Note: View this page
full-screen.Otherwise, parts of the page may
overlap the left black bar, correcting which is
beyond our control.
"$100 Million Verdict Against Anti-Abortion
Activists." _CNN
Interactive_. Internet. URL:
http://cnn.com/US/9902/02/abortion.web.verdict.03/index.html.
Accessed
9 March, 1999: 1-2.
"Annual Cost of Computer Crime Rise Alarmingly." Computer Security
Institute press release, 4 March 1998. Online URL: http://www.gocsi.com/prelea11.htm.
Accessed 11 Mar., 1999: 1.
Associated Press. "Court
Upholds Child Pornography
Law." 30 January,
1999: 1.
Barkley, J. "Role Based Access Control." URL:
http://hissa.ncsl.nist.gov/rbac/proj/paper/node3.html. Accessed 9
Mar., 1999: 1.
Barlow, J. "Crime and Puzzlement: Desperados of the
DataSphere,"
1990. (Also online as
http://www.eff.org/pub/Publications/John_Perry_Barlow/crime_and_puzzlement.1)
Bunn, A. "31 Nabbed, 1,500 Fingered in Net Kid-Porn
Sting." _Wired
News_. Internet. URL:
http://www.wired.com/news/news/politics/story/7335.html.
Accessed 8
March, 1999: 1.
Carter, D., Katz, A. "Computer Crime: An Emerging Challenge for Law
Enforcemen." URL: http://www.fbi.gov/leb/dec961.txt.
Accessed 9 Mar., 1999: 1.
"Computer Crime." URL:
http://www3.bc.sympatico.ca/gja/980630.htm
Accessed 9 Mar., 1999: 1.
"Computer and Network Usage Policy." Stanford
Unversity. URL:
http://www-portfolio.stanford.edu:80/200141
Accessed 9 Mar., 1999: 1.
"Court Upholds Child Pornography Law." _CNN
Interactive_. Internet.
URL: http://cnn.com/US/9901/30/ComputerPorn.ap/index.html.
Accessed 24
Feb., 1999: 1.
CPSR Statement of Ethics. Communications of the ACM,
Vol 32 Num 6, June
1989.
"Criminal Organizations." URL:
http://oicj.acsp.uic.edu/spearmint/public/pubs/cjfarrago/terror02.cfm
. Accessed 9 Mar., 1999: 1.
"Cybercrime on the Internet." _Jones
Telecommunications & Multimedia
Encyclopedia_. Internet. URL:
http://www.digitalcentury.com/encyclo/update/crime.html.
Accessed 7
March, 1999: 2-3.
Denning, Peter J. (editor), Computers Under Attack: Intruders, Worms,
and
Viruses, Reading, MA: Addison-Wesley, 1990.
Eliptic Curve Cryptosystem Whitepapers, Current Public-Key
Cryptographic Systems. April 1997. URL:
"FBI Computer Crime Squad." _Emergency.com_. Internet.
URL:
http://www.emergency.com/fbi-nccs.htm.
Accessed 7 March, 1999:
1.
"Florida Association of Computer Crime Investigators." URL:
http://facci.org/. Accessed 9 Mar. 1999:
1.
"Former Chief Computer Network Program Designer Arraigned for Alleged $10
Million Computer 'Bomb.'" _Department of Justice Computer Crime and
Intellectual Property Section_. Internet. URL:
http://www.usdoj.gov/criminal/cybercrime/lloydpr.htm. Accessed
22 Feb.,
1999: 1-3.
Hafner, K. & Markoff, J. Cyberpunk: Outlaws and Hackers on the
Computer Frontier, New York: Simon and Schuster, 1995.
Hanson, Wayne. "Future Crime" 1996. URL:
http://www.govtech.net/1995/gt/mar/future.htm
. Accessed 9 Mar., 1999: 1.
Hoffman, L., et al. "Cryptography Policy and Technology Trends." URL:
http://ftp.eff.org/pub/Privacy/crypto-policy_doe_94.report. 1 Dec
1993, revised 30 Jan, 1994.
