1
0
mirror of https://github.com/opsxcq/mirror-textfiles.com.git synced 2025-08-06 01:57:29 +02:00
Files
mirror-textfiles.com/news.html

208 lines
31 KiB
HTML

<HTML>
<TITLE>T E X T F I L E S</TITLE>
<BODY BGCOLOR="#000000" TEXT="#00FF00" LINK="#00FF00" ALINK="#00AA00" VLINK="#00AA00">
<H1>News Stories</H1>
<P>
Before the news media made the transition to online servies, everything was
on paper, and if a BBS user wanted to share, they had to type in the entire
article themselves and pass it along. This directory will fill as time goes
on with professionally transcribed stories, but peppered here and there
are those labors of love, trying to spread the word.
<P>
<TABLE WIDTH=100%>
<TD BGCOLOR=#00FF00><FONT COLOR=#000000><B>Filename</B><BR></FONT></TD>
<TD BGCOLOR=#00DD00><FONT COLOR=#000000><B>Size</B><BR></FONT></TD>
<TD BGCOLOR=#00AA00><FONT COLOR=#000000><B>Description of the Textfile</B><BR></TD></TR>
<tab indent=60 id=T><br>
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/092793.txt">092793.txt</A> <tab to=T><TD> 4875<BR><TD> Computer Porn Case Triggers Legal Questions from Daily Oklahoman Newspaper (September 27, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/17arr.txt">17arr.txt</A> <tab to=T><TD> 2515<BR><TD> 17 Arrested in High-Tech Phone Fraud by Lee Catterall and William Green, Typed in by Skatepunk (1988)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/1stamend">1stamend</A> <tab to=T><TD> 6839<BR><TD> Showdown over Computer 'Crime" by Brooks Boliek (August 5, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/26008586.txt">26008586.txt</A> <tab to=T><TD> 22884<BR><TD> Excerpts from Various Issues of 2600 Magazine, by The Fixer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/2600dcr1.txt">2600dcr1.txt</A> <tab to=T><TD> 8042<BR><TD> Reports of "Raid" on 2600 Washington Meeting 11/09/92
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/2600dcr2.txt">2600dcr2.txt</A> <tab to=T><TD> 4525<BR><TD> Secret Service Role Questioned in "2600 Washington Raid" (November 10, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/2600dcr3.txt">2600dcr3.txt</A> <tab to=T><TD> 4451<BR><TD> Conflicting Stories in 2600 Raid (November 11, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/2600dcrp.txt">2600dcrp.txt</A> <tab to=T><TD> 6085<BR><TD> Hackers Allege Harassment at Mall; Pentagon City Guards Stop Meeting, Tell Computer Group to Leave. by Robert O'Harrow, Jr.
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/2600raid.txt">2600raid.txt</A> <tab to=T><TD> 21162<BR><TD> A Raid on a 2600 Meeting (November 7, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/adshack.hac">adshack.hac</A> <tab to=T><TD> 10821<BR><TD> The FBI Goes after ADS Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/agnts.nfo">agnts.nfo</A> <tab to=T><TD> 7878<BR><TD> Computer Criminal Caught After 10 Months On The Run by Keith Stone (August 30th, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/akronbbs.txt">akronbbs.txt</A> <tab to=T><TD> 12233<BR><TD> Police Say They Were Taking a Byte Out of Crime, by Charlene Nevada, Beacon Journal, March 22, 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/arrest.txt">arrest.txt</A> <tab to=T><TD> 2688<BR><TD> Two Juveniles Arrested in BBS Extortion Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/article.txt">article.txt</A> <tab to=T><TD> 2377<BR><TD> ASCII and Ye Shall Recieve (Analysis and Criticism by the Slipped Disk)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bardbyte.txt">bardbyte.txt</A> <tab to=T><TD> 8836<BR><TD> The Bard Bytes Dust, by Charles Burress (SF Chronicle, 1986) Typed in by The Unknown User
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/baudy.hac">baudy.hac</A> <tab to=T><TD> 88653<BR><TD> The Baudy World of the Byte Bandit: A Postmodernist Interpretation of the Computer Underground (Thesis, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bawdybds.txt">bawdybds.txt</A> <tab to=T><TD> 10976<BR><TD> Bulletin Bawdy, from "The Games Machine" July 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bbscase.txt">bbscase.txt</A> <tab to=T><TD> 11383<BR><TD> Akron BBS Trial Update: Dangerous Precedents in Sysop Prosecution
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bbscourt.txt">bbscourt.txt</A> <tab to=T><TD> 19292<BR><TD> About Litigation on BBSes in the USA, April, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bbssting.txt">bbssting.txt</A> <tab to=T><TD> 4995<BR><TD> Police Set Up Bulletin Board Stings by Jim Forbes of Infoworld
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bcwired.asc">bcwired.asc</A> <tab to=T><TD> 44554<BR><TD> What Does a Nobel Prize for Radio Astronomy Have to Do with Your Telephone? by Richard Rapaport
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/biblio">biblio</A> <tab to=T><TD> 6030<BR><TD> Computer Hackers News Articles by Bob Krause
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bmbmnul.txt">bmbmnul.txt</A> <tab to=T><TD> 3005<BR><TD> Student Disciplined for Bomb Manual, from the Collinsville Herald-Journal (March 21, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/boardwat.txt">boardwat.txt</A> <tab to=T><TD> 46733<BR><TD> Board Watch Magazine: Volume 7, Issue 4, April 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/boh-20f8.txt">boh-20f8.txt</A> <tab to=T><TD> 102242<BR><TD> Bildschirmtext: A Blow Against the System (Chaos Computer Club) (November 30, 1984)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bp.txt">bp.txt</A> <tab to=T><TD> 23907<BR><TD> Hackers Under Attack: Crackdown Raises Questions about New Forms of Speech, by Mark Leccese (September 7, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bucks.txt">bucks.txt</A> <tab to=T><TD> 896<BR><TD> Millionaire Gets Mugged In Park He Donated To
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/bust1lod.hac">bust1lod.hac</A> <tab to=T><TD> 11308<BR><TD> U.S. computer investigation targets Austinites
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/busted">busted</A> <tab to=T><TD> 6112<BR><TD> All About the Cherry Hill Phreak Busts
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/busweek.txt">busweek.txt</A> <tab to=T><TD> 6363<BR><TD> Does Someone Have Your Company's Number?: Phone Hackers are Tapping PBXs, Running Up Millions in Charges (February 4, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/c0smos.nws">c0smos.nws</A> <tab to=T><TD> 5101<BR><TD> The Story of the C0SM0S BBS
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/cable.hac">cable.hac</A> <tab to=T><TD> 16727<BR><TD> The true story of John Maxfield, electronic private eye, by John Manning
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/captain.phk">captain.phk</A> <tab to=T><TD> 2759<BR><TD> An Apple for the Captain
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/captaina.hac">captaina.hac</A> <tab to=T><TD> 9162<BR><TD> Who is Captain Zap? (Article from Washington Post)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/captmidn.txt">captmidn.txt</A> <tab to=T><TD> 24394<BR><TD> The Legend of Captain Midnight and HBO
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/chesire.phk">chesire.phk</A> <tab to=T><TD> 13228<BR><TD> Who is Cheshire Catalyst? (Article in Technology Illustrated)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/cptcrnch.txt">cptcrnch.txt</A> <tab to=T><TD> 23126<BR><TD> Raping Ma Bell: Captain Crunch, by Zbigniew Kindela of Hustler Magazine, February 1979
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/craig.fun">craig.fun</A> <tab to=T><TD> 2176<BR><TD> The Urban Legend of Craig Shergold strikes in Kennewick, WA, USA, 15 Jan 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/crime.hac">crime.hac</A> <tab to=T><TD> 12567<BR><TD> Is there Computer Crime, and what are the results?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/crime1.txt">crime1.txt</A> <tab to=T><TD> 2354<BR><TD> Computer Crime Becoming "Less Sophisticated", Margie Wylie, May 1990 Computerworld
