90021932
Title:     Is Computer Hacking a Crime?
Authors:   Anonymous
Journal:   Harper's  Vol: 280  Iss: 1678  Date: Mar 1990  pp: 45-57
           Jrnl Code: GHAR  ISSN: 0017-789X  Jrnl Group: Commentary
Abstract:  A round-table discussion on the ethics of computer hacking is
           presented.  The panelists include computer hackers, scientists,
           activists and media members.
Subjects:  Computer crime; Ethics; Social life & customs
Type:      Feature
Length:    Long (31+ col inches)

90008297
Title:     Computer Hacking Goes on Trial
Authors:   Allman, William F
Journal:   U.S. News & World Report  Vol: 108  Iss: 3  Date: Jan 22, 1990  
           pp: 25
           Jrnl Code: GUNW  ISSN: 0041-5537  Jrnl Group: News
Abstract:  The trial of Robert Morris, a graduate student who unleashed a
           "worm" that caused computers around the US to grind to a halt on Nov
           2, 1988, is discussed.  Photograph; Illustration
Subjects:  Trials; Computer crime
Names:     Morris, Robert
Type:      News
Length:    Medium (10-30 col inches)

89121419
Title:     Hackers:  Is a Cure Worse Than the Disease?
Authors:   Lewyn, Mark
Journal:   Business Week  Iss: 3136  Date: Dec 4, 1989  pp: 37-38
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  Because of computer hacking, Pentagon officials would like to add
           more layers of security to protect their networks.  But this would
           limit access to university and government scientists, who use the
           information the most.  Photograph
Subjects:  Computer crime; Security systems; Computer networks
Names:     Morris, Robert Jr
Type:      Commentary
Length:    Medium (10-30 col inches)

89059272
Title:     Let's Get Reckless
Authors:   Gaines, Donna
Journal:   Village Voice  Vol: 34  Iss: 23  Date: Jun 6, 1989  pp: S4, S15
           Jrnl Code: GVIV  ISSN: 0042-6180  Jrnl Group: Commentary
Abstract:  The developing social importance of computer viruses is explored.
           Computer hacking and computer viruses have penetrated the
           consciousness of the mainstream media and are being countered by
           federal legislation.  Illustration
Subjects:  Computer crime; Social conditions & trends
Type:      Commentary
Length:    Medium (10-30 col inches)

90144244
Title:     Risky Business:  Tackling Computer Security
Authors:   Peterson, Ivars
Journal:   Science News  Vol: 138  Iss: 24  Date: Dec 15, 1990  pp: 373
           Jrnl Code: GSCN  ISSN: 0036-8423  Jrnl Group: SciTech
Abstract:  In response to concerns about the security of US computer systems, a
           National Research Council panel issued a report detailing the
           extreme vulnerability of present-day systems.  The report is
           discussed.
Subjects:  Computer crime; Computers & computer technology; National Research
           Council
Type:      News
Length:    Medium (10-30 col inches)

90142863
Title:     Law:  Breaking and Entering
Authors:   Lawren, Bill
Journal:   Omni  Vol: 13  Iss: 3  Date: Dec 1990  pp: 17
           Jrnl Code: GOMN  ISSN: 0149-8711  Jrnl Group: SciTech
Abstract:  The US government's efforts to crack down on computer crime may
           violate the constitutional rights of hackers.  The Electronic
           Frontier Foundation (EFF) has been formed to fight for those rights.
           Illustration
Subjects:  Computer crime; Civil rights; Electronic Frontier Foundation
Type:      Feature
Length:    Medium (10-30 col inches)

90128169
Title:     Balancing the Books:  Spectacular Computer Crimes
Journal:   Barron's  Date: Oct 1, 1990  pp: 55
           Jrnl Code: BAR  ISSN: 0005-6073  Jrnl Group: Business
Abstract:  Eric J.  Savitz reviews "Spectacular Computer Crimes" by Buck
           BloomBecker about computer crime and the danger it poses to
           industry.
Subjects:  Computer crime
Names:     BloomBecker, Buck
Type:      Book Review-Unfavorable
Length:    Long (19+ col inches)

90125761
Title:     Print Queue:  Stomping the Nasties
Authors:   Kenner, Hugh
Journal:   Byte  Vol: 15  Iss: 12  Date: Nov 1990  pp: 466-467
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
           Programs, and Other Threats to Your System," by John McAfee and
           Colin Haynes.  Illustration
Subjects:  Nonfiction; Computer crime; Computer programming & languages;
           Computers & computer technology
Names:     McAfee, John; Haynes, Colin
Type:      Book Review-Favorable
Length:    Long (31+ col inches)

90118815
Title:     Apple Ad Arresting, but Will Stay in Can
Authors:   Johnson, Bradley
Journal:   Advertising Age  Vol: 61  Iss: 43  Date: Oct 15, 1990  pp: 6
           Jrnl Code: ADA  ISSN: 0001-8899  Jrnl Group: Business
Abstract:  Apple Computer Inc pulled its $350,000 "Computer Crime" TV
           commercial before it was aired.  Apparently the company thought the
           commercial might encourage the theft of Macintosh computers.
Subjects:  Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type:      News
Length:    Short (1-9 col inches)

90109601
Title:     Rights and Wrongs of Software
Authors:   Charles, Dan
Journal:   New Scientist  Vol: 127  Iss: 1736  Date: Sep 29, 1990  pp: 44-48
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  Software copyrights have received much attention as software piracy
           proliferates.  Some experts believe software restrictions will
           inhibit the development of better products and the growth of small
           firms.  Photograph; Illustration
Subjects:  Software; Copyright; Computer programming & languages; Computer
           crime
Type:      Feature
Length:    Long (31+ col inches)

90108876
Title:     Eternal Plague:  Computer Viruses
Authors:   Cipra, Barry
Journal:   Science  Vol: 249  Iss: 4975  Date: Sep 21, 1990  pp: 1381
           Jrnl Code: GSCI  ISSN: 0036-8075  Jrnl Group: Academic; SciTech
Abstract:  Recent findings indicate that there is no way to protect a computer
           against all possible viral attacks.  Two basic types of computer
           viruses, the type that reproduces and the type that infects and
           alters an operating system, are described.
Subjects:  Computer programming & languages; Software; Operating systems;
           Computer crime
Type:      Feature
Length:    Medium (10-30 col inches)

90099926
Title:     Computer Center Certifies First Secure Network
Authors:   Anonymous
Journal:   Aviation Week & Space Technology  Vol: 133  Iss: 10  
           Date: Sep 3, 1990  pp: 42
           Jrnl Code: AWS  ISSN: 0005-2175  Jrnl Group: Business; SciTech
Abstract:  The National Computer Center recently certified the first
           multi-level secure computer network, the Verdix Secure Local Area
           Network (VSLAN).
Subjects:  Computer networks; Computer crime; Security systems; National
           Computer Center
Type:      News
Length:    Short (1-9 col inches)

90099517
Title:     Computer Hackers:  United States v Zod
Authors:   Anonymous
Journal:   Economist  Vol: 316  Iss: 7670  Date: Sep 1, 1990  pp: 23-24
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  The incompetence involved in the dramatic raids on computer hackers
           by the Secret Service is discussed.  The question of whether its
           seizure of computers is constitutional is addressed.  Photograph
Subjects:  Computer crime; Computer networks; Law enforcement; Search &
           seizure; Secret Service-US
Type:      Commentary
Length:    Medium (10-30 col inches)

90099086
Title:     Computers, Crime, and the Law
Authors:   Branwyn, Gareth
Journal:   Futurist  Vol: 24  Iss: 5  Date: Sep 1990  pp: 48
           Jrnl Code: FUS  ISSN: 0016-3317  Jrnl Group: SciTech;
           Socio/Environmental
Abstract:  A Mar 1990 raid by the Secret Service on Steve Jackson Games was
           part of an investigation into data piracy and computer crime.
           Computer professional's battle for free speech and privacy rights
           are detailed.
Subjects:  Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type:      Commentary
Length:    Medium (10-30 col inches)

90144244
Title:     Risky Business:  Tackling Computer Security
Authors:   Peterson, Ivars
Journal:   Science News  Vol: 138  Iss: 24  Date: Dec 15, 1990  pp: 373
           Jrnl Code: GSCN  ISSN: 0036-8423  Jrnl Group: SciTech
Abstract:  In response to concerns about the security of US computer systems, a
           National Research Council panel issued a report detailing the
           extreme vulnerability of present-day systems.  The report is
           discussed.
Subjects:  Computer crime; Computers & computer technology; National Research
           Council
Type:      News
Length:    Medium (10-30 col inches)

90142863
Title:     Law:  Breaking and Entering
Authors:   Lawren, Bill
Journal:   Omni  Vol: 13  Iss: 3  Date: Dec 1990  pp: 17
           Jrnl Code: GOMN  ISSN: 0149-8711  Jrnl Group: SciTech
Abstract:  The US government's efforts to crack down on computer crime may
           violate the constitutional rights of hackers.  The Electronic
           Frontier Foundation (EFF) has been formed to fight for those rights.
           Illustration
Subjects:  Computer crime; Civil rights; Electronic Frontier Foundation
Type:      Feature
Length:    Medium (10-30 col inches)

90128169
Title:     Balancing the Books:  Spectacular Computer Crimes
Journal:   Barron's  Date: Oct 1, 1990  pp: 55
           Jrnl Code: BAR  ISSN: 0005-6073  Jrnl Group: Business
Abstract:  Eric J.  Savitz reviews "Spectacular Computer Crimes" by Buck
           BloomBecker about computer crime and the danger it poses to
           industry.
Subjects:  Computer crime
Names:     BloomBecker, Buck
Type:      Book Review-Unfavorable
Length:    Long (19+ col inches)

90125761
Title:     Print Queue:  Stomping the Nasties
Authors:   Kenner, Hugh
Journal:   Byte  Vol: 15  Iss: 12  Date: Nov 1990  pp: 466-467
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
           Programs, and Other Threats to Your System," by John McAfee and
           Colin Haynes.  Illustration
Subjects:  Nonfiction; Computer crime; Computer programming & languages;
           Computers & computer technology
Names:     McAfee, John; Haynes, Colin
Type:      Book Review-Favorable
Length:    Long (31+ col inches)

90118815
Title:     Apple Ad Arresting, but Will Stay in Can
Authors:   Johnson, Bradley
Journal:   Advertising Age  Vol: 61  Iss: 43  Date: Oct 15, 1990  pp: 6
           Jrnl Code: ADA  ISSN: 0001-8899  Jrnl Group: Business
Abstract:  Apple Computer Inc pulled its $350,000 "Computer Crime" TV
           commercial before it was aired.  Apparently the company thought the
           commercial might encourage the theft of Macintosh computers.
Subjects:  Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type:      News
Length:    Short (1-9 col inches)

90109601
Title:     Rights and Wrongs of Software
Authors:   Charles, Dan
Journal:   New Scientist  Vol: 127  Iss: 1736  Date: Sep 29, 1990  pp: 44-48
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  Software copyrights have received much attention as software piracy
           proliferates.  Some experts believe software restrictions will
           inhibit the development of better products and the growth of small
           firms.  Photograph; Illustration
Subjects:  Software; Copyright; Computer programming & languages; Computer
           crime
Type:      Feature
Length:    Long (31+ col inches)

90108876
Title:     Eternal Plague:  Computer Viruses
Authors:   Cipra, Barry
Journal:   Science  Vol: 249  Iss: 4975  Date: Sep 21, 1990  pp: 1381
           Jrnl Code: GSCI  ISSN: 0036-8075  Jrnl Group: Academic; SciTech
Abstract:  Recent findings indicate that there is no way to protect a computer
           against all possible viral attacks.  Two basic types of computer
           viruses, the type that reproduces and the type that infects and
           alters an operating system, are described.
Subjects:  Computer programming & languages; Software; Operating systems;
           Computer crime
Type:      Feature
Length:    Medium (10-30 col inches)

90099926
Title:     Computer Center Certifies First Secure Network
Authors:   Anonymous
Journal:   Aviation Week & Space Technology  Vol: 133  Iss: 10  
           Date: Sep 3, 1990  pp: 42
           Jrnl Code: AWS  ISSN: 0005-2175  Jrnl Group: Business; SciTech
Abstract:  The National Computer Center recently certified the first
           multi-level secure computer network, the Verdix Secure Local Area
           Network (VSLAN).
Subjects:  Computer networks; Computer crime; Security systems; National
           Computer Center
Type:      News
Length:    Short (1-9 col inches)

90099517
Title:     Computer Hackers:  United States v Zod
Authors:   Anonymous
Journal:   Economist  Vol: 316  Iss: 7670  Date: Sep 1, 1990  pp: 23-24
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  The incompetence involved in the dramatic raids on computer hackers
           by the Secret Service is discussed.  The question of whether its
           seizure of computers is constitutional is addressed.  Photograph
Subjects:  Computer crime; Computer networks; Law enforcement; Search &
           seizure; Secret Service-US
Type:      Commentary
Length:    Medium (10-30 col inches)

90099086
Title:     Computers, Crime, and the Law
Authors:   Branwyn, Gareth
Journal:   Futurist  Vol: 24  Iss: 5  Date: Sep 1990  pp: 48
           Jrnl Code: FUS  ISSN: 0016-3317  Jrnl Group: SciTech;
           Socio/Environmental
Abstract:  A Mar 1990 raid by the Secret Service on Steve Jackson Games was
           part of an investigation into data piracy and computer crime.
           Computer professional's battle for free speech and privacy rights
           are detailed.
Subjects:  Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type:      Commentary
Length:    Medium (10-30 col inches)

90144244
Title:     Risky Business:  Tackling Computer Security
Authors:   Peterson, Ivars
Journal:   Science News  Vol: 138  Iss: 24  Date: Dec 15, 1990  pp: 373
           Jrnl Code: GSCN  ISSN: 0036-8423  Jrnl Group: SciTech
Abstract:  In response to concerns about the security of US computer systems, a
           National Research Council panel issued a report detailing the
           extreme vulnerability of present-day systems.  The report is
           discussed.
Subjects:  Computer crime; Computers & computer technology; National Research
           Council
Type:      News
Length:    Medium (10-30 col inches)

90142863
Title:     Law:  Breaking and Entering
Authors:   Lawren, Bill
Journal:   Omni  Vol: 13  Iss: 3  Date: Dec 1990  pp: 17
           Jrnl Code: GOMN  ISSN: 0149-8711  Jrnl Group: SciTech
Abstract:  The US government's efforts to crack down on computer crime may
           violate the constitutional rights of hackers.  The Electronic
           Frontier Foundation (EFF) has been formed to fight for those rights.
           Illustration
Subjects:  Computer crime; Civil rights; Electronic Frontier Foundation
Type:      Feature
Length:    Medium (10-30 col inches)

90128169
Title:     Balancing the Books:  Spectacular Computer Crimes
Journal:   Barron's  Date: Oct 1, 1990  pp: 55
           Jrnl Code: BAR  ISSN: 0005-6073  Jrnl Group: Business
Abstract:  Eric J.  Savitz reviews "Spectacular Computer Crimes" by Buck
           BloomBecker about computer crime and the danger it poses to
           industry.
Subjects:  Computer crime
Names:     BloomBecker, Buck
Type:      Book Review-Unfavorable
Length:    Long (19+ col inches)

90125761
Title:     Print Queue:  Stomping the Nasties
Authors:   Kenner, Hugh
Journal:   Byte  Vol: 15  Iss: 12  Date: Nov 1990  pp: 466-467
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  Hugh Kenner reviews "Computer Viruses, Worms, Data Diddlers, Killer
           Programs, and Other Threats to Your System," by John McAfee and
           Colin Haynes.  Illustration
Subjects:  Nonfiction; Computer crime; Computer programming & languages;
           Computers & computer technology
Names:     McAfee, John; Haynes, Colin
Type:      Book Review-Favorable
Length:    Long (31+ col inches)

90118815
Title:     Apple Ad Arresting, but Will Stay in Can
Authors:   Johnson, Bradley
Journal:   Advertising Age  Vol: 61  Iss: 43  Date: Oct 15, 1990  pp: 6
           Jrnl Code: ADA  ISSN: 0001-8899  Jrnl Group: Business
Abstract:  Apple Computer Inc pulled its $350,000 "Computer Crime" TV
           commercial before it was aired.  Apparently the company thought the
           commercial might encourage the theft of Macintosh computers.
Subjects:  Advertising; Television; Computers & computer technology; Theft
Companies: Apple Computer Inc
Type:      News
Length:    Short (1-9 col inches)

90109601
Title:     Rights and Wrongs of Software
Authors:   Charles, Dan
Journal:   New Scientist  Vol: 127  Iss: 1736  Date: Sep 29, 1990  pp: 44-48
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  Software copyrights have received much attention as software piracy
           proliferates.  Some experts believe software restrictions will
           inhibit the development of better products and the growth of small
           firms.  Photograph; Illustration
Subjects:  Software; Copyright; Computer programming & languages; Computer
           crime
Type:      Feature
Length:    Long (31+ col inches)

90108876
Title:     Eternal Plague:  Computer Viruses
Authors:   Cipra, Barry
Journal:   Science  Vol: 249  Iss: 4975  Date: Sep 21, 1990  pp: 1381
           Jrnl Code: GSCI  ISSN: 0036-8075  Jrnl Group: Academic; SciTech
Abstract:  Recent findings indicate that there is no way to protect a computer
           against all possible viral attacks.  Two basic types of computer
           viruses, the type that reproduces and the type that infects and
           alters an operating system, are described.
Subjects:  Computer programming & languages; Software; Operating systems;
           Computer crime
Type:      Feature
Length:    Medium (10-30 col inches)

90099926
Title:     Computer Center Certifies First Secure Network
Authors:   Anonymous
Journal:   Aviation Week & Space Technology  Vol: 133  Iss: 10  
           Date: Sep 3, 1990  pp: 42
           Jrnl Code: AWS  ISSN: 0005-2175  Jrnl Group: Business; SciTech
Abstract:  The National Computer Center recently certified the first
           multi-level secure computer network, the Verdix Secure Local Area
           Network (VSLAN).
Subjects:  Computer networks; Computer crime; Security systems; National
           Computer Center
Type:      News
Length:    Short (1-9 col inches)

90099517
Title:     Computer Hackers:  United States v Zod
Authors:   Anonymous
Journal:   Economist  Vol: 316  Iss: 7670  Date: Sep 1, 1990  pp: 23-24
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  The incompetence involved in the dramatic raids on computer hackers
           by the Secret Service is discussed.  The question of whether its
           seizure of computers is constitutional is addressed.  Photograph
Subjects:  Computer crime; Computer networks; Law enforcement; Search &
           seizure; Secret Service-US
Type:      Commentary
Length:    Medium (10-30 col inches)

90099086
Title:     Computers, Crime, and the Law
Authors:   Branwyn, Gareth
Journal:   Futurist  Vol: 24  Iss: 5  Date: Sep 1990  pp: 48
           Jrnl Code: FUS  ISSN: 0016-3317  Jrnl Group: SciTech;
           Socio/Environmental
Abstract:  A Mar 1990 raid by the Secret Service on Steve Jackson Games was
           part of an investigation into data piracy and computer crime.
           Computer professional's battle for free speech and privacy rights
           are detailed.
Subjects:  Computer crime; Privacy; Freedom of speech; Secret Service-US
Companies: Steve Jackson Games
Type:      Commentary
Length:    Medium (10-30 col inches)

90098358
Title:     Artificial Intelligence:  Computerized Breaking and Entering
Authors:   Goldberg, Jeff
Journal:   Omni  Vol: 12  Iss: 12  Date: Sep 1990  pp: 18
           Jrnl Code: GOMN  ISSN: 0149-8711  Jrnl Group: SciTech
Abstract:  To combat computer "worms," such as the one created by Robert Tappan
           Morris, software vendors are offering enhanced security programs.
           The pros and cons of security are discussed.  Illustration
Subjects:  Computer crime; Software; Security systems
Type:      Feature
Length:    Medium (10-30 col inches)

90096176
Title:     Spring Books:  Guardian of the Gates
Authors:   Dickman, Steven
Journal:   Nature  Vol: 344  Iss: 6269  Date: Apr 26, 1990  pp: 895-896
           Jrnl Code: GNAA  ISSN: 0028-0836  Jrnl Group: SciTech
Abstract:  Steven Dickman reviews "The Cuckoo's Egg," by Clifford Stoll.  
           Photograph
Subjects:  Nonfiction; Espionage; Computer crime
Names:     Stoll, Clifford
Type:      Book Review-Favorable
Length:    Medium (10-30 col inches)

90095224
Title:     Science and the Citizen:  Digital Desperados
Authors:   Wallich, Paul
Journal:   Scientific American  Vol: 263  Iss: 3  Date: Sep 1990  pp: 34-38
           Jrnl Code: GSCA  ISSN: 0036-8733  Jrnl Group: SciTech
Abstract:  Many computer experts feel that the government is acting
           overzealousy in its effort to crack down on computer crime.  The
           definition of computer crime has come into question.
Subjects:  Computer crime; Law enforcement
Type:      News
Length:    Medium (10-30 col inches)

90094490
Title:     Off the Hook
Authors:   Dibbell, Julian
Journal:   Village Voice  Vol: 35  Iss: 34  Date: Aug 21, 1990  pp: 8
           Jrnl Code: GVIV  ISSN: 0042-6180  Jrnl Group: Commentary
Abstract:  Federal prosecutors dropped charges against Craig M.  Neidorf,
           better known as the Knight Lightning computer hacker, on Jul 24,
           1990.  Neidorf had published a document detailing Bellsouth's
           emergency 911 system, although corporate officials agreed that the
           information was not sensitive.
Subjects:  Computer crime; Publishing; Telecommunications industry
Names:     Neidorf, Craig M
Companies: BellSouth Corp
Type:      News
Length:    Short (1-9 col inches)

90091236
Title:     Sending a Signal
Authors:   Denning, Peter J
Journal:   Communications of the ACM  Vol: 33  Iss: 8  Date: Aug 1990  
           pp: 11, 13
           Jrnl Code: GACM  ISSN: 0001-0782  Jrnl Group: SciTech; Academic
Abstract:  An editorial discusses Robert Morris Jr's criminal sentence.  Morris
           was convicted in Jan 1990 of releasing a worm program into the
           Research Internet in Nov 1988.  Morris was given a suspended jail
           term, a fine of $10,000 and 400 hours of community service.  
           Illustration
Subjects:  Computer crime; Criminal sentences; Fines & penalties; Crime &
           criminals
Names:     Morris, Robert T Jr
Type:      Editorial
Length:    Medium (10-30 col inches)

90091223
Title:     Insecurity about Security?
Authors:   Neumann, Peter G
Journal:   Communications of the ACM  Vol: 33  Iss: 8  Date: Aug 1990  pp: 170
           Jrnl Code: GACM  ISSN: 0001-0782  Jrnl Group: SciTech; Academic
Abstract:  The security provided with many computer systems is fundamentally
           flawed.  Better software and hardware systems are needed to hinder
           misuse from within and penetration.  Illustration
Subjects:  Computers & computer technology; Computer crime; Security systems
Type:      Commentary
Length:    Medium (10-30 col inches)

90090104
Title:     Forum:  Playing the Data Game
Authors:   Wise, Bob; Scisco, Peter
Journal:   Omni  Vol: 12  Iss: 11  Date: Aug 1990  pp: 16
           Jrnl Code: GOMN  ISSN: 0149-8711  Jrnl Group: SciTech
Abstract:  The Democratic congressman from West Virginia and the editor of
           "Compute" magazine offer opinions on privacy and computer security.
           Illustration
Subjects:  Computer crime; Privacy
Type:      Commentary
Length:    Medium (10-30 col inches)

90090099
Title:     Crime Bytes Back
Authors:   Marsa, Linda; Ray, Don
Journal:   Omni  Vol: 12  Iss: 11  Date: Aug 1990  pp: 34-38+
           Jrnl Code: GOMN  ISSN: 0149-8711  Jrnl Group: SciTech
Abstract:  The high-tech world of future computer cops and robbers is
           breathlessly described.  Illustration
Subjects:  Computer crime; Law enforcement; Social conditions & trends; Future
Type:      Feature
Length:    Long (31+ col inches)

90090027
Title:     Books:  The Cuckoo's Egg
Authors:   Connolly, John W D
Journal:   Physics Today  Vol: 43  Iss: 8  Date: Aug 1990  pp: 75-76
           Jrnl Code: GPHT  ISSN: 0031-9228  Jrnl Group: SciTech
Abstract:  John W.  D.  Connolly reviews "The Cuckoo's Egg:  Tracking a Spy
           Through the Maze of Computer Espionage," by Clifford Stoll.
Subjects:  Nonfiction; Computer crime; Computer networks; Espionage
Names:     Stoll, Clifford
Type:      Book Review-Mixed
Length:    Medium (10-30 col inches)

90086946
Title:     Hacker Trial under Way
Authors:   Anderson, G Christopher
Journal:   Nature  Vol: 343  Iss: 6255  Date: Jan 18, 1990  pp: 200
           Jrnl Code: GNAA  ISSN: 0028-0836  Jrnl Group: SciTech
Abstract:  The trial of Robert Morris Jr, the college student charged with
           creating the "Cornell virus" that struck thousands of US computers
           in 1988, is detailed.  The law under which Morris is being
           prosecuted, and its implications for future law enforcement for
           computer crimes are examined.  Photograph
Subjects:  Trials; Computer crime; Law enforcement
Names:     Morris, Robert
Type:      Feature
Length:    Medium (10-30 col inches)

90086606
Title:     Viruses?  Who You Gonna Call?  'Hackerbusters'
Authors:   Schwartz, Evan I; Rothfeder, Jeffrey
Journal:   Business Week  Iss: 3172  Date: Aug 6, 1990  pp: 71-72
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  Computer security, where purveyors of special software and
           consulting methods offer protection from computer crime, is a $3
           billion industry, but some critics claim that there are charlatans
           out there.  Graph; Illustration
Subjects:  Industry profiles; Security systems; Computers & computer
           technology; Computer crime; Consultants
Type:      Feature
Length:    Medium (10-30 col inches)

90086605
Title:     Computer Anarchism Calls for a Tough Response
Authors:   Rothfeder, Jeffrey; Schwartz, Evan I
Journal:   Business Week  Iss: 3172  Date: Aug 6, 1990  pp: 72
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  While computer break-ins and viruses are admittedly dangerous,
           hysteria over the situation is no excuse for violating the
           constitutional rights of suspected hackers.  Photograph
Subjects:  Computer crime; Civil rights
Type:      Commentary
Length:    Medium (10-30 col inches)

90085769
Title:     Theft in the Classroom
Authors:   Thornburg, David D
Journal:   inCider  Vol: 8  Iss: 8  Date: Aug 1990  pp: 88-90
           Jrnl Code: GINC  ISSN: 0740-0101  Jrnl Group: SciTech
Abstract:  The issue of software piracy as it relates to use of computer
           programs in the classroom is discussed.  More sources of public
           funding are needed so schools won't be inclined to copy programs
           illegally.
Subjects:  Education & schools; Copyright; Software; Computer crime
Type:      Commentary
Length:    Medium (10-30 col inches)

90084275
Title:     On Line and Out of Bounds
Authors:   Dibbell, Julian
Journal:   Village Voice  Vol: 35  Iss: 30  Date: Jul 24, 1990  pp: 26-32
           Jrnl Code: GVIV  ISSN: 0042-6180  Jrnl Group: Commentary
Abstract:  Computer hackers are penetrating some of the country's most
           sophisticated systems, and the government is targeting them as a
           serious threat to national security.  Secret Service raids on
           hackers are described.  Illustration
Subjects:  Computer crime; Computer networks; Classified information; National
           security; Secret Service-US
Type:      Feature
Length:    Long (31+ col inches)

90083828
Title:     Crackdown on Hackers 'May Violate Civil Rights'
Authors:   Charles, Dan
Journal:   New Scientist  Vol: 127  Iss: 1726  Date: Jul 21, 1990  pp: 22
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  The Electronic Frontier Foundation, a computer industry group, says
           US efforts to crack down on computer "hackers" may be unlawful and
           violate civil rights.  Photograph
Subjects:  Computer crime; Laws & legislation; Civil rights; United States--US;
           Electronic Frontier Foundation
Type:      News
Length:    Medium (10-30 col inches)

90083805
Title:     Private and Confidential
Authors:   Reynolds, Chris
Journal:   New Scientist  Vol: 127  Iss: 1726  Date: Jul 21, 1990  pp: 58
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  The proliferation of electronic mail, bulletin boards and databases
           is raising concerns over security and privacy in the computer age.  
           Illustration
Subjects:  Electronic mail; Computers & computer technology; Privacy; Computer
           crime
Type:      Commentary
Length:    Medium (10-30 col inches)

90081730
Title:     Print Queue:  Our Man in Berkeley
Authors:   Kenner, Hugh
Journal:   Byte  Vol: 15  Iss: 3  Date: Mar 1990  pp: 360-362
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  Hugh Kenner reviews "The Cuckoo's Egg:  Tracking a Spy Through the
           Maze of Computer Espionage," by Clifford Stoll.  Illustration
Subjects:  Nonfiction; Computer crime; Espionage
Names:     Stoll, Clifford
Type:      Book Review-Favorable
Length:    Long (31+ col inches)

90081052
Title:     'Killer' Computer Viruses:  An Idea Whose Time Shouldn't Come
Authors:   Lewyn, Mark
Journal:   Business Week  Iss: 3170  Date: Jul 23, 1990  pp: 30
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  The Defense Department's scheme to use a "killer" computer virus to
           infiltrate an enemy's computer system is discussed.  Although
           feasible, the concept could prove to be costly in more ways than
           one.  Illustration
Subjects:  Computer crime; Espionage; Department of Defense
Type:      Commentary
Length:    Medium (10-30 col inches)

90078513
Title:     Hackers of the World, Unite!
Authors:   Schwartz, John
Journal:   Newsweek  Vol: 116  Iss: 1  Date: Jul 2, 1990  pp: 36-37
           Jrnl Code: GNEW  ISSN: 0028-9604  Jrnl Group: News
Abstract:  As law-enforcement officials widen their crackdown on computer
           tampering, computer pioneers like Mitch Kapor and Steve Wozniak are
           joining in an effort to defend hackers and the freedom of
           information.  Photograph
Subjects:  Computers & computer technology; Law enforcement; Computer crime
Type:      News
Length:    Long (31+ col inches)

90074799
Title:     Man with a Modem
Authors:   Campbell, Peter
Journal:   New Statesman & Society  Vol: 3  Iss: 106  Date: Jun 22, 1990  
           pp: 54
           Jrnl Code: GNES  ISSN: 0954-2361  Jrnl Group: Commentary
Abstract:  Peter Campbell reviews "Beating the System:  Hackers, Phreakers and
           Electronic Spies," by Owen Bowcott and Sally Hamilton.
Subjects:  Nonfiction; Computer crime
Names:     Bowcott, Owen; Hamilton, Sally
Type:      Book Review-Mixed
Length:    Medium (10-30 col inches)

90062822
Title:     Microcomputer Security and Control
Authors:   Forgione, Dana; Blankley, Alan
Journal:   Journal of Accountancy  Vol: 169  Iss: 6  Date: Jun 1990  pp: 83-90
           Jrnl Code: JAC  ISSN: 0021-8448  Jrnl Group: Business
Abstract:  Six tips for accountants on maintaining microcomputer security are
           offered.  Photograph; Table
Subjects:  Personal computers; Computer crime; Accounting & accountants
Type:      Feature
Length:    Long (31+ col inches)

90062815
Title:     Book Review:  Computer Audit, Control, and Security
Authors:   Iacono, Lisa M
Journal:   Journal of Accountancy  Vol: 169  Iss: 6  Date: Jun 1990  
           pp: 150-151
           Jrnl Code: JAC  ISSN: 0021-8448  Jrnl Group: Business
Abstract:  Lisa M.  Iacono reviews "Computer Audit, Control, and Security," by
           Robert R.  Moeller.
Subjects:  Nonfiction; Accounting & accountants; Computers & computer
           technology; Computer crime; Security systems
Names:     Moeller, Robert R
Type:      Book Review-Favorable
Length:    Medium (10-30 col inches)

90062001
Title:     The Risk of Computing
Authors:   Reynolds, Chris
Journal:   New Scientist  Vol: 126  Iss: 1718  Date: May 26, 1990  pp: 64
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  Chris Reynolds reviews "Viruses, Bugs and Star Wars," by Geoff
           Simons.  Illustration
Subjects:  Nonfiction; Computers & computer technology; Computer crime
Names:     Simons, Geoff
Type:      Book Review-Unfavorable
Length:    Medium (10-30 col inches)

90061371
Title:     Thanks for Wiping the Memory
Authors:   Thimbleby, Harold
Journal:   New Scientist  Vol: 126  Iss: 1717  Date: May 19, 1990  pp: 69
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  It is nice to think the computer viruses have a bright side:
           forcing programs, professional standards and hardware to improve.
           If viruses were unable to corrupt programs, then anything or anyone
           else would also find it harder.
Subjects:  Computers & computer technology; Computer crime; Software
Type:      Commentary
Length:    Medium (10-30 col inches)

90047219
Title:     Conversations
Authors:   Ferrell, Keith
Journal:   Compute!  Vol: 12  Iss: 5  Date: May 1990  pp: 98
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  According to Buck BloomBecker, the director of the National Center
           for Computer Crime Data, there is a potential for computer crime
           everywhere computers are located.  There is a variety of motivations
           that underlie this type of crime.  Photograph
Subjects:  Computer crime; National Center for Computer Crime Data
Names:     BloomBecker, Buck
Type:      Commentary
Length:    Medium (10-30 col inches)

90046190
Title:     The Hacker Dragnet
Authors:   Schwartz, John
Journal:   Newsweek  Vol: 115  Iss: 18  Date: Apr 30, 1990  pp: 50
           Jrnl Code: GNEW  ISSN: 0028-9604  Jrnl Group: News
Abstract:  Federal authorities are in hot pursuit of computer criminals.
           However, innocent victims may be being swept up in the hunt.  
           Illustration
Subjects:  Computer crime; Crime & criminals; Law enforcement
Type:      News
Length:    Medium (10-30 col inches)

90045192
Title:     Hackers 'Plan Revenge' for Police Clampdown on Computer Crime
Authors:   Charles, Dan; O Neill, Graeme
Journal:   New Scientist  Vol: 126  Iss: 1713  Date: Apr 21, 1990  pp: 24
           Jrnl Code: GNSC  ISSN: 0262-4079  Jrnl Group: SciTech
Abstract:  Managers of computer networks in the US and Australia have sent out
           warnings that "hackers" may try to take revenge for recent attempts
           by police to crack down on computer crime.
Subjects:  Computers & computer technology; Computer networks; Computer crime;
           Crime & criminals
Type:      News
Length:    Medium (10-30 col inches)

90042567
Title:     Busting Computer Viruses:  Who Ya Gonna Call?
Authors:   Anonymous
Journal:   Economist  Vol: 315  Iss: 7649  Date: Apr 7, 1990  pp: 78
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  The onslaught of damage to computer systems by viruses and hackers
           is expected to increase.  Halting the problem will mean stricter
           control on the use of PCs.  Illustration
Subjects:  Computers & computer technology; Personal computers; Computer crime
Type:      News
Length:    Medium (10-30 col inches)

90042105
Title:     A 75 (Cent) Discrepancy Propels Astronomer Into a Maze of Computer
           Networks and Onto a Best-Seller List
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 36  Iss: 29  Date: Apr 4, 1990  
           pp: A3
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Clifford Stoll's investigation of a 75-cent discrepancy in some
           computer accounts in 1986 led him to track a spy through a maze of
           computer networks.  Stoll catalogued the techniques the spy used in
           his book "The Cuckoo's Egg:  Tracking a Spy Through the Maze of
           Computer Espionage."  Photograph
Subjects:  Computers & computer technology; Biographical profiles; Espionage;
           Computer crime
Names:     Stoll, Clifford
Type:      News
Length:    Medium (10-30 col inches)

90041088
Title:     Computer Whiz Guilty
Authors:   Burstyn, Harold L
Journal:   ABA Journal  Vol: 76  Date: Apr 1990  pp: 20
           Jrnl Code: GABA  ISSN: 0747-0088  Jrnl Group: Academic; Business
Abstract:  In one of the first jury trials under the Computer Fraud and Abuse
           Act, a federal jury convicted a graduate student named Robert T.
           Morris of launching a rogue program called a worm that shut down
           hundreds of computers across the US.  He intended no malice and was
           not sent to jail.  Photograph
Subjects:  Court rulings; Computers & computer technology; Criminal sentences;
           Computer crime
Names:     Morris, Robert T Jr
Type:      News
Length:    Medium (10-30 col inches)

90038941
Title:     Books and Arts:  Computer Hackers--The 75-Cent Solution
Authors:   Anonymous
Journal:   Economist  Vol: 314  Iss: 7648  Date: Mar 31, 1990  pp: 84-85
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  "The Cuckoo's Egg," by Clifford Stoll, is reviewed.
Subjects:  Computer crime; Nonfiction
Names:     Stoll, Clifford
Type:      Book Review-Favorable
Length:    Short (1-9 col inches)

90037281
Title:     Stranger than Fiction
Authors:   Carver, Robert
Journal:   New Statesman & Society  Vol: 3  Iss: 91  Date: Mar 9, 1990  pp: 38
           Jrnl Code: GNES  ISSN: 0954-2361  Jrnl Group: Commentary
Abstract:  Robert Carver reviews "The Cuckoo's Egg," by Clifford Stoll.  
           Photograph
Subjects:  Nonfiction; Computer crime; Espionage; Investigations
Names:     Stoll, Clifford
Type:      Book Review-Favorable
Length:    Medium (10-30 col inches)

90034139
Title:     Hunt for the Hacker Spy
Authors:   Elliott, Lawrence
Journal:   Reader's Digest  Vol: 136  Iss: 816  Date: Apr 1990  pp: 185-232
           Jrnl Code: GRDI  ISSN: 0034-0375  Jrnl Group: Lifestyles
Abstract:  The mystery began when Clifford Stoll, a systems manager at the
           Lawrence Berkeley Laboratory in Berkeley CA, learned of an
           unexplained seventy-five-cent charge for computer time.  Concerned
           that someone was invading the US military networks, Stoll began to
           hunt down the hacker.  Photograph; Illustration
Subjects:  Espionage; Computer crime; Defense industry
Names:     Stoll, Clifford
Type:      Feature
Length:    Long (31+ col inches)

90032796
Title:     Hi-Tech Mall Crawl
Authors:   Dibbell, Julian
Journal:   Village Voice  Vol: 35  Iss: 12  Date: Mar 20, 1990  pp: S12
           Jrnl Code: GVIV  ISSN: 0042-6180  Jrnl Group: Commentary
Abstract:  Eric Corley, the publisher of a computer hacker's magazine called
           "2600," discusses why he and others are lured to messing with the
           government's computer systems.
Subjects:  Computer crime
Names:     Corley, Eric
Type:      Feature
Length:    Medium (10-30 col inches)

90031482
Title:     Tennessee Suspends 19 for Computer Tampering
Authors:   Anonymous
Journal:   Chronicle of Higher Education  Vol: 36  Iss: 26  Date: Mar 14, 1990
           pp: A2
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  The University of Tennessee has suspended 19 students for at least
           one semester for gaining access to the computer program that
           controls the dropping and adding of courses past the deadline.  No
           grades were changed.
Subjects:  Computer crime; Colleges & universities; Students
Type:      News
Length:    Short (1-9 col inches)

90026028
Title:     Computer Security:  Gaining the CEO's Support
Authors:   Horton, Thomas R
Journal:   Vital Speeches of the Day  Vol: 56  Iss: 10  Date: Mar 1990  
           pp: 307-310
           Jrnl Code: VSP  ISSN: 0042-742X  Jrnl Group: Commentary
Abstract:  Chief executive officers have been lamentably disinterested in
           computer security, occasionally to their misfortune.  Communication
           is the key to any new program, and computer security personnel must
           make it easy for busy CEOs to comprehend their security needs and
           options.  Confusion among different departments makes implementing
           security a challenge.
Subjects:  Computer crime; Security systems; Chief executive officers
Type:      Speech
Length:    Long (31+ col inches)

90025552
Title:     When a Virus Makes Your PC Sneeze
Authors:   Wiener, Daniel P
Journal:   U.S. News & World Report  Vol: 108  Iss: 8  Date: Feb 26, 1990  
           pp: 62
           Jrnl Code: GUNW  ISSN: 0041-5537  Jrnl Group: News
Abstract:  Those who operate personal computers over telephone lines or trade
           software with friends increase the risk of contracting a computer
           virus.  "Blocker" programs, available for PCs, can help one prevent
           or track viruses.  Illustration
Subjects:  Personal computers; Software; Computer crime; Security systems
Type:      Feature
Length:    Medium (10-30 col inches)

90021932
Title:     Is Computer Hacking a Crime?
Authors:   Anonymous
Journal:   Harper's  Vol: 280  Iss: 1678  Date: Mar 1990  pp: 45-57
           Jrnl Code: GHAR  ISSN: 0017-789X  Jrnl Group: Commentary
Abstract:  A round-table discussion on the ethics of computer hacking is
           presented.  The panelists include computer hackers, scientists,
           activists and media members.
Subjects:  Computer crime; Ethics; Social life & customs
Type:      Feature
Length:    Long (31+ col inches)

90020898
Title:     Computers/Communications:  Fraud Busters
Authors:   Siler, Charles
Journal:   Forbes  Vol: 145  Iss: 4  Date: Feb 19, 1990  pp: 154-158
           Jrnl Code: FBR  ISSN: 0015-6914  Jrnl Group: Business
Abstract:  More than 50 companies, from Texas Instruments to Spectrix Inc, are
           developing tamper-proof computer networks to prevent investors from
           being cheated on the futures exchanges.  This new technology is
           discussed.  Photograph; Illustration
Subjects:  Computers & computer technology; Company profiles; Computer crime
Companies: Texas Instruments Inc; Spectrix Inc
Type:      Feature
Length:    Long (31+ col inches)

90020575
Title:     Morris Code
Authors:   Hafner, Katie
Journal:   New Republic  Vol: 202  Iss: 8  Date: Feb 19, 1990  pp: 15-16
           Jrnl Code: GTNR  ISSN: 0028-6583  Jrnl Group: Commentary
Abstract:  Robert Tappan Morris, the young man who infiltrated Internet, a
           nationwide computer network, has recieved a stiff penalty from the
           Justice Department.  His crime was actually far less pernicious than
           most others.
Subjects:  Computer crime; Criminal sentences
Names:     Morris, Robert T Jr
Type:      Feature
Length:    Long (31+ col inches)

90019137
Title:     Scenes from Science:  Hacking for Adventure
Authors:   Cooper, William
Journal:   Spectator  Vol: 264  Iss: 8431  Date: Feb 10, 1990  pp: 10
           Jrnl Code: GSPE  ISSN: 0038-6952  Jrnl Group: Commentary
Abstract:  The case of the US Justice Department versus Cornell graduate
           student Robert Morris Jr will be a forum to evaluate the
           effectiveness of the Computer Fraud and Abuse Act.
Subjects:  Computer crime; Laws & legislation; Trials
Names:     Morris, Robert Jr
Type:      News
Length:    Short (1-9 col inches)

90019041
Title:     Hacked to Pieces
Authors:   Jenkins, Jolyon
Journal:   New Statesman & Society  Vol: 3  Iss: 87  Date: Feb 9, 1990  pp: 27
           Jrnl Code: GNES  ISSN: 0954-2361  Jrnl Group: Commentary
Abstract:  There is a good reason why people other than computer hackers and
           high-tech fraudsters should worry about computer crime legislation:
           Laws made in response to moral panic usually fail to catch real
           criminals and end up restricting civil liberties for everyone.
Subjects:  Computer crime; Laws & legislation; Civil rights
Type:      Feature
Length:    Medium (10-30 col inches)

90015840
Title:     Around the Mall and Beyond
Authors:   Park, Edwards
Journal:   Smithsonian  Vol: 20  Iss: 11  Date: Feb 1990  pp: 20-26
           Jrnl Code: GSMI  ISSN: 0037-7333  Jrnl Group: Socio/Environmental;
           SciTech
Abstract:  Astronomer-author-hacker Clifford Stoll is interviewed.  Stoll is
           the author of "The Cuckoo's Egg," a computer-age detective story.  
           Photograph
Subjects:  Scientists; Computer crime; Biographical profiles
Names:     Stoll, Clifford
Type:      Interview
Length:    Long (31+ col inches)

90015267
Title:     Deterring Computer Crime
Authors:   Rosenblatt, Kenneth
Journal:   Technology Review  Vol: 93  Iss: 2  Date: Feb 1990  pp: 34-40
           Jrnl Code: TCR  ISSN: 0040-1692  Jrnl Group: SciTech
Abstract:  Computer-illiterate police cannot combat the growing incidence of
           electronic theft and vandalism.  What's needed are special task
           forces and penalties that fit the crime, such as taking away an
           offender's computer.  Illustration
Subjects:  Computers & computer technology; Computer crime; Law enforcement
Type:      Feature
Length:    Long (31+ col inches)

90008297
Title:     Computer Hacking Goes on Trial
Authors:   Allman, William F
Journal:   U.S. News & World Report  Vol: 108  Iss: 3  Date: Jan 22, 1990  
           pp: 25
           Jrnl Code: GUNW  ISSN: 0041-5537  Jrnl Group: News
Abstract:  The trial of Robert Morris, a graduate student who unleashed a
           "worm" that caused computers around the US to grind to a halt on Nov
           2, 1988, is discussed.  Photograph; Illustration
Subjects:  Trials; Computer crime
Names:     Morris, Robert
Type:      News
Length:    Medium (10-30 col inches)

89127748
Title:     Ethical Responsibility Key to Computer Security
Authors:   Lynn, M Stuart
Journal:   Educational Record  Vol: 70  Iss: 2  Date: Spring 1989  pp: 36-39
           Jrnl Code: GEDR  ISSN: 0013-1873  Jrnl Group: Academic
Abstract:  The recent Computer Worm incident raised the issue of ethical
           standards relating to computer networks and information.  The
           pervasiveness of powerful computers makes ethical behavior morally
           and practically necessary.  Illustration; References
Subjects:  Computer crime; Computers & computer technology; Ethics; Morality
Type:      Feature
Length:    Long (31+ col inches)

89121419
Title:     Hackers:  Is a Cure Worse Than the Disease?
Authors:   Lewyn, Mark
Journal:   Business Week  Iss: 3136  Date: Dec 4, 1989  pp: 37-38
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  Because of computer hacking, Pentagon officials would like to add
           more layers of security to protect their networks.  But this would
           limit access to university and government scientists, who use the
           information the most.  Photograph
Subjects:  Computer crime; Security systems; Computer networks
Names:     Morris, Robert Jr
Type:      Commentary
Length:    Medium (10-30 col inches)

89106603
Title:     Halting Hackers
Authors:   Anonymous
Journal:   Economist  Vol: 313  Iss: 7626  Date: Oct 28, 1989  pp: 18
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  An editorial discusses the need for laws to protect against computer
           crimes.  Illustration
Subjects:  Computer crime; Laws & legislation
Type:      Editorial
Length:    Short (1-9 col inches)

89104122
Title:     If Your Computer Catches a Virus on Friday the 13th, Who You Gonna
           Call?  John McAfee
Authors:   Anonymous
Journal:   People Weekly  Vol: 32  Iss: 16  Date: Oct 16, 1989  pp: 77
           Jrnl Code: GPEW  ISSN: 0093-7673  Jrnl Group: Lifestyles
Abstract:  John McAfee, computer virus exterminator "extraordinaire," has
           created a so-called disinfectant program that can determine whether
           a virus has invaded computer.  His program can wipe out the virus
           and repair the damage.  Photograph
Subjects:  Computer crime; Computers & computer technology; Biographical
           profiles
Names:     McAfee, John
Type:      Feature
Length:    Medium (10-30 col inches)

89103846
Title:     This Morning's Computer Virus--Unlucky for Some
Authors:   Anonymous
Journal:   Economist  Vol: 313  Iss: 7624  Date: Oct 14, 1989  pp: 100-102
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: Business; News
Abstract:  A recent computer virus called Datacrime, which was designed to
           damage databases on Friday, October 13th, has so far infected
           thousands of computers in Europe.
Subjects:  Computer crime; Software; Data bases
Type:      Commentary
Length:    Medium (10-30 col inches)

89101302
Title:     Short-Circuiting Computer Crime
Authors:   Bloombecker, J J
Journal:   Datamation  Vol: 35  Iss: 19  Date: Oct 1, 1989  pp: 71-72
           Jrnl Code: DAT  ISSN: 0011-6963  Jrnl Group: Business; SciTech
Abstract:  Assessing what other IS managers are doing to safeguard computer
           systems is probably the best source of ideas on how to shut down
           computer crime, a $500 million a year industry.  Graph
Subjects:  Computer crime; Security systems; Computers & computer technology;
           Industry profiles
Type:      Feature
Length:    Long (31+ col inches)

89101248
Title:     Crimes of the Heart?
Authors:   Crabb, Don
Journal:   Byte  Vol: 14  Iss: 10  Date: Oct 1989  pp: 144E-144H
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  The person who stole and disseminated the source code to some of
           Apple's Macintosh ROM deserves a punishment to fit the horrible
           crime.  As Apple moves into the first quarter of the 1990 fiscal
           year, several products Macintosh users hope to see introduced are
           discussed.  Illustration
Subjects:  Product development; Computer crime
Companies: Apple Computer Inc
Type:      Commentary
Length:    Long (31+ col inches)

89101228
Title:     Goodbye, Mr. Chips
Authors:   Wayner, Peter
Journal:   Byte  Vol: 14  Iss: 10  Date: Oct 1989  pp: 364
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  The computer revolution is threatened with the curse of success.
           Once eveyone starts using some new machine, the temptation to make
           everything right by regulation comes creeping in.
Subjects:  Computers & computer technology; Computer crime; Government
           regulation
Type:      Commentary
Length:    Medium (10-30 col inches)

89096642
Title:     Brave New World
Authors:   Dibbell, Julian
Journal:   Village Voice  Vol: 34  Iss: 39  Date: Sep 26, 1989  pp: S7, S10+
           Jrnl Code: GVIV  ISSN: 0042-6180  Jrnl Group: Commentary
Abstract:  The software industry has picked up its legal attacks on pirates,
           targeting corporate offenders in particular.  The steps that the
           industry are taking are discussed.  Illustration
Subjects:  Computers & computer technology; Computer crime
Type:      Feature
Length:    Long (31+ col inches)

89091613
Title:     Coping with a PC Virus
Authors:   Rosenberg, Jim
Journal:   Editor & Publisher  Vol: 122  Iss: 35  Date: Sep 2, 1989  
           pp: 8PC-10PC
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  The Commercial Appeal, a Memphis TN newspaper, recently had an
           encounter with a computer virus.  The company was able to remedy the
           problem quickly with an anti-viral program.
Subjects:  Newspapers; Company profiles; Computers & computer technology;
           Computer crime
Companies: Commercial Appeal
Type:      Commentary
Length:    Long (31+ col inches)

89091612
Title:     Combatting PC Viruses
Authors:   Rosenberg, Jim
Journal:   Editor & Publisher  Vol: 122  Iss: 35  Date: Sep 2, 1989  
           pp: 11PC, 31PC
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  The House Telecommunication and Finance subcommittee will present
           legislation that will include stiff penalties against those who
           infect computer systems with a virus.
Subjects:  Laws & legislation; Computers & computer technology; Viruses;
           Computer crime
Type:      Commentary
Length:    Medium (10-30 col inches)

89089348
Title:     Free the Hacker Two
Authors:   Corley, Eric
Journal:   Harper's  Vol: 279  Iss: 1672  Date: Sep 1989  pp: 22-26
           Jrnl Code: GHAR  ISSN: 0017-789X  Jrnl Group: Commentary
Abstract:  An editorial urges the release of computer "hackers" imprisoned for
           computer crimes.  Excerpted from the book "Hackers in Jail."
Subjects:  Computer crime
Type:      Editorial
Length:    Long (31+ col inches)

89083744
Title:     Nonfiction:  The Cuckoo's Egg
Authors:   Stuttaford, Genevieve
Journal:   Publishers Weekly  Vol: 236  Iss: 6  Date: Aug 11, 1989  pp: 448
           Jrnl Code: GPUB  ISSN: 0000-0019  Jrnl Group: Commentary; Business
Abstract:  Genevieve Stuttaford reviews "The Cuckoo's Egg:  Tracking a Spy
           through the Maze of Computer Espionage," by Cliff Stoll.
Subjects:  Nonfiction; Computer crime
Names:     Stoll, Clifford
Type:      Book Review-Favorable
Length:    Short (1-9 col inches)

89078212
Title:     Computer Viruses
Authors:   Vasilyev, Dmitri; Novikov, Yevgeni
Journal:   Soviet Life  Iss: 7  Date: Jul 1989  pp: 37-39
           Jrnl Code: GSOV  ISSN: 0038-5549  Jrnl Group: Lifestyles;
           Commentary
Abstract:  The increased use of computers in the Soviet Union brings problems
           familiar to Western users, especially computer viruses.  Soviet
           computer scientists Alfred Ailamazyan and Sergei Abramov are
           interviewed about Soviet computer viruses and computer security.  
           Photograph
Subjects:  Computer crime; Security systems; Union of Soviet Socialist
           Republics--USSR
Names:     Ailamazyan, Alfred; Abramov, Sergei
Type:      Interview
Length:    Long (31+ col inches)

89077225
Title:     The Computer Contagion
Authors:   Kenyon, David M
Journal:   ABA Journal  Vol: 75  Date: Jun 1989  pp: 116-117
           Jrnl Code: GABA  ISSN: 0747-0088  Jrnl Group: Academic; Business
Abstract:  Computer viruses can spread from computer to computer, including
           those in law firms.  Strategies for protecting against computer
           viruses are discussed, including establishing a policy of who may
           use the firm's computers and making paper backups of important
           material.  Illustration
Subjects:  Computer crime; Legal professions
Type:      Feature
Length:    Long (31+ col inches)

89076390
Title:     Viruses, Worms, Trojans, and Bombs
Authors:   Stover, Dawn
Journal:   Popular Science  Vol: 235  Iss: 3  Date: Sep 1989  pp: 59-62+
           Jrnl Code: GPOS  ISSN: 0161-7370  Jrnl Group: SciTech
Abstract:  Viruses, worms, trojans, and bombs are electronic infections that
           make computers sick.  They have actually crippled huge government
           networks as well as PCs.  Purported preventions, including "vaccine"
           programs and protective hardware, are examined.  Illustration
Subjects:  Computer crime; Computers & computer technology
Type:      Feature
Length:    Long (31+ col inches)

89074853
Title:     Your Family Finances:  "Credit Doctors" Can Hurt You
Authors:   Plawin, Paul; Kainen, Bertha; Buttenheim, Alison
Journal:   Changing Times  Vol: 43  Iss: 8  Date: Aug 1989  pp: 78
           Jrnl Code: GCHT  ISSN: 0009-143X  Jrnl Group: Business;
           Socio/Environmental
Abstract:  People can steal data from a computerized file and sell the names
           and information of people with good credit to people with the same
           name whose credit is poor.  Illustration
Subjects:  Credit; Computer crime; Theft
Type:      Commentary
Length:    Short (1-9 col inches)

89070945
Title:     A Secret No More
Authors:   Kerr, Susan
Journal:   Datamation  Vol: 35  Iss: 13  Date: Jul 1, 1989  pp: 53-55
           Jrnl Code: DAT  ISSN: 0011-6963  Jrnl Group: Business; SciTech
Abstract:  As distributed processing and applications such as electronic mail
           grow, companies are concerned about data security, and they are
           evaluating their vulnerability to electronic breaches.  Data
           encryption is one solution.  Illustration
Subjects:  Security systems; Computer crime
Type:      Feature
Length:    Long (31+ col inches)

89070893
Title:     'Virus' Attacks ANPA's Computer
Authors:   Fitzgerald, Mark
Journal:   Editor & Publisher  Vol: 122  Iss: 26  Date: Jul 1, 1989  pp: 34
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  A computer virus recently contaminated all of the software in the
           American Newspaper Publishers Association's desktop publishing
           laboratory.  Three virus cleaners were used to disinfect the
           laboratory.
Subjects:  Newspapers; Computers & computer technology; Computer crime;
           American Newspaper Publishers Association
Type:      News
Length:    Medium (10-30 col inches)

89066677
Title:     Software At-A-Glance:  Virex
Authors:   Gordon, Molly
Journal:   Electronic Learning  Vol: 8  Iss: 8  Date: Jun 1989  pp: 51
           Jrnl Code: GELL  ISSN: 0278-3258  Jrnl Group: SciTech
Abstract:  Molly Gordon reviews Virex, a software package that detects and
           repairs contamination by scores, nVir, and Peace viruses.  The
           package, for the Macintosh Plus/SE/II, is from HJC Software.
Subjects:  Software; Computer crime  Products: HJC Virex
Companies: HJC Software
Type:      Product Review-Favorable
Length:    Short (1-9 col inches)

89062041
Title:     Colleges Seem Vulnerable to Legal Actions Arising from Computer
           Viruses
Authors:   Moore, Thomas H
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 42  Date: Jun 28, 1989
           pp: A1, A20
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  A report issued by the American Council on Education and the United
           Educators Insurance Risk Retention Group concludes that colleges and
           universities are unusually vulnerable to lawsuits arising from
           computer viruses and must take steps to reduce their liability.  The
           report is examined.
Subjects:  Computer crime; Lawsuits; Colleges & universities; Liability
Type:      Feature
Length:    Medium (10-30 col inches)

89059272
Title:     Let's Get Reckless
Authors:   Gaines, Donna
Journal:   Village Voice  Vol: 34  Iss: 23  Date: Jun 6, 1989  pp: S4, S15
           Jrnl Code: GVIV  ISSN: 0042-6180  Jrnl Group: Commentary
Abstract:  The developing social importance of computer viruses is explored.
           Computer hacking and computer viruses have penetrated the
           consciousness of the mainstream media and are being countered by
           federal legislation.  Illustration
Subjects:  Computer crime; Social conditions & trends
Type:      Commentary
Length:    Medium (10-30 col inches)

89053593
Title:     The Missing Lists
Authors:   Steacy, Anne
Journal:   Maclean's  Vol: 102  Iss: 20  Date: May 15, 1989  pp: 58
           Jrnl Code: GMAC  ISSN: 0024-9262  Jrnl Group: News
Abstract:  A series of break-ins at the offices of Toronto Canada-based
           environmental groups involving computer lists and data banks have
           raised suspicions that Canadian government organizations might be
           looking for information to discredit the groups.  Photograph
Subjects:  Crime & criminals; Computer crime; Environment; Activism; Toronto
           Ontario Canada
Type:      Feature
Length:    Medium (10-30 col inches)

89049351
Title:     The Tampa Media-Espionage Case
Authors:   Hoyt, Michael
Journal:   Columbia Journalism Review  Vol: 28  Iss: 1  Date: May 1989  
           pp: 27-31
           Jrnl Code: GCJR  ISSN: 0010-194X  Jrnl Group: Academic
Abstract:  Michael Shapiro, assistant news director at WTSP-TV in St.
           Petersburg Fl and computer hacker, is accused of using his computer
           modem at home to break into his competitor's files.  The case is
           discussed.  Photograph
Subjects:  Computer crime; Television news; Competition; Journalism &
           journalists
Names:     Shapiro, Michael
Type:      Feature
Length:    Long (31+ col inches)

89046556
Title:     Avoiding Virus Hysteria
Authors:   Honan, Patrick
Journal:   Personal Computing  Vol: 13  Iss: 5  Date: May 1989  pp: 84-92
           Jrnl Code: PSC  ISSN: 0192-5490  Jrnl Group: SciTech
Abstract:  Common-sense strategies and a few good tools can help keep a
           company's data and equipment safe from computer viruses, time bombs
           or Trojan horses.  Illustration; Photograph
Subjects:  Computer crime; Computers & computer technology; Security systems
Type:      Feature
Length:    Long (31+ col inches)

89037736
Title:     Student Acted Alone in Spreading Computer 'Worm,' Cornell Report
           Says
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 30  Date: Apr 5, 1989  
           pp: A18
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  A report from Cornell University says that Robert T.  Morris Jr, a
           graduate student at the university, acted alone in November 1988
           when he released on a national research network a computer program
           that slowed or halted as many as 6,000 computers in the US.
Subjects:  Computer crime; Colleges & universities; Students; Cornell
           University
Names:     Morris, Robert T Jr
Type:      Feature
Length:    Medium (10-30 col inches)

89035435
Title:     Computer Viruses:  An Epidemic Real or Imagined?
Authors:   Chaffin, Ellen
Journal:   Electronic Learning  Vol: 8  Iss: 6  Date: Apr 1989  pp: 36-37
           Jrnl Code: GELL  ISSN: 0278-3258  Jrnl Group: SciTech
Abstract:  Computer viruses have become an unpleasant fact of life.  Tips are
           given to combat the problems a computer virus may cause.  Much of
           the damage done by the virus is caused by of carelessness.  
           Illustration
Subjects:  Computer crime; Computers & computer technology
Type:      Feature
Length:    Long (31+ col inches)

89031460
Title:     German Computer Spy Ring Broken
Authors:   Marshall, Eliot
Journal:   Science  Vol: 243  Iss: 4898  Date: Mar 24, 1989  pp: 1545
           Jrnl Code: GSCI  ISSN: 0036-8075  Jrnl Group: SciTech; Academic
Abstract:  The arrest of three West German techno-vandals in March, 1989 ended
           a two year investigation of security breaches of computers from a US
           military base in Japan to a laboratory in California to several
           German universities and research institutes.
Subjects:  Computer crime; Espionage; Investigations; West Germany
Names:     Hess, Markus
Type:      General Information
Length:    Medium (10-30 col inches)

89027847
Title:     Art ATMs Easy Targets for Crooks?
Authors:   Cole, Patrick; Levine, Jonathan B
Journal:   Business Week  Iss: 3094  Date: Mar 6, 1989  pp: 30
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  Computer systems that monitor electronic transfers are becoming an
           easy target for criminal operations.  Several recent incidents are
           described.  Photograph
Subjects:  Computer crime; Banks & banking; Automated teller machines--ATM;
           Crime & criminals
Type:      General Information
Length:    Medium (10-30 col inches)

89026462
Title:     Information (Mis)management
Authors:   Thompson, Tom
Journal:   Byte  Vol: 14  Iss: 3  Date: Mar 1989  pp: MAC 2
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  Computer viruses and worms can destroy data and infect computer
           systems.  Safeguards are necessary so that viruses do not imperil
           the free exchange of information among programmers who fear
           infection.
Subjects:  Computers & computer technology; Computer crime; Sabotage
Type:      Editorial
Length:    Medium (10-30 col inches)

89025356
Title:     The Global Village under Seige--We've Met the Enemy and He Is Us
Authors:   Thornburg, David D
Journal:   Compute!  Vol: 11  Iss: 3  Date: Mar 1989  pp: 13
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  While personal workstations are good, interconnecting with a network
           can provide advantages.  Networking is now being challenged by fears
           of computer viruses.
Subjects:  Computer networks; Computers & computer technology; Computer crime
Type:      Commentary
Length:    Medium (10-30 col inches)

89018587
Title:     The Virus Cure
Authors:   McAfee
Journal:   Datamation  Vol: 35  Iss: 4  Date: Feb 15, 1989  pp: 29-40
           Jrnl Code: DAT  ISSN: 0011-6963  Jrnl Group: SciTech; Business
Abstract:  Computer viruses are plaguing many of the large computer networks.
           Over 300 major virus attacks happened in the first seven months of
           1988.  Advice on how to prevent viruses and recover when they occur
           is given.  Illustration
Subjects:  Computer crime; Computer networks; Computers & computer technology;
           Viruses
Type:      Feature
Length:    Long (31+ col inches)

89016758
Title:     Student Linked to Computer 'Virus' Granted Immunity by U. S.
           Attorney
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 22  Date: Feb 8, 1989  
           pp: A2
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Robert T.  Morris, the Cornell University student believed to be the
           creator of the computer "virus" that paralyzed a national research
           network in 1988, has been granted limited immunity by the US
           Attorney's office in Syracuse New York.
Subjects:  Computer crime
Names:     Morris, Robert T
Type:      News
Length:    Short (1-9 col inches)

89014959
Title:     Avoid It Like the Plague:  Protecting Yourself from Computer Virus
           Attacks
Authors:   Esters, Stephanie D
Journal:   Black Enterprise  Vol: 19  Iss: 7  Date: Feb 1989  pp: 55-56
           Jrnl Code: BEN  ISSN: 0006-4165  Jrnl Group: Business;
           Socio/Environmental
Abstract:  Protecting computer systems against viruses has become a top
           priority for government, academia and business.  Computer crime is
           responsible for $5 billion in losses annually.  Several antiviral
           programs are described.
Subjects:  Computers & computer technology; Computer crime; Software
Type:      General Information
Length:    Long (31+ col inches)

89012668
Title:     Blanket Security
Authors:   Perdue, Lewis
Journal:   PC World  Vol: 7  Iss: 2  Date: Feb 1989  pp: 164-167
           Jrnl Code: GPCW  ISSN: 0737-8939  Jrnl Group: SciTech
Abstract:  Computer crime is a serious problem and PC users are fighting back
           with extra-strength security precautions.  Physical protection, data
           encryption and passwords are a few ways to protect these computers.
           Table; Illustration
Subjects:  Computer crime; Personal computers; Security systems
Type:      Feature
Length:    Long (31+ col inches)

89012658
Title:     Chicken Pox or Chicken Little?
Authors:   Dolce, Mary A
Journal:   PC World  Vol: 7  Iss: 2  Date: Feb 1989  pp: 280
           Jrnl Code: GPCW  ISSN: 0737-8939  Jrnl Group: SciTech
Abstract:  The fear of computer viruses has been somewhat misleading.  Software
           saboteurs prefer to attack large companies rather than PC users in
           general.  Users can take some simple precautions against the threat
           of destructive software.
Subjects:  Software; Computer crime
Type:      Commentary
Length:    Medium (10-30 col inches)

89007662
Title:     Computer Flu is After You
Authors:   Boudette, Neal E.
Journal:   Industry Week  Vol: 238  Iss: 2  Date: Jan 16, 1989  pp: 39-40
           Jrnl Code: IW  ISSN: 0039-0895  Jrnl Group: Business
Abstract:  Companies shouldn't think themselves immune to computer viruses.
           Companies must reevaluate their computer security policies and
           proceedures, and use consultants to fix problems before their
           computer systems catch a virus.  Illustration
Subjects:  Computer crime; Business & industry; Security systems
Type:      Feature
Length:    Medium (10-30 col inches)

89006239
Title:     Drop the Phone
Authors:   Anonymous
Journal:   Time  Vol: 133  Iss: 2  Date: Jan 9, 1989  pp: 49
           Jrnl Code: GTIM  ISSN: 0040-781X  Jrnl Group: News
Abstract:  Kevin Mitnick, who has a long record of computer crime, is currently
           facing a possible 30 years in prison and a $750,000 fine for several
           crimes covered by a new federal law that prohibits breaking into an
           interstate computer network for criminal purposes.  Mitnick commits
           most of his crimes via the telephone.  Photograph
Subjects:  Computer crime; Crime & criminals; Computer networks; Telephones
Names:     Mitnick, Kevin
Type:      News
Length:    Short (1-9 col inches)

89004747
Title:     The Data Bandits
Authors:   Adney, William M.; Kavanagh, Douglas E.
Journal:   Byte  Vol: 14  Iss: 1  Date: Jan 1989  pp: 267-270
           Jrnl Code: BYT  ISSN: 0360-5280  Jrnl Group: SciTech
Abstract:  Possible security threats to a LAN are discussed, including viruses,
           data theft and accidental data destruction.  Tips on making a LAN
           more secure are offered.  Photograph
Subjects:  Computer networks; Computer crime; Security systems
Type:      Feature
Length:    Long (31+ col inches)

89004699
Title:     ComputerScan:  Antiviral Shields
Authors:   Branwyn, Gareth; Clabaugh, Gavin
Journal:   Futurist  Vol: 23  Iss: 1  Date: Jan 1989  pp: 38
           Jrnl Code: FUS  ISSN: 0016-3317  Jrnl Group: Socio/Environmental;
           SciTech
Abstract:  Branwyn and Clabaugh review InterPath's new anti-computer virus
           shield C-4, short for Cylene-4.
Subjects:  Software; Computer crime  Products: InterPath C-4
Companies: InterPath Corp
Type:      Product Review-Favorable
Length:    Short (1-9 col inches)

89003483
Title:     Disease of the Year:  Illness of Glitch
Authors:   Vogel, Shawna
Journal:   Discover  Vol: 10  Iss: 1  Date: Jan 1989  pp: 64-66
           Jrnl Code: GDIS  ISSN: 0274-7529  Jrnl Group: SciTech
Abstract:  The most talked-about virus of 1988 infects computers, not
           organisms.  Computer viruses are programs that destroy other
           programs and data by incessantly replicating themselves, similar to
           a viral infection in the body.  Illustration; Photograph
Subjects:  Computer crime; Computer programming & languages; Viruses
Names:     Morris, Robert Jr
Type:      Feature
Length:    Long (31+ col inches)

89000654
Title:     Revenge of the Nerds
Authors:   Martin, Nicholas
Journal:   Washington Monthly  Vol: 20  Iss: 12  Date: Jan 1989  pp: 21-24
           Jrnl Code: GTWM  ISSN: 0043-0633  Jrnl Group: Commentary
Abstract:  The real problem with computer viruses, like the one recently
           created by Robert T.  Morris Jr, isn't the brilliant programmers,
           but the easy access to classified data and the dearth of security
           measures.  Illustration
Subjects:  Computer crime; Computers & computer technology; Security systems;
           Classified information
Names:     Morris, Robert T Jr
Type:      Commentary
Length:    Long (31+ col inches)

88178609
Title:     Greater Awareness of Security in Aftermath of Computer Worm
Authors:   Shulman, Seth; Palca, Joseph
Journal:   Nature  Vol: 336  Iss: 6197  Date: Nov 24, 1988  pp: 301
           Jrnl Code: GNAA  ISSN: 0028-0836  Jrnl Group: Academic; SciTech
Abstract:  The recent attack of an unauthorized computer program upon thousands
           of computer systems around the US using the ARPANET, Milnet and NSF
           Net computer networks and the ensuing debate over the need for
           increased security are described.  Illustration
Subjects:  Computers & computer technology; Computer crime; Security systems
Type:      Feature
Length:    Medium (10-30 col inches)

88178491
Title:     Networked Computers Hit by Intelligent 'Virus'
Authors:   Palca, Joseph; Shulman, Seth
Journal:   Nature  Vol: 336  Iss: 6195  Date: Nov 10, 1988  pp: 97
           Jrnl Code: GNAA  ISSN: 0028-0836  Jrnl Group: Academic; SciTech
Abstract:  Thousands of people using the UNIX computer operating system were
           infiltrated via electronic mail during Nov 1988.  The virus, which
           was created by Robert T.  Morris, a graduate student in computer
           science at Cornell University in Ithaca NY, is discussed.
Subjects:  Computers & computer technology; Computer crime; Electronic mail
Names:     Morris, Robert T Jr
Type:      News
Length:    Medium (10-30 col inches)

88174189
Title:     Minding the Store:  Part Two
Authors:   Hirsch, Rudolph E
Journal:   Public Relations Journal  Vol: 44  Iss: 5  Date: May 1988  pp: 39
           Jrnl Code: PRJ  ISSN: 0033-3670  Jrnl Group: Business
Abstract:  System unavailability due to human error or natural disasters is a
           common computer-security problem.  The best precaution against
           system unavailability is duplexing, having two of a given component.
           The process is described.  (Part 2 of a series)
Subjects:  Computers & computer technology; Software; Computer crime
Type:      Feature
Length:    Medium (10-30 col inches)

88165977
Title:     The 25 Most Intriguing People:  The Cyberpunk
Authors:   Anonymous
Journal:   People Weekly  Vol: 30  Iss: 26  Date: Dec 26, 1988  pp: 50
           Jrnl Code: GPEW  ISSN: 0093-7673  Jrnl Group: Lifestyles
Abstract:  In the world of computer hackers, the "Cyberpunk" probes the
           weaknesses in electronic security systems, breaking into computer
           networks, altering data, and unleashing microchip mayhem.  
           Photograph
Subjects:  Computer crime
Type:      News
Length:    Short (1-9 col inches)

88162631
Title:     Another Infection
Authors:   Anonymous
Journal:   Time  Vol: 132  Iss: 24  Date: Dec 12, 1988  pp: 33
           Jrnl Code: GTIM  ISSN: 0040-781X  Jrnl Group: News
Abstract:  Only five weeks after the Defense Department's Arpanet computer
           network was infected by a computer virus, the Mitre Corp has warned
           the Pentagon that the Milnet military information system has also
           been violated.
Subjects:  Computer crime; Computer networks; Department of Defense
Companies: Mitre Corp
Type:      News
Length:    Short (1-9 col inches)

88159822
Title:     The Viral Age
Authors:   Hodges, Parker
Journal:   Datamation  Vol: 34  Iss: 24  Date: Dec 1, 1988  pp: 96
           Jrnl Code: DAT  ISSN: 0011-6963  Jrnl Group: SciTech; Business
Abstract:  An editorial reflects on the vulnerability of computer networks to
           viruses.  Throughout history, crimes have grown naturally from
           technology and have become definitive of an era.
Subjects:  Computers & computer technology; Computer crime
Type:      Editorial
Length:    Medium (10-30 col inches)