Howard, John. "Internet Characteristics." _An Analysis of Security
Incidents on the Internet 1989 - 1995_. Internet. URL:
http://www.cert.org/research/JHThesis/Chapter2.html.
Accessed 8
March,
1999: 9-10.
"Information Warfare Database." URL:
http://www.georgetown.edu/users/samplem/iw/
Accessed 15 Feb., 1999: 1.
"Internet Child Porn Ring Busted." _Wired News_. Internet. URL:
http://www.wired.com/news/print_version/politics/story/15908.html.
Accessed 8 March, 1999: 1.
Koops, B. "Crypto Law Survey." URL: http://cwis.kub.nl/~frw/people/koops/lawsurvy.htm.
Accessed 9 Mar., 1999: 1.
"Israeli Citizen Arrested in Israel for Hacking United States and Israeli
Government Computers." _Department of Justice Computer Crime and
Intellectual Property Section_. Internet. URL:
http://www.usdoj.gov/criminal/cybercrime/ehudpr.htm.
Accessed
22 Feb.,
1999: 1-2.
"Juvenile Computer Hacker Cuts off FAA Tower at Regional Airport -- First
Federal Charges Brought Against a Juvenile for Computer Crime."
_Department of Justice Computer Crime and Intellectual Property Section_.
Internet. URL:
http://www.usdoj.gov/criminal/cybercrime/juvenilepld.htm
.
Accessed 22
Feb., 1999: 1-4.
"Latest Web Statistics." InterGOV International.
Internet. URL:
http://www.intergov.org/public_administration/information/latest_web_stats.html
. Accessed 22 Feb., 1999: 3.
MacMillan, Robert. "Online Kiddie Porn Ring Busted." _InfoWar.Com_.
Internet. URL:
http://www.infowar.com/law/law_091198h_j.shtml.
Accessed 8 March, 1999: 1.
McKee, Phillip C. "Remarks to the 'Consumer
Protection in Electronic
Commerce' Panel at The Public Voice in the Development of Internet
Policy Conference of the Global Internet Liberty Campaign."
National Fraud Information Center. Internet. URL:
http://www.fraud.org/internet/intstat.htm
. Accessed 25 Feb.,
1999: 1.
"The National Information Infrastructure Protection
Act of 1996
Legislative Analysis." Department of Justice Computer Crime and
Intellectual Property Section. Internet. URL:
http://www.usdoj.gov/criminal/cybercrime/1030_anal.html.
Accessed 22 Feb., 1999: 1.
NCSC: A Guide to Understanding Descretionary Access Control in Trusted
Systems. 30 Sept. 1987.
Roush, W. "Hackers: Taking a Byte Out of Computer Crime." Internet.
URL:
http://www.techreview.com/articles/apr95/Roush.html
Accessed 9 Mar., 1999: 1.
"Section 1030 as Amended Oct. 11, 1996." Department
of Justice
Computer Crime and Intellectual Property Section. Internet. URL:
http://www.usdoj.gov/criminal/cybercrime/1030_new.html.
Accessed 22 Feb., 1999: 1-2.
Shimomuro, T. & Markoff, J. Take-Down: The Pursuit and Capture
of
Kevin Mitnick, New York: Hyperion, 1996.
Strothcamp, Dave. Fraud and Computer Crime.
Internet. URL:
http://www.csuohio.edu/accounts/Strothcamp/TOPIC07/sld001.htm.
Accessed 23 Feb., 1999: 1.
"Sun Microsystems: Questra: Questra Consulting."
Questra: What's
New: Advanced IT Conference. Internet. URL:
http://www.questra.com/news/itConf/slides/sunsoft/sunsoft/sld007.htm.
Accessed 23 Feb., 1999: 1.
Varon, Elana. "Bill Would Double Budget to Fight
Internet Child
Pornography." CNN Interactive. Internet. URL:
http://cnn.com/TECH/computing/9902/12/fightporn.idg/index.html
.
Accessed 24 Feb., 1999: 1-2.
|