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/crimes.txt">crimes.txt</A> <tab to=T><TD> 9555<BR><TD> Going Undercover In The Computer Underworld by Ralph Blumenthal (The New York Times) January 26, 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/crunchy.txt">crunchy.txt</A> <tab to=T><TD> 5276<BR><TD> Phone Phreak Eyes Computers (More on John Draper)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/crypto.txt">crypto.txt</A> <tab to=T><TD> 12550<BR><TD> Promising Technology Alarms Government, by Joe Abernathy of the Houston Chronicle (1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/csuicide.txt">csuicide.txt</A> <tab to=T><TD> 8534<BR><TD> Programmed for Life and Death, by John Markoff, New York Times, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/cybrnazi.txt">cybrnazi.txt</A> <tab to=T><TD> 2379<BR><TD> CyberNazis Baffle German Politc (February 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/cybrshit.rdt">cybrshit.rdt</A> <tab to=T><TD> 10590<BR><TD> Heavily Angrily Commented Transcript/Discussion about the BCS/Speech Discussion on Cyberpunks by John Markoff
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/cycrime1.hac">cycrime1.hac</A> <tab to=T><TD> 65213<BR><TD> Crime and Puzzlement, by John Perry Barlow (Introduction to the Electronic Frontier Foundation)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/dedsheep.txt">dedsheep.txt</A> <tab to=T><TD> 8222<BR><TD> Bighorn Sheep Massacre A Mystery, By Keith Rogers, Las Vegas Review-Journal/Sun, Sunday November 24, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/delorean.txt">delorean.txt</A> <tab to=T><TD> 3951<BR><TD> The DeLorean Case
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/demonews.67">demonews.67</A> <tab to=T><TD> 21689<BR><TD> DEMO NEWS #67, October 23-29, 1994
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/demonews.68">demonews.68</A> <tab to=T><TD> 21522<BR><TD> DEMO NEWS #68, October 30-November 5, 1994
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/demonews.69">demonews.69</A> <tab to=T><TD> 19707<BR><TD> DEMO NEWS #69, November 6-12, 1994
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/demonews.70">demonews.70</A> <tab to=T><TD> 45893<BR><TD> DEMO NEWS #70, November 13-19, 1994
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/dibbel.hac">dibbel.hac</A> <tab to=T><TD> 35066<BR><TD> "On Line and Out of Bounds..." By Julian Dibbell (Needs Editing)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/dibbel.txt">dibbel.txt</A> <tab to=T><TD> 35066<BR><TD> On line and Out of Bounds by Julian Dibbell
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/digital.txt">digital.txt</A> <tab to=T><TD> 22352<BR><TD> Digital Underground, by Mark Bennett (September 12, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/digundrg.txt">digundrg.txt</A> <tab to=T><TD> 22533<BR><TD> Digital Underground, by Mark Bennettm Published in i-D Technology (September 12th, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/donahue.txt">donahue.txt</A> <tab to=T><TD> 21381<BR><TD> Transcript of a Phil Donahue Show about Hackers (March 15, 1985) from P-80 Systems
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/emmanuel.txt">emmanuel.txt</A> <tab to=T><TD> 25110<BR><TD> An Interview with Emmanuel Goldstein, by CNN (1999)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/ethics.hac">ethics.hac</A> <tab to=T><TD> 3948<BR><TD> Newsweek: Teaching Hackers Ethics
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/fadehack.txt">fadehack.txt</A> <tab to=T><TD> 2646<BR><TD> The Fading Hacker Mystique: No Longer Just Pests from Computer Shopper, transcribed by Mac?? (August 24, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/fbi1">fbi1</A> <tab to=T><TD> 2488<BR><TD> PC Bulletin Board Hit by FBI Raid, by Josh Hyatt (Boston Globe), June 14, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/fbi2">fbi2</A> <tab to=T><TD> 2517<BR><TD> Colonel Guilty of Sending Porn via Computer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/fbi20">fbi20</A> <tab to=T><TD> 1693<BR><TD> 30 Arrests In Silicon Valley Computer Parts Sting 01/13/93
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/fbibust2">fbibust2</A> <tab to=T><TD> 2853<BR><TD> The Raid of Hackers in Irvine, California, by Uncle Fester
