).

Abstract:
Japanese high-tech greets the first signs of hacker activity with mixed
feelings. The Japanese, generally speaking, are pleased that their nation's
half a million programmers are well behaved, rarely breaking into computer
systems as programmers in America so often do. But the Japanese are
sometimes envious of an imaginative creativity that such computer crime
seems to signify. This year, 1988, a primitive computer virus struck a
48,000-user personal-computer network run by NEC; another virus struck at
Fujitsu, which makes mainframes; and a Japanese hacker has been arrested
for breaking a Tokyo bank's automatic teller machine code, accessing the
bank's funds. These cases are unusual because the viruses were homegrown in
Japan, not imported. Some Japanese computer experts point out, with pride,
that hacking is a problem that afflicts societies that have mastered the
computer.

59. Wysocki, Bernard, Jr.
Cracking the hackers; police in Silicon Valley deploy high-tech cops for
high-tech criminals.
Wall Street Journal (Mon, Nov 14, 1988):R48(W), col 3, 25 col in.

60. Gillette, Robert.
Computers stumped by ethics code. (computer hackers)
Los Angeles Times v107, secI (Sat, Nov 12, 1988):1, col 1, 56 col in.

61. Klein, Frederick C.
Tennis: hackers' helper. (Paul Whiteneir, Jr. patents StrokeMaker to aid
tennis players)
Wall Street Journal (Fri, Nov 11, 1988):A13(W), A13(E), col 1, 20 col in.

62. Specter, Michael.
Hackers' easy ride: MIT students fear that in wake of 'virus,' files will
be closed, creativity stifled. (Massachusetts Institute of Technology's
Artificial Intelligence Laboratory)
Washington Post v111 (Fri, Nov 11, 1988):A1, col 1, 36 col in.

63. Burgess, John.
Hackers find new way to tap long-distance phone lines: illegal users ring
up big bills for companies by gaining access to message systems.
Washington Post v111 (Thu, Oct 6, 1988):F1, col 3, 13 col in.

64. Keppel, Bruce.
Telecommunications expert warn of hacker's growing sophistication.
(computer hackers)
Los Angeles Times v107, secIV (Sat, July 23, 1988):2, col 1, 18 col in.

65. Markoff, John; Pollock, Andrew.
Computer 'hackers' seen as peril to security of the phone system.
New York Times v137 (Fri, July 22, 1988):1(N), A1(L), col 5, 40 col in.

66. Markoff, John; Pollack, Andrew.
Computer 'hackers' seen as peril to security of the phone system.
New York Times v137, n47,574 (July 22, 1988):1 (2 pages).

Abstract:
Sophisticated personal computer users cause industry observers and law
enforcement officials to question the security of the nation's telephone
system. Switches that route calls are, now, mostly electronic; phone
systems, now, are like large computers. Such systems are vulnerable because
computers that control switches can be accessed from outside - phone
companies purposely designed them this way, for convenience. For example,
phone companies designed ways for technicians in the field to dial into
circuits in central offices; and a capability to eavesdrop is included, so
that an operator can check on a line's status - and according to one
anonymous source, so that law enforcement personnel can easily wiretap.
Intruders with the proper commands can violate a system's integrity in
various ways: eavesdropping; altering or destroying data; stealing
facsimile documents; rerouting calls; or changing bills.

67. Hackers raid U.S. lab file. (computer raiders at Jet Propulsion Laboratory)
New York Times v137 (Sat, June 18, 1988):29(N), 45(L), col 3, 4 col in.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT