قراءة كتاب The Hacker Crackdown: Law and Disorder on the Electronic Frontier

تنويه: تعرض هنا نبذة من اول ١٠ صفحات فقط من الكتاب الالكتروني، لقراءة الكتاب كاملا اضغط على الزر “اشتر الآن"

‏اللغة: English
The Hacker Crackdown: Law and Disorder on the Electronic Frontier

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

تقييمك:
0
No votes yet
المؤلف:
دار النشر: Project Gutenberg
الصفحة رقم: 2

activist, you are the target audience for this book. I wrote this book because I wanted to help you, and help other people understand you and your unique, uhm, problems. I wrote this book to aid your activities, and to contribute to the public discussion of important political issues. In giving the text away in this fashion, I am directly contributing to the book's ultimate aim: to help civilize cyberspace.

Information WANTS to be free. And the information inside this book longs for freedom with a peculiar intensity. I genuinely believe that the natural habitat of this book is inside an electronic network. That may not be the easiest direct method to generate revenue for the book's author, but that doesn't matter; this is where this book belongs by its nature. I've written other books—plenty of other books—and I'll write more and I am writing more, but this one is special. I am making The Hacker Crackdown available electronically as widely as I can conveniently manage, and if you like the book, and think it is useful, then I urge you to do the same with it.

You can copy this electronic book. Copy the heck out of it, be my guest, and give those copies to anybody who wants them. The nascent world of cyberspace is full of sysadmins, teachers, trainers, cybrarians, netgurus, and various species of cybernetic activist. If you're one of those people, I know about you, and I know the hassle you go through to try to help people learn about the electronic frontier. I hope that possessing this book in electronic form will lessen your troubles. Granted, this treatment of our electronic social spectrum is not the ultimate in academic rigor. And politically, it has something to offend and trouble almost everyone. But hey, I'm told it's readable, and at least the price is right.

You can upload the book onto bulletin board systems, or Internet nodes, or electronic discussion groups. Go right ahead and do that, I am giving you express permission right now. Enjoy yourself.

You can put the book on disks and give the disks away, as long as you don't take any money for it.

But this book is not public domain. You can't copyright it in your own name. I own the copyright. Attempts to pirate this book and make money from selling it may involve you in a serious litigative snarl. Believe me, for the pittance you might wring out of such an action, it's really not worth it. This book don't "belong" to you. In an odd but very genuine way, I feel it doesn't "belong" to me, either. It's a book about the people of cyberspace, and distributing it in this way is the best way I know to actually make this information available, freely and easily, to all the people of cyberspace—including people far outside the borders of the United States, who otherwise may never have a chance to see any edition of the book, and who may perhaps learn something useful from this strange story of distant, obscure, but portentous events in so-called "American cyberspace."

This electronic book is now literary freeware. It now belongs to the emergent realm of alternative information economics. You have no right to make this electronic book part of the conventional flow of commerce. Let it be part of the flow of knowledge: there's a difference. I've divided the book into four sections, so that it is less ungainly for upload and download; if there's a section of particular relevance to you and your colleagues, feel free to reproduce that one and skip the rest.

[Project Gutenberg has reassembled the file, with Sterling's permission.]

Just make more when you need them, and give them to whoever might want them.

Now have fun.

Bruce Sterling—[email protected]




THE HACKER CRACKDOWN

Law and Disorder on the Electronic Frontier

by Bruce Sterling




CHRONOLOGY OF THE HACKER CRACKDOWN


1865 U.S. Secret Service (USSS) founded.

1876 Alexander Graham Bell invents telephone.

1878 First teenage males flung off phone system by enraged authorities.

1939 "Futurian" science-fiction group raided by Secret Service.

1971 Yippie phone phreaks start YIPL/TAP magazine.

1972 RAMPARTS magazine seized in blue-box rip-off scandal.

1978 Ward Christenson and Randy Suess create first personal computer bulletin board system.

1982 William Gibson coins term "cyberspace."

1982 "414 Gang" raided.

1983-1983 AT&T dismantled in divestiture.

1984 Congress passes Comprehensive Crime Control Act giving USSS jurisdiction over credit card fraud and computer fraud.

1984 "Legion of Doom" formed.

1984. 2600: THE HACKER QUARTERLY founded.

1984. WHOLE EARTH SOFTWARE CATALOG published.

1985. First police "sting" bulletin board systems established.

1985. Whole Earth 'Lectronic Link computer conference (WELL) goes on-line.

1986 Computer Fraud and Abuse Act passed.

1986 Electronic Communications Privacy Act passed.

1987 Chicago prosecutors form Computer Fraud and Abuse Task Force.


1988

July. Secret Service covertly videotapes "SummerCon" hacker convention.

September. "Prophet" cracks BellSouth AIMSX computer network and downloads E911 Document to his own computer and to Jolnet.

September. AT&T Corporate Information Security informed of Prophet's action.

October. Bellcore Security informed of Prophet's action.


1989

January. Prophet uploads E911 Document to Knight Lightning.

February 25. Knight Lightning publishes E911 Document in PHRACK electronic newsletter.

May. Chicago Task Force raids and arrests "Kyrie."

June. "NuPrometheus League" distributes Apple Computer proprietary software.

June 13. Florida probation office crossed with phone-sex line in switching-station stunt.

July. "Fry Guy" raided by USSS and Chicago Computer Fraud and Abuse Task Force.

July. Secret Service raids "Prophet," "Leftist," and "Urvile" in Georgia.


1990

January 15. Martin Luther King Day Crash strikes AT&T long-distance network nationwide.

January 18-19. Chicago Task Force raids Knight Lightning in St. Louis.

January 24. USSS and New York State Police raid "Phiber Optik," "Acid Phreak," and "Scorpion" in New York City.

February 1. USSS raids "Terminus" in Maryland.

February 3. Chicago Task Force raids Richard Andrews' home.

February 6. Chicago Task Force raids Richard Andrews' business.

February 6. USSS arrests Terminus, Prophet, Leftist, and Urvile.

February 9. Chicago Task Force arrests Knight Lightning.

February 20. AT&T Security shuts down public-access "attctc" computer in Dallas.

February 21. Chicago Task Force raids Robert Izenberg in Austin.

March 1. Chicago Task Force raids Steve Jackson Games, Inc., "Mentor," and "Erik Bloodaxe" in Austin.

May 7,8,9.

USSS and Arizona Organized Crime and Racketeering Bureau conduct "Operation Sundevil" raids in Cincinnatti, Detroit, Los Angeles, Miami, Newark, Phoenix,

Pages