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/freeware.txt">freeware.txt</A> <tab to=T><TD> 12731<BR><TD> Andrew Flugleman: In Memoriam
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/gangplan.txt">gangplan.txt</A> <tab to=T><TD> 7245<BR><TD> The Bloods and the Crips propose to face-lift LA
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/genius.txt">genius.txt</A> <tab to=T><TD> 8414<BR><TD> The Latest Cult Hero: J R. Bob Dodds
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/geraldo.txt">geraldo.txt</A> <tab to=T><TD> 28587<BR><TD> Now it Can Be Told: Mad Hacker's Key Party, by Geraldo Rivera (September 30, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/guilty.txt">guilty.txt</A> <tab to=T><TD> 7734<BR><TD> Hacker Pleads Guilty in AT&T Case: Sentence Urged for Md. Man Among Stiffest Yet for Computer Crime, by Mark Potts of Washington Post
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hack-nsa.txt">hack-nsa.txt</A> <tab to=T><TD> 3530<BR><TD> Hackers Retaliate by Leaking Manual, by Keay Davidson, Examiner Science Writer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hacker.hac">hacker.hac</A> <tab to=T><TD> 8900<BR><TD> Abuse Hits Computer Networks
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hacker2.txt">hacker2.txt</A> <tab to=T><TD> 2432<BR><TD> The Cops Got His Number: Teen accused of harassment calls via computer, San Jose Mercury News
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackers">hackers</A> <tab to=T><TD> 6591<BR><TD> An Article about High School Hackers by Argon PhoenixFire and Beta Ray Bill (February 28, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackers.txt">hackers.txt</A> <tab to=T><TD> 58203<BR><TD> Is Computer Hacking a Crime? (March 1990 Harper's Magazine)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackers.unite">hackers.unite</A> <tab to=T><TD> 8704<BR><TD> Hackers of the World, Unite! By John Schwartz and Typed by Apple Adept (July 2, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackers1.hac">hackers1.hac</A> <tab to=T><TD> 5582<BR><TD> Amateur Hackers Tripped Up (Telegram-Tribune Newspaper, Mar. 23, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackers2.hac">hackers2.hac</A> <tab to=T><TD> 6818<BR><TD> Computer Case Takes a Twist (Telegram-Tribune Newspaper, Mar. 29, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackers3.hac">hackers3.hac</A> <tab to=T><TD> 2812<BR><TD> Hackers off Hook, Property Returned ((Telegram-Tribune Newspaper, Apr. 12, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackerth">hackerth</A> <tab to=T><TD> 4307<BR><TD> Hacker "Theives" by Silent Revel (July 18, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hacknasa">hacknasa</A> <tab to=T><TD> 2270<BR><TD> NASA vs. Hobbyist: Computer Whiz Accused of Illegal Access, Mischief, by Peter G. Chronis
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackpape.hac">hackpape.hac</A> <tab to=T><TD> 7052<BR><TD> The Hacker Papers (Psychology Today Aug. '80)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackrfoe.txt">hackrfoe.txt</A> <tab to=T><TD> 7143<BR><TD> HACKERS: Friend or Foe? by Ken McLeod (1986)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hackunit.txt">hackunit.txt</A> <tab to=T><TD> 16485<BR><TD> Hackers of the World, Unite! With Comments by Digital Derelict (July 2, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hacrpt.twk">hacrpt.twk</A> <tab to=T><TD> 4027<BR><TD> AP Newswire story on the coming crackdown on free phone calls
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hakmedia.hac">hakmedia.hac</A> <tab to=T><TD> 1771<BR><TD> Hackers in the Media, List start: 10/28/92 - Doomsday
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/harticle">harticle</A> <tab to=T><TD> 4858<BR><TD> Teen-Age Hacker has Lessons for Columbia Police
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hcc.txt">hcc.txt</A> <tab to=T><TD> 22062<BR><TD> How Crackers Crack by Rory J. O'Connor of Mercury News
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hcknews.hac">hcknews.hac</A> <tab to=T><TD> 28683<BR><TD> Grab-Bag of Hacking-related news story transcriptions
