UnderGround Information
UnderGround Information
87031153
Title: The Technobandits
Authors: Gibbs, Nancy R
Journal: Time Vol: 130 Iss: 22 Date: Nov 30, 1987 pp: 42-44
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: The Charles McVey case highlights the problem of protecting secrets
in an open society. Because of stolen high-tech goods and secrets,
the US will insist on tighter enforcement and higher penalties for
violators that now exist.
Subjects: Crime & criminals; Computer crime; Smuggling; Espionage
Names: McVey, Henry
Type: News
Length: Long (31+ col inches)
87031026
Title: Computer Sabotage: Programmed to Sneeze
Authors: Anonymous
Journal: Economist Vol: 305 Iss: 7526 Date: Nov 28, 1987 pp: 90
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: Computer viruses are discussed. Almost every computer system is
vulnerable to viruses, which can crash programs or infect a memory
system. Catching a virus is easier than apprehending its creator.
Subjects: Computers & computer technology; Computer crime; Computer
programming & languages; Crime & criminals
Type: News
Length: Medium (10-30 col inches)
87029548
Title: Data Protection: Big Brother Is Being Watched
Authors: Anonymous
Journal: Economist Vol: 305 Iss: 7523 Date: Nov 7, 1987 pp: 63-66
Jrnl Code: ECT ISSN: 0013-0613 Jrnl Group: Business; News
Abstract: The Data Protection Act of 1984 is designed to look vigorously into
allegations of the misuse of personal data.
Subjects: Computer crime; Privacy; United Kingdom--UK
Type: Feature
Length: Medium (10-30 col inches)
87018129
Title: Don't Tread on My Data
Authors: Elmer-DeWitt, Phillip
Journal: Time Vol: 130 Iss: 1 Date: Jul 6, 1987 pp: 84
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: Richard Kusserow, after becoming inspector general for the
Department of Health and Human Services, decided to crack down on
computer fraud. In order to do this, however, there was an invasion
of privacy and the Fourth Amendment was violated. Photograph
Subjects: Privacy; Fraud; Computer crime; Investigations; Department of Health
& Human Services
Names: Kusserow, Richard
Type: Feature
Length: Medium (10-30 col inches)
87015192
Title: Brady: Byte-ing the Hand that Feeds It
Authors: Brady, James
Journal: Advertising Age Vol: 58 Iss: 23 Date: Jun 1, 1987 pp: 48
Jrnl Code: ADA ISSN: 0001-8899 Jrnl Group: Business
Abstract: "Trojan horses," computer programs that enter a system disguised as
something important and then erase or scramble vital information,
are discussed. These renegade programs are held up as justification
for ignoring the computer craze.
Subjects: Computer crime; Computers & computer technology; Computer
programming & languages
Type: Commentary
Length: Long (31+ col inches)
87000399
Title: Last Word
Authors: Graybill, Christopher
Journal: Omni Vol: 9 Iss: 4 Date: Jan 1987 pp: 114
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: Computer crimes of a different sort than embezzlement, fraud, or
virus-dropping are portrayed in a satiric short story.
Subjects: Short stories
Type: Fiction
Length: Medium (10-30 col inches)
86042465
Title: No Tempest in a Teapot
Authors: Donlan, Thomas G
Journal: Barron's Vol: 66 Iss: 39 Date: Sep 29, 1986 pp: 14, 53
Jrnl Code: BAR ISSN: 0005-6073 Jrnl Group: Business
Abstract: The development of microspy has enhanced the electronic
eavesdropping industry. The use of microspy by government
agencies--the NSA and the CIA--in keeping tabs on private industry
is discussed. Illustration
Subjects: Electronic eavesdropping; Intelligence gathering; Business &
industry; Computer crime; National Security Agency; Central
Intelligence Agency--CIA
Type: Feature
Length: Long (31+ col inches)
86039447
Title: House Panel Moves against Computer Fraud
Authors: Cohodas, Nadine
Journal: Congressional Quarterly Weekly Report Vol: 44 Iss: 19
Date: May 10, 1986 pp: 1038
Jrnl Code: GCQW ISSN: 0010-5910 Jrnl Group: Commentary; News
Abstract: The House Judiciary Committee on May 6, 1986 approved legislation to
help continue the federal government's crackdown on computer crime.
The legislation is examined.
Subjects: Laws & legislation; Computer crime; Federal government; House of
Representatives-Judiciary, Committee on the
Type: Feature
Length: Medium (10-30 col inches)
86031448
Title: Are Data Bases a Threat to National Security?
Authors: Starr, Barbara
Journal: Business Week Iss: 2975 Date: Dec 1, 1986 pp: 39
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: The Pentagon intends to add new controls over the contents of
computer data bases for fear of information reaching the Soviet
bloc. Computer data bases are goldmines for foreign agents
interested in technical and economic information. Illustration
Subjects: Classified information; Computer crime; Data bases; Government
regulation; Department of Defense
Type: Feature
Length: Medium (10-30 col inches)
86026687
Title: A Victory for the Pirates?
Authors: Elmer-DeWitt, Philip
Journal: Time Vol: 128 Iss: 16 Date: Oct 20, 1986 pp: 86
Jrnl Code: GTIM ISSN: 0040-781X Jrnl Group: News
Abstract: In an attempt to halt software piracy, the makers of
personal-computer software began copy protection measures. However,
consumer complaints that they are inconvenient, has caused the
companies to give up and remove them. Illustration
Subjects: Computers & computer technology; Personal computers; Software;
Computer crime; Piracy
Type: Feature
Length: Medium (10-30 col inches)
86015548
Title: Software Pirates Beware: Berkin Is Out for Blood
Authors: Ticer, Scott
Journal: Business Week Iss: 2951 Date: Jun 16, 1986 pp: 83
Jrnl Code: BWE ISSN: 0739-8395 Jrnl Group: Business
Abstract: Geoffrey A. Berkin, an associate general counsel at personal
computer software publisher Ashton-Tate Inc is profiled. Berkin's
efforts have earned Ashton-Tate the reputation of champion against
domestic piracy. Photograph
Subjects: Biographical profiles; Company profiles; Computer crime
Names: Berkin, Geoffrey A
Companies: Ashton-Tate Corp
Type: Feature
Length: Medium (10-30 col inches)
86014490
Title: 'Star Wars' Crime: New Threat to Corporate Security
Authors: McCartney, Laton
Journal: Business Month Vol: 127 Iss: 6 Date: Jun 1986 pp: 85-88
Jrnl Code: DMI ISSN: 0892-4090 Jrnl Group: Business
Abstract: Satellite espionage is a new and highly sophisticated kind of
computer larceny that could have disastrous consequences. Although
most satellites are built with some security measures, all of them
are vulnerable to interception or disruption by someone who knows
where the satellite is located, the frequency it uses for
transmission and the sender's code. Illustration
Subjects: Computers & computer technology; Computer crime; Satellites;
Espionage
Type: Feature
Length: Long (31+ col inches)
86014067
Title: Continuum: Computer Virus
Authors: Gross, Steve
Journal: Omni Vol: 8 Iss: 9 Date: Jun 1986 pp: 35
Jrnl Code: GOMN ISSN: 0149-8711 Jrnl Group: SciTech
Abstract: The traumas a computer virus can cause for a computer owner are
discussed. With the increasing use of computer bulletin boards,
killer programs are a threat to business and personal computer
systems alike.
Subjects: Computers & computer technology; Computer crime; Software
Type: Feature
Length: Medium (10-30 col inches)