88158631
Title:     Look Out Virus-Spreaders!
Authors:   Aycock, Heidi E. H.
Journal:   Compute!  Vol: 10  Iss: 12  Date: Dec 1988  pp: 7
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  A proposed bill in the US House of Representatives provides criminal
           penalties and allows civil suits aginst people who affect, or could
           affect, interstate or foreign commerce by inserting viruses in
           computer systems.
Subjects:  Computer crime; Laws & legislation
Type:      News
Length:    Medium (10-30 col inches)

88157268
Title:     An Ounce of Prevention
Authors:   Borts, Andrew D.; Zatz, Martin J.
Journal:   inCider  Vol: 6  Iss: 12  Date: Dec 1988  pp: 60-61
           Jrnl Code: GINC  ISSN: 0740-0101  Jrnl Group: SciTech
Abstract:  Guidelines are given for avoiding a computer virus.  A user should
           resist the temptation to download directly to the hard drive to
           lessen the chance of a virus.
Subjects:  Computer crime; Computers & computer technology
Type:      General Information
Length:    Short (1-9 col inches)

88152319
Title:     Security Officials Ask Researchers Not to Make 'Virus' Copies
           Available
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 13  Date: Nov 23, 1988
           pp: A1, A12
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Officials at the National Computer Security Center, a division of
           the National Security Agency, have asked researchers not to share
           copies of the computer-network virus that attacked 6,000 scientific
           and academic computers recently.
Subjects:  Computer crime; National Computer Security Center
Type:      Feature
Length:    Long (31+ col inches)

88152249
Title:     Overreaction to External Attacks on Computer Systems Could Be More
           Harmful than the Viruses Themselves
Authors:   King, Kenneth M.
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 13  Date: Nov 23, 1988
           pp: A36
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  The recent "virus" attack on computers linked to a major research
           network may result in resistance to linking instututional computers
           to networks, but these networks are important to scholars and
           administrators.  Illustration
Subjects:  Computers & computer technology; Computer networks; Computer crime
Type:      Commentary
Length:    Long (31+ col inches)

88151032
Title:     Computer Abuse:  Chain Mail
Authors:   Anonymous
Journal:   Economist  Vol: 309  Iss: 7577  Date: Nov 19, 1988  pp: 98-100
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: News; Business
Abstract:  Robert Morris used a "trap-door" in the Unix electronic mail program
           to cause a chain reaction that brought thousands of computers to a
           halt.  Some  lawyers feel that America's computer crime statutes
           need to be examined.
Subjects:  Computer crime; Laws & legislation; Computer programming &
           languages; United States--US
Names:     Morris, Robert
Type:      Feature
Length:    Medium (10-30 col inches)

88150295
Title:     Computer 'Viruses' Are Seen as Hard to Stop on Open Academic
           Networks
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 12  Date: Nov 16, 1988
           pp: A13, A18
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  The computer "virus" that recently infected research networks has
           college administrators worried about whether a recurrence can be
           prevented.  Photograph
Subjects:  Computers & computer technology; Colleges & universities; Computer
           crime
Type:      Feature
Length:    Medium (10-30 col inches)

88150291
Title:     Computer Infections Can Often Hide in Software and Then Start to
           Spread
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 12  Date: Nov 16, 1988
           pp: A18
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Software viruses are hidden in programs, transferred to computer
           memories when the programs are run, and then transferred again to
           other disks or programs used in the infected computer.
Subjects:  Computers & computer technology; Computer crime
Type:      General Information
Length:    Medium (10-30 col inches)

88150290
Title:     A Professor Seeks a Universal Antidote
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 12  Date: Nov 16, 1988
           pp: A18
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  John Robert Cordani believes scientists can find the "theoretical
           underpinnings" of computer viruses, and thus develop a universal
           antidote.
Subjects:  Computer crime
Names:     Cordani, John Robert
Type:      General Information
Length:    Short (1-9 col inches)

88150289
Title:     Chances of Catching Viruses Are Slim if Precautions Are Taken,
           Experts Say
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 35  Iss: 12  Date: Nov 16, 1988
           pp: A18
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Computer experts at Cornell University say that computer viruses may
           not be entirely avoidable, but the chances of catching them are slim
           if users take precautions.
Subjects:  Computers & computer technology; Computer crime
Type:      General Information
Length:    Short (1-9 col inches)

88149867
Title:     Rapid Spread of Virus Confirms Fear about Danger to Computers
Authors:   Nordwall, Bruce D.
Journal:   Aviation Week & Space Technology  Vol: 129  Iss: 20  
           Date: Nov 14, 1988  pp: 44
           Jrnl Code: AWS  ISSN: 0005-2175  Jrnl Group: SciTech; Business
Abstract:  The virus that infested several thousand computers in November 1988
           confirms the growing concern about the security of computer
           networks.  The virus was reputedly spread by Cornell University
           graduate student Robert T.  Morris, Jr.
Subjects:  Computer crime; Computers & computer technology; Security systems
Names:     Morris, Robert T Jr
Type:      News
Length:    Medium (10-30 col inches)

88148517
Title:     Worm Invades Computer Networks
Authors:   Marshall, Eliot
Journal:   Science  Vol: 242  Iss: 4880  Date: Nov 11, 1988  pp: 855-856
           Jrnl Code: GSCI  ISSN: 0036-8075  Jrnl Group: SciTech; Academic
Abstract:  Internet, the major computer network for researchers in the US and
           overseas, was disrupted for two days last week due to the presence
           of a computer virus.  The virus and attempts by computer experts at
           the University of California at Berkeley and the Massachusetts
           Institute of Technology to cure it are examined.
Subjects:  Computer crime; Computer networks; University of
           California-Berkeley; Massachusetts Institute of Technology
Type:      News
Length:    Long (31+ col inches)

88144157
Title:     The Assault on Data Security Is Getting a Lot of Attention
Authors:   Manuel, Tom; Shandle, Jack; Naegele, Tobias
Journal:   Electronics  Vol: 61  Iss: 17  Date: Nov 1988  pp: 136-142
           Jrnl Code: GELS  ISSN: 0883-4989  Jrnl Group: SciTech
Abstract:  There are two separate problems to be dealt with in safeguarding
           data security:  keeping outsiders off the system and preventing
           disgruntled  or criminally inclined employees from attacking it.
           Restricting access is in some ways the hardest to accomplish.  
           Illustration; Photograph
Subjects:  Computers & computer technology; Security systems; Computer crime;
           Security personnel
Type:      Feature
Length:    Long (31+ col inches)

88131293
Title:     Vengeance by 'Virus'
Authors:   Lord, Lew; Stanglin, Douglas; Galloway, Joseph L.; Rosenberg,
           Robert; Satchell, Michael; et al.
Journal:   U.S. News & World Report  Vol: 105  Iss: 13  Date: Oct 3, 1988  
           pp: 10
           Jrnl Code: GUNW  ISSN: 0041-5537  Jrnl Group: News
Abstract:  Last week Donald Burleson, an insurance firm's director of computer
           security, became the first person ever convicted of destroying
           crucial data by implanting codes in computer programs.  Burleson's
           crime involved an early form of what are now known as "viruses."
Subjects:  Computers & computer technology; Crime & criminals; Computer crime
Names:     Burleson, Donald
Type:      News
Length:    Short (1-9 col inches)

88127257
Title:     Viruses and Trojans Strike--But Very Rarely
Authors:   Getts, Judy
Journal:   PC World  Vol: 6  Iss: 10  Date: Oct 1988  pp: 72-74
           Jrnl Code: GPCW  ISSN: 0737-8939  Jrnl Group: SciTech
Abstract:  Much of the concern about computer viruses has been exaggerated.
           Users who frequently download from bulletin boards or exchange
           software via floppy disk are at higher risk.  Steps users can take
           to protect against viruses are outlined.  Illustration
Subjects:  Computer crime; Software
Type:      General Information
Length:    Medium (10-30 col inches)

88117361
Title:     'Virus Attacks'
Authors:   Rosenberg, Jim
Journal:   Editor & Publisher  Vol: 121  Iss: 36  Date: Sep 3, 1988  
           pp: 19pc, 40pc+
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  A contagion of about 40 computer viruses has prompted a concern
           about high-tech hygiene for newspaper PC systems managers,
           technicians and engineers.
Subjects:  Newspapers; Personal computers; Computer crime
Type:      Feature
Length:    Long (31+ col inches)

88117355
Title:     Avoiding Virus Infection
Authors:   Fitzgerald, Mark
Journal:   Editor & Publisher  Vol: 121  Iss: 36  Date: Sep 3, 1988  pp: 41pc
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  Although the Long Island "Newsday" may seem to be vulnerable to
           viruses because it operates the Newsday Electronic Bulletin Board,
           there have been no problems so far.
Subjects:  Newspapers; Computer crime
Companies: Newsday
Type:      News
Length:    Short (1-9 col inches)

88116399
Title:     Tomorrow's Thieves
Authors:   Albanese, Jay S.
Journal:   Futurist  Vol: 22  Iss: 5  Date: Sep 1988  pp: 24-28
           Jrnl Code: FUS  ISSN: 0016-3317  Jrnl Group: Socio/Environmental;
           SciTech
Abstract:  The advent of computers have provided the latest opportunity
           resource for criminal misuse.  Fraud will likely become the most
           prevalent form of theft in the computer age.  Photograph; Table
Subjects:  Theft; Computer crime; Law enforcement
Type:      Feature
Length:    Long (31+ col inches)

88116380
Title:     Computer Viruses:  The "AIDS" of the Information Age?
Authors:   Halal, William E.
Journal:   Futurist  Vol: 22  Iss: 5  Date: Sep 1988  pp: 60
           Jrnl Code: FUS  ISSN: 0016-3317  Jrnl Group: Socio/Environmental;
           SciTech
Abstract:  One solution to the problems posed by computer viruses is simply to
           be careful when using computers and use safe computing procedures.
Subjects:  Computer crime
Type:      Commentary
Length:    Medium (10-30 col inches)

88115135
Title:     On Your Computer:  Where's the Viral Epidemic?
Authors:   Frailey, Fred W.; Goldwasser, Joan; Willenbrink, Kristin
Journal:   Changing Times  Vol: 42  Iss: 9  Date: Sep 1988  pp: 98-99
           Jrnl Code: GCHT  ISSN: 0009-143X  Jrnl Group: Socio/Environmental;
           Business
Abstract:  Computer viruses are most commonly a shareware program that has been
           downloaded from a bulletin board or software that someone passed on.
Subjects:  Computer crime; Computers & computer technology
Type:      General Information
Length:    Medium (10-30 col inches)

88110258
Title:     The New Office:  An RX for Healthy Software
Authors:   McCandless, Holloway
Journal:   Working Woman  Vol: 13  Iss: 9  Date: Sep 1988  pp: 33
           Jrnl Code: WKW  ISSN: 0145-5761  Jrnl Group: Lifestyles; Business
Abstract:  One way companies can protect their software from computer viruses
           is by keeping their system as isolated as possible.
Subjects:  Computer crime; Software; Business & industry
Type:      General Information
Length:    Medium (10-30 col inches)

88106102
Title:     Sick Computers
Authors:   Welter, Therese R.
Journal:   Industry Week  Vol: 237  Iss: 4  Date: Aug 15, 1988  pp: 51-55
           Jrnl Code: IW  ISSN: 0039-0895  Jrnl Group: Business
Abstract:  Computer viruses, a form of electronic sabotage, are occurring more
           frequently nowadays.  To help control them, a careful policy needs
           to be established on the use of electronic bulletin boards and
           public domain software.  Illustration
Subjects:  Computers & computer technology; Security systems; Computer crime
Type:      Feature
Length:    Medium (10-30 col inches)

88103547
Title:     Ex-Employee Sentenced in Cheyney U. Grade Case
Authors:   Anonymous
Journal:   Chronicle of Higher Education  Vol: 34  Iss: 47  Date: Aug 3, 1988  
           pp: A2
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Joseph J.  Johnson, a former employee of Cheyney State University
           has been sentenced to 3 to 23 months in prison for changing the
           grades of students who paid him to do so.
Subjects:  Students; Crime & criminals; Colleges & universities; Computer
           crime; Cheyney University
Names:     Johnson, Joseph J
Type:      News
Length:    Short (1-9 col inches)