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hckrslg">hckrslg</A> <tab to=T><TD> 12665<BR><TD> The Hacker's League, by Lee Felsenstein, 18 March 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/herb_zin.sto">herb_zin.sto</A> <tab to=T><TD> 6407<BR><TD> Chicago Phreak Gets Prison Term (February 17, 1989)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hunt">hunt</A> <tab to=T><TD> 5821<BR><TD> Holding Teenage Hackers: Don't Plug Those Leaky Computers, December 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/hydebomb.txt">hydebomb.txt</A> <tab to=T><TD> 1912<BR><TD> Newsweek Article on the Hyde Park Bomb
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/invest.txt">invest.txt</A> <tab to=T><TD> 10965<BR><TD> Philadelphia financial planner Christine C. Dattilo is interviewed by financial writer Mike Pietruk
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/isdn.txt">isdn.txt</A> <tab to=T><TD> 17485<BR><TD> Macworld: Another Part of your Life is About to Go Digital
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/jilted.txt">jilted.txt</A> <tab to=T><TD> 2894<BR><TD> Jilted Businessman Accused in Botched Murder Plot
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/johnmedi.txt">johnmedi.txt</A> <tab to=T><TD> 3796<BR><TD> Hacker's Story: Two Days on Long Distance (Transcribed by Anarchy Tech)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/kevin.pol">kevin.pol</A> <tab to=T><TD> 44270<BR><TD> More Net Friends Charged with Telephone Computer Crimes, by John Gilmore (January 19, 1999)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/kfyi-593.txt">kfyi-593.txt</A> <tab to=T><TD> 91136<BR><TD> KFYI Phoenix, 910 AM, Kim Kommando Show 5-22-93 Transcript (Nerd on the Air)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/latimes.txt">latimes.txt</A> <tab to=T><TD> 12523<BR><TD> The Pirates of the Internet (November 3, 1994)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/leftist.txt">leftist.txt</A> <tab to=T><TD> 16319<BR><TD> Open Sesame: In the Arcane Culture Of Computer Hackers, Few Doors Stay Closed (Wall Street Journal, August 22, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/legion.txt">legion.txt</A> <tab to=T><TD> 4581<BR><TD> Article about Legion of Doom: "Ex-Hackers' Tactics Attracting Criticism', Houston Chronicle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/len_rose.new">len_rose.new</A> <tab to=T><TD> 7584<BR><TD> 'Hacker' Pleads Guilty in AT&T CASE: Sentence Urged for Md. Man Among Stiffest Yet for Computer Crime, by Mark Potts, Washington Post Staff Writer
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/livermor.txt">livermor.txt</A> <tab to=T><TD> 6948<BR><TD> Hackers in the News: Orlando Sentinel from the Los Angeles Times
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/lodhbust.nws">lodhbust.nws</A> <tab to=T><TD> 11121<BR><TD> US Computer Investigation Targets Austinites
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/marsface.txt">marsface.txt</A> <tab to=T><TD> 2690<BR><TD> Some See Glimpse of Life in Face of Mars
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/marsmani.txt">marsmani.txt</A> <tab to=T><TD> 3617<BR><TD> Mars Mania, API, 1988
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/menace.txt">menace.txt</A> <tab to=T><TD> 6446<BR><TD> The Hacker Menace and Electronic Bulletin Boards by Code Cracker
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/mism34.hac">mism34.hac</A> <tab to=T><TD> 13440<BR><TD> What You Should Know About Collection Agencies ("Cosmopolitan" (November 1984))
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/mism6.txt">mism6.txt</A> <tab to=T><TD> 3584<BR><TD> Computer Hackers Beware! Senate Passes Computer Fraud And Abuse Act
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/mitnick.txt">mitnick.txt</A> <tab to=T><TD> 8878<BR><TD> Slippery cybervandal caught in his own electronic web, by New York Times
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/mob.hac">mob.hac</A> <tab to=T><TD> 8879<BR><TD> Hackers in the Mob
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/modbust.txt">modbust.txt</A> <tab to=T><TD> 10181<BR><TD> New York Computer Crime Indictments (Bust of the MOD) (July 10, 1992)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/modem.spf">modem.spf</A> <tab to=T><TD> 7168<BR><TD> Split Personalities on Electronic Bulletin Boards by Rangott Spliekin
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/multimed.txt">multimed.txt</A> <tab to=T><TD> 14368<BR><TD> The End of Literature: Multimedia is Television's Insidious Offspring, by Steven Levy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/nasa.hak">nasa.hak</A> <tab to=T><TD> 5737<BR><TD> The NASA Hackers, by Tarkin Darklighter (September 15, 1987)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/neidorf">neidorf</A> <tab to=T><TD> 42000<BR><TD> The Craig Neidorf Case Proceedings, July, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/neidorfd.txt">neidorfd.txt</A> <tab to=T><TD> 3460<BR><TD> The Craig Neidorf Defense Fund Introduction
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/new.ibm">new.ibm</A> <tab to=T><TD> 17687<BR><TD> IBM Announcement of the Personal System/2
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/newphed.phk">newphed.phk</A> <tab to=T><TD> 1988<BR><TD> RADIO SCHLOCK Helps the Feds (Needs to be edited)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/night.txt">night.txt</A> <tab to=T><TD> 15968<BR><TD> The Night of the Hackers, by Richard Sandza
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/nighthac">nighthac</A> <tab to=T><TD> 12705<BR><TD> Nighthack:A Story About Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/nighthak.txt">nighthak.txt</A> <tab to=T><TD> 14774<BR><TD> The Night of the Hackers, by Richard Sandza
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/nightlin">nightlin</A> <tab to=T><TD> 21364<BR><TD> Nightline: FBI, Privacy, and Proposed Wire-Tapping Legislation, Friday, May 22, 1992
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/nsw-porn.txt">nsw-porn.txt</A> <tab to=T><TD> 5757<BR><TD> Forget Homework, Computer Kids Discover Electro Porn, by Ben Hills
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/nzidcard.txt">nzidcard.txt</A> <tab to=T><TD> 8945<BR><TD> Prime Minister's Team Gets Set to Move on ID Cards, by Clive Mathew-Wilson, Computerworld, April 1, 1991
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/paranoia.pro">paranoia.pro</A> <tab to=T><TD> 4530<BR><TD> Paranoia runs rampant throughout Computer Community
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/pbust.txt">pbust.txt</A> <tab to=T><TD> 1280<BR><TD> Semi-Literate Account of the Busting on Two Portuguese Pirates
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/pcomhck.txt">pcomhck.txt</A> <tab to=T><TD> 11311<BR><TD> The Popular Communications Hacker News Story, by Tom Kneitel (K2AES)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/phrack.txt">phrack.txt</A> <tab to=T><TD> 1522<BR><TD> Missouri Man Pleads Not Guilty to Charges of Cracking 911 System
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/piratpub.hac">piratpub.hac</A> <tab to=T><TD> 2862<BR><TD> Publisher Pirates Publisher, 1983
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/prank.txt">prank.txt</A> <tab to=T><TD> 13836<BR><TD> Infoworld 1984: The Merry Pranksters, Wozniak and Jobs
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/press.txt">press.txt</A> <tab to=T><TD> 4780<BR><TD> How To Talk To The Press by Johnny Mnemonic
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/pump.txt">pump.txt</A> <tab to=T><TD> 1727<BR><TD> Computer Access Arrests In NY 11/03/92
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/r&amp;e_bust.txt">r&e_bust.txt</A> <tab to=T><TD> 4006<BR><TD> FBI raids major Ohio computer bulletin board, January 30, 1993
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/races.txt">races.txt</A> <tab to=T><TD> 5393<BR><TD> Professor Pilloried for Race Theory, by Jeffrey Ulbright in Toronto
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/racist.net">racist.net</A> <tab to=T><TD> 11117<BR><TD> Article About the Publishing Racist Jokes, from the Kitchener Record