88103071
Title:     Is Your Computer Secure
Authors:   Hafner, Katherine M.; Lewis, Geoff; Kelly, Kevin; Shao, Maria;
           Hawkins, Chick; Angiolillo, Paul
Journal:   Business Week  Iss: 3063  Date: Aug 1, 1988  pp: 64-72
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  America's information systems are alarmingly vulnerable to high-tech
           bandits, hackers, disgruntled workers and natural disasters.
           Moreover, as PCs proliferate, the problem can only grow worse.
           Computer crime is examined.  Photograph; Illustration; Graph
Subjects:  Computers & computer technology; Computer crime; High tech
           industries
Type:      Feature
Length:    Long (31+ col inches)

88103070
Title:     How Uncle Sam's Cloak-And-Data Boys Are Fighting Back
Authors:   Port, Otis
Journal:   Business Week  Iss: 3063  Date: Aug 1, 1988  pp: 72
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  Penetration of government computers--particularly military
           systems--is a deadly serious matter for the National Security Agency
           and for counterintelligence agents at the FBI.  Photograph
Subjects:  Computer crime; National security; Classified information; National
           Security Agency
Type:      General Information
Length:    Medium (10-30 col inches)

88103057
Title:     A German Hackers' Club that Promotes Creative Chaos
Authors:   Schares, Gail
Journal:   Business Week  Iss: 3063  Date: Aug 1, 1988  pp: 71
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  Hackers with the Hamburg, West Germany-based Chaos Computer Club use
           their computing skills to increase public access to information
           instead of sabotaging databases.  Members believe that access to
           electronic information cost too much in Germany.  Photograph
Subjects:  Computers & computer technology; Computer crime; Chaos Computer Club
Names:     Fix, Bernd
Type:      General Information
Length:    Medium (10-30 col inches)

88103041
Title:     Editorials:  Treat Computer Data Like the Crown Jewels
Authors:   Anonymous
Journal:   Business Week  Iss: 3063  Date: Aug 1, 1988  pp: 108
           Jrnl Code: BWE  ISSN: 0739-8395  Jrnl Group: Business
Abstract:  An editorial states that as the complex networks of computers built
           by business and government assume more and more tasks, they produce
           a whole new set of risks:  computer viruses.
Subjects:  Computers & computer technology; Computer crime
Type:      Editorial
Length:    Medium (10-30 col inches)

88101861
Title:     Editorial License
Authors:   Keizer, Gregg
Journal:   Compute!  Vol: 10  Iss: 8  Date: Aug 1988  pp: 4
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  An editorial discusses the transmission and prevention of computer
           viruses.
Subjects:  Computers & computer technology; Computer crime
Type:      Editorial
Length:    Medium (10-30 col inches)

88101823
Title:     Compute Specific--Off the Mac Wire
Authors:   Aker, Sharon Zardetto
Journal:   Compute!  Vol: 10  Iss: 8  Date: Aug 1988  pp: 49
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  A computer virus has been showing up on Macintosh systems that
           destroys files and can randomly erase data.  The outbreaks have
           centered around Dallas and Washington DC.
Subjects:  Computer crime; Computers & computer technology; Personal computers
Type:      News
Length:    Short (1-9 col inches)

88092802
Title:     Keeping Out of the Kaos Club
Authors:   Anonymous
Journal:   Economist  Vol: 308  Iss: 7558  Date: Jul 9, 1988  pp: 78-79
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: News; Business
Abstract:  In response to ever-increasing occurrences of fraudsters, hackers
           and viruses violating computer networks, the computer industry is
           strengthening security measures for computer operating systems.  
           Photograph
Subjects:  Computers & computer technology; Security systems; Computer crime
Type:      Feature
Length:    Long (31+ col inches)

88089057
Title:     Impact
Authors:   Thornburg, David D.
Journal:   Compute!  Vol: 10  Iss: 7  Date: Jul 1988  pp: 10
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  Viruses, small programs embedded inside other programs, have the
           ability to replicate themselves and infect almost any program on a
           disk, including parts of an operating system.  Viruses are, at best,
           nuisances and, at worst, they can damage computers.
Subjects:  Computers & computer technology; Computer crime; Computer
           programming & languages
Type:      Commentary
Length:    Medium (10-30 col inches)

88084661
Title:     Beware:  It's Virus Season
Authors:   Honan, Patrick
Journal:   Personal Computing  Vol: 12  Iss: 7  Date: Jul 1988  pp: 36
           Jrnl Code: PSC  ISSN: 0192-5490  Jrnl Group: SciTech
Abstract:  An anonymous company is working with Panda Systems to eliminate the
           software virus, dubbed the Sunnyvale Slug, which Panda Systems has
           removed from all but one of the company's computers.  Photograph
Subjects:  Computer crime; Computers & computer technology
Companies: Panda Systems
Type:      News
Length:    Short (1-9 col inches)

88075577
Title:     Compute!  Specific:  Mac--Virus and Vaccine
Authors:   Aker, Sharon Zardetto
Journal:   Compute!  Vol: 10  Iss: 6  Date: Jun 1988  pp: 44
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  A computer virus is a little program that's usually buried in
           another program; when the "host" program is run, your computer
           system catches the virus.  A specific Macintosh virus has surfaced,
           but a cure has been found.
Subjects:  Computer programming & languages; Computer crime
Type:      News
Length:    Short (1-9 col inches)

88075550
Title:     News & Notes:  New PC Virus Innoculation
Authors:   Karnes, Clifton
Journal:   Compute!  Vol: 10  Iss: 6  Date: Jun 1988  pp: 81
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  Lasertrieve has announced a revolutionary new service and product
           package called VirALARM.  It is designed to protect a PC from
           viruses by detecting infestation and alerting the user to their
           existence early.  Illustration
Subjects:  Computers & computer technology; Computer crime
Companies: Lasertrieve
Type:      News
Length:    Medium (10-30 col inches)

88071494
Title:     The Cost of Computer Crime
Authors:   San Segundo, Gonzalo
Journal:   World Press Review  Vol: 35  Iss: 6  Date: Jun 1988  pp: 47
           Jrnl Code: GWPR  ISSN: 0195-8895  Jrnl Group: News
Abstract:  The average net from a computer crime is about $220,000, while the
           conventional bank robbery will bring in about $6,600.  Only one in
           100 cases of computer crimes is punished by law.
Subjects:  Computer crime; White collar crime; Crime & criminals
Type:      Commentary
Length:    Medium (10-30 col inches)

88070487
Title:     "The Chairman" and His Board
Authors:   Bock, Gordon; McWhirter, William
Journal:   Time  Vol: 131  Iss: 22  Date: May 30, 1988  pp: 45
           Jrnl Code: GTIM  ISSN: 0040-781X  Jrnl Group: News
Abstract:  Gabriel Taylor, a clerk at the First National Bank of Chicago,
           electronically transferred funds to accounts under assumed names in
           Vienna.  If the scheme had succeeded, the conspirators would have
           gotten $68.7 million.  Photograph
Subjects:  Computer crime; Crime & criminals; Embezzlement
Names:     Taylor, Gabriel
Companies: First National Bank of Chicago
Type:      Feature
Length:    Medium (10-30 col inches)

88068234
Title:     Computer 'Virus' Hits First U.S. Newspaper
Authors:   Fitzgerald, Mark
Journal:   Editor & Publisher  Vol: 121  Iss: 21  Date: May 21, 1988  pp: 22
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  A computer virus has invaded the "Providence Journal-Bulletin,"
           making it the first newspaper to succumb to the unauthorized codes
           which secretly penetrate systems and wreak havoc.
Subjects:  Newspapers; Computer crime
Companies: Providence Journal-Bulletin
Type:      General Information
Length:    Medium (10-30 col inches)

88067609
Title:     Scientists Track Hacker to Find Flaws in Systems
Authors:   Turner, Judith Axler
Journal:   Chronicle of Higher Education  Vol: 34  Iss: 36  Date: May 18, 1988
           pp: A16
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  Scientists at the Lawrence Berkeley Laboratory tracked a West German
           computer hacker electronically for almost a year as he tried to
           enter 450 computers, and invaded 30, throughout the US.
Subjects:  Computer crime; West Germany; Lawrence Berkeley Laboratory
Type:      News
Length:    Short (1-9 col inches)

88060581
Title:     Compute!  Specific:  PC Virus
Authors:   Karnes, Clifton
Journal:   Compute!  Vol: 10  Iss: 5  Date: May 1988  pp: 39
           Jrnl Code: GCOE  ISSN: 0194-357X  Jrnl Group: SciTech
Abstract:  Computer viruses insinuate themselves into an operating system, and
           after a certain interval, do "something."  So far, no viruses have
           appeared on the IBM forums of CompuServe.
Subjects:  Computers & computer technology; Software; Computer crime
Companies: IBM Corp
Type:      News
Length:    Short (1-9 col inches)

88053577
Title:     When Bytes Bite Back
Authors:   Anonymous
Journal:   Economist  Vol: 307  Iss: 7547  Date: Apr 23, 1988  pp: 68
           Jrnl Code: ECT  ISSN: 0013-0613  Jrnl Group: News; Business
Abstract:  Costly problems in commercial computer systems are caused by
           fraudsters, hackers, disgruntled employees, accidents and human
           errors.  Few companies have adequate network security.  Illustration
Subjects:  Computer crime; Computers & computer technology
Type:      Feature
Length:    Short (1-9 col inches)

88030286
Title:     Spawning a Computer "Virus"
Authors:   White, Ron
Journal:   80 Micro  Iss: 98  Date: Mar 1988  pp: 16-18
           Jrnl Code: GEIM  ISSN: 0744-7868  Jrnl Group: SciTech
Abstract:  "Core wars" are battles between rival programs for control of a
           theoretical computer's operating system.  The game is designed for
           programmers to test their abilities against one another, but the
           principles behind these programs are similar to those in computer
           "viruses."  Photograph
Subjects:  Computer programming & languages; Games; Computer crime
Type:      General Information
Length:    Long (31+ col inches)

88023137
Title:     Companies Say Unauthorized Modifications of Systems to Permit Remote
           Entry Could Jeopardize Vendor Support
Authors:   Rosenberg, Jim
Journal:   Editor & Publisher  Vol: 121  Iss: 8  Date: Feb 20, 1988  pp: 35, 37
           Jrnl Code: GEDP  ISSN: 0013-094X  Jrnl Group: Business
Abstract:  Unauthorized entry into remote classified advertising through
           newspapers' computers may jeopardize vendor support for the
           advertising.
Subjects:  Fraud; Computers & computer technology; Computer crime; Newspapers
Type:      Feature
Length:    Long (31+ col inches)

88016993
Title:     The Online Underworld
Authors:   Scrogan, Len
Journal:   Classroom Computer Learning  Vol: 8  Iss: 5  Date: Feb 1988  
           pp: 58-60
           Jrnl Code: GCCL  ISSN: 0746-4223  Jrnl Group: SciTech
Abstract:  Every educator who introduces kids to telecommunications should also
           be aware of the illegal activities which might occur.  Teachers need
           to communicate the ethics of online behavior to students.
Subjects:  Education & schools; Computer crime; Computer programming &
           languages; Ethics
Type:      Feature
Length:    Long (31+ col inches)

88013032
Title:     Fighting Computer Crime
Authors:   Szabo, Joan C.
Journal:   Nation's Business  Vol: 76  Iss: 2  Date: Feb 1988  pp: 14
           Jrnl Code: NAB  ISSN: 0028-047X  Jrnl Group: Business
Abstract:  A new booklet from the SBA, "A Small Business Guide to Computer
           Security," gives guidelines on how small business can protect their
           computer operations.
Subjects:  Computer crime; Small business; Small Business Administration--SBA
Type:      Commentary
Length:    Short (1-9 col inches)

88011465
Title:     Crime in the Computer Age
Authors:   Wood, Chris
Journal:   Maclean's  Vol: 101  Iss: 5  Date: Jan 25, 1988  pp: 28-30
           Jrnl Code: GMAC  ISSN: 0024-9262  Jrnl Group: News
Abstract:  A discussion of computer crimes.  Photograph
Subjects:  Crime & criminals; Computers & computer technology
Type:      Feature
Length:    Long (31+ col inches)

88010266
Title:     Israeli University Offers Cure for Mysterious Computer 'Virus'
Authors:   Watzman, Herbert M.
Journal:   Chronicle of Higher Education  Vol: 34  Iss: 19  Date: Jan 20, 1988
           pp: A41
           Jrnl Code: GCHE  ISSN: 0009-5982  Jrnl Group: Academic
Abstract:  A electronic 'virus' programmed to damage and destroy software has
           been spreading across Israel.  Israeli University is handing out a
           cure for the 'virus' to those who need it.
Subjects:  Computer crime; Israel; Israeli University
Type:      News
Length:    Medium (10-30 col inches)