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/radhoax.txt">radhoax.txt</A> <tab to=T><TD> 4109<BR><TD> Disc Jockeys Apologize for Concocted On-Air Murder Hoax
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/rdr.asc">rdr.asc</A> <tab to=T><TD> 3216<BR><TD> Roswell Daily Record for Tuesday, July 8, 1947: RAAF Captures Flying Saucer On Ranch in Roswell Region
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/requiem.txt">requiem.txt</A> <tab to=T><TD> 12288<BR><TD> Requiem for a Sysop, from PC WEEK, November 20, 1984
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/response.hac">response.hac</A> <tab to=T><TD> 7842<BR><TD> A Case for Mistaken Identity... Who's Privacy was Really Invaded? by Jim Bigeloww
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/rivera">rivera</A> <tab to=T><TD> 27063<BR><TD> Transcript of Now It Can Be Told: Mad Hacker's Key Party, by Geraldo Rivera (Sept. 30, 1991)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/saddam.txt">saddam.txt</A> <tab to=T><TD> 4334<BR><TD> Transcript of Meeting Between Iraqi President, Saddam Hussein and U.S. Ambassador to Iraq, April Glaspie. - July 25, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/satelite.hac">satelite.hac</A> <tab to=T><TD> 6312<BR><TD> The Great Satellite Caper, from Time Magazine
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/satlink.txt">satlink.txt</A> <tab to=T><TD> 4606<BR><TD> Overview of the News Channel's View of Satellite Links
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/scary2.phk">scary2.phk</A> <tab to=T><TD> 9726<BR><TD> "Night of the Hackers", by Richard Sandza
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sentence.hac">sentence.hac</A> <tab to=T><TD> 2057<BR><TD> Three from Legion of Doom Sentenced (Nov. 17)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sflvrs_h.ack">sflvrs_h.ack</A> <tab to=T><TD> 30285<BR><TD> A Beautiful Obsession with the Binary World by Steven Levy
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/shadow.hac">shadow.hac</A> <tab to=T><TD> 12566<BR><TD> The Shadowy World of Computer Hackers
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/shuttle.txt">shuttle.txt</A> <tab to=T><TD> 10419<BR><TD> Large Collection of Suspicious NASA News Stories
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sieze.txt">sieze.txt</A> <tab to=T><TD> 10484<BR><TD> Drive to Counter Computer Crime Aims at Invaders, by John Markoff (June 3, 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sign">sign</A> <tab to=T><TD> 7424<BR><TD> A Sign Of Our Times (Anorexia) by Rick Arnold
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/silvrspy.txt">silvrspy.txt</A> <tab to=T><TD> 2399<BR><TD> World of Silver Spy, 17 Year Old Tinker (Needs Editing)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/singh.hac">singh.hac</A> <tab to=T><TD> 4797<BR><TD> Hacking: The Case of Edward Austin Singh
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sjg-day1">sjg-day1</A> <tab to=T><TD> 4835<BR><TD> Steve Jackson Games/Secret Service Lawsuit -- Day One by Joe Abernathy, Houston Chronicle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sjg-day2">sjg-day2</A> <tab to=T><TD> 5359<BR><TD> Steve Jackson Games/Secret Service Lawsuit -- Day Two by Joe Abernathy, Houston Chronicle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sjg-day3">sjg-day3</A> <tab to=T><TD> 6332<BR><TD> Steve Jackson Games/Secret Service Lawsuit -- Day Three by Joe Abernathy, Houston Chronicle
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sjg-wins.sjg">sjg-wins.sjg</A> <tab to=T><TD> 4580<BR><TD> Steven Jackson Games Wins Lawsuit Against U.S. Secret Service
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/ss&amp;fbi.txt">ss&fbi.txt</A> <tab to=T><TD> 5546<BR><TD> The Secret Service Decides to Watch All of Us
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sunhack.txt">sunhack.txt</A> <tab to=T><TD> 2811<BR><TD> Hackers Suspected in Online Vandalism
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/supehack.txt">supehack.txt</A> <tab to=T><TD> 9327<BR><TD> Super Hacker. Was he busted, or slipped out into the night?
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/swpiracy.txt">swpiracy.txt</A> <tab to=T><TD> 5266<BR><TD> Software Piracy: from the NZ Listener (August 13, 199) by Chris Barton
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/syrp1124.txt">syrp1124.txt</A> <tab to=T><TD> 11368<BR><TD> The Syndicate Report: Bell Information Transmittal #8
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/sysopjl.txt">sysopjl.txt</A> <tab to=T><TD> 15875<BR><TD> SysOp Jailed in Georgia, by Lance Rose
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/teensac.txt">teensac.txt</A> <tab to=T><TD> 1669<BR><TD> Two Teens Accused of Cracking Phones While in the jailhouse
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/telecmp2.hum">telecmp2.hum</A> <tab to=T><TD> 25766<BR><TD> The Telecomputist, Sept 1986
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/terminal.esq">terminal.esq</A> <tab to=T><TD> 52443<BR><TD> Terminal Delinguents, by Jack Hitt and Paul Tough of Esquire (December 1990)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/theburli.txt">theburli.txt</A> <tab to=T><TD> 3712<BR><TD> Peninsula Hackers Busted, by John Curry
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/thefacts.phk">thefacts.phk</A> <tab to=T><TD> 105724<BR><TD> Push Button Felonies, KPFA Radio Broadcast, July 26, 1990
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/thegreat.txt">thegreat.txt</A> <tab to=T><TD> 7930<BR><TD> The Great Satellite Caper, by Silent Rebel (July 29, 1985)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/time-art">time-art</A> <tab to=T><TD> 8341<BR><TD> Cyberpunk, by Philip Elmer-Dewett (Time Magazine, February 8, 1993)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/top10.hac">top10.hac</A> <tab to=T><TD> 4272<BR><TD> Top 10 Media Errors about the Steve Jackson Games Raid
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/top10.nws">top10.nws</A> <tab to=T><TD> 4272<BR><TD> The Top 10 Media Errors about the Steven Jackson Games Raid
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/trib1118.txt">trib1118.txt</A> <tab to=T><TD> 12285<BR><TD> Crackdown on Crime is Raising Question of Computer Rights by Jim Sulski
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/trw">trw</A> <tab to=T><TD> 5996<BR><TD> Computer Raiders Hit Big Credit File, 06/22/84
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/tubeshok.txt">tubeshok.txt</A> <tab to=T><TD> 7308<BR><TD> Tube Shocks, by J. Neil Schulman (About TV)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/v-world.txt">v-world.txt</A> <tab to=T><TD> 7048<BR><TD> Programmed for Life and Death, by John Markoff
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/vanish.txt">vanish.txt</A> <tab to=T><TD> 3836<BR><TD> The Hacker Who Vanished: Suicide or Clever Hoax? (About Bill Landreth)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/videocon.txt">videocon.txt</A> <tab to=T><TD> 5185<BR><TD> Ben and Jerry's Use of Video Conferencing
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/virgin_i.phr">virgin_i.phr</A> <tab to=T><TD> 6475<BR><TD> News: Virgin Islands Phreak Arrested and Convicted
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/vs010799.txt">vs010799.txt</A> <tab to=T><TD> 4955<BR><TD> The Rise and Fall of the Modem King, by Victoria Shannon
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/washlod.txt">washlod.txt</A> <tab to=T><TD> 13183<BR><TD> The Terminal Men: Crackdown on the `Legion of Doom' Ends an Era for Computer Hackers, by Willie Schatz (Washington Post)
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/wormdoc.hac">wormdoc.hac</A> <tab to=T><TD> 45159<BR><TD> Crisis and aftermath. (the Internet worm), by Eugene Spafford
<TR VALIGN=TOP><TD ALIGN=TOP><A HREF="news/xt.hac">xt.hac</A> <tab to=T><TD> 10014<BR><TD> Personal Computer Users Penetrating Nation's Phone System, (1988 NY Times)
</TABLE><P><TABLE WIDTH=100%><TR><TD ALIGN=RIGHT><SMALL>There are 184 files for a total of 2,419,155 bytes.</SMALL></TABLE><P>
</BODY>
</HTML>
<P>If you wish to have the entire directory conveniently archived and compressed into one file, please download
either <A HREF="http://archives.textfiles.com/news.tar.gz"><B>news.tar.gz</B></A> (904408 bytes) or <A HREF="http://archives.textfiles.com/news.zip"><B>news.zip</B></A> (1021415 bytes) instead of all the files separately. <P>