- {fr1} John Schmeridewaind, "The Virus Perpetrator: Criminal or Hero?" The San Francisco Chronicle , November 23, 1988, at C1.Google Scholar
- {fr2} John Markoff, "U.S. Moving to Restrict Access to Facts About Computer Virus," The New York Times, November 11, 1988.Google Scholar
- {fr3} T.R. Reid, "Bulletin Board Systems: Gateway to Citizenship in the Network Nation," The Washington Post, November 6, 1989, at 27 (Washington Business section).Google Scholar
- {fr4} King, K.M. "Overreaction to External Attacks on Computer Systems could be More Harmful than the Viruses Themselves," Chronicle of Higher Education, November 23, 1988, at A36.Google Scholar
- {fr5} Cliff Stoll, The Cuckoo's Egg 302-03, 311 (1989) . See also, Cliff Stoll, Testimony on Computer Viruses, The Subcommittee on Technology and the Law, Committee on the Judiciary, United States Senate, May 15, 1989.Google Scholar
- {fr6} "Proposed NORAD Computer System Called Flawed," The Washington Post, December 16, 1988, at A22.Google Scholar
- {fr7} Peter G. Neumann, "A Glitch in Our Computer Thinking: We Create Powerful Systems With Pervasive Vulnerabilities," The Los Angeles Times, August 2, 1988, part II, at 7. See also Ken Thompson, "Reflections on Trusting Trust," 27 Communications of the ACM 761 (August 1984) (1983 ACM Turing Award Lecture).Google Scholar
- {fr8} John Markoff, "Virus Outbreaks Thwart Computer Experts," The New York Times, May 30, 1989, at C1.Google Scholar
- {fr9} John P. Wack and Lisa J. Carnahan, Computer Viruses and Related Threats: A Management Guide (August 1989) (NIST Special Publication 500-166). Stanley A. Kurzban, "Viruses and Worms -What Can you Do?" 7 ACMSIG Security Audit and Control Review 16 (Spring 1989). Charles K. Wilk, Defending Secrets Sharing Data: New Locks and Keys for Electronic Information (October 1987)Google Scholar
- {fr10} Martin Marshall, "Virus Control Center Proposed," Infoworld, December 12, 1989, at 8. See also General Accounting Office, Computer Security: Virus Highlights Needfor Improved Internet Management 24-25 (June 1989) (GAO/ IMTEC-89-57).Google Scholar
- {fr11} See Computer Security Act of 1987: Hearings on H.R. 145 Before a Subcommittee of the Committee on Government Operations, House of Representatives, 100th Cong., 1st Sess. 525-26, 456, 23. See Bob Davis, "Federal Agencies Press Data-Base Firms to Curb Access to 'Sensi tive' Information," The Wall Street Journal, January 28, 1987, Judith Axler Turner, "Pentagon Planning to Restrict Access to Public Data Bases," The Chronicle of Higher Education, January 21, 1987; Connie Oswald Stofko, "Inquiry by FBI Causes Libraries to Assess Records, SUNY Reporter, February 12, 1987; Jerry J. Berman, "National Security vs. Access to Computer Databases: A new Threat to Freedom of Information," 2 Software Law Journal 1 (1987).Burnham, "US Examines if Computer Used in '84 Elections is Open to Fraud," The New York Times, September 24, 1985, at A17.Google Scholar
- {fr12} See American Library Association, Less Access to Less Information by and about the U.S. Government (1988); Steven Lo Katz, "National Security Controls, Information, and Communications in the United States," 4 Government Information Quarterly 63 (1987); People For the American Way, Government Secrecy: Decisions without Democracy (1987); John Shattuck & Muriel Morisey Spence, Government Information Controls: Implications for Scholarship, Science and Technology, excerpted in "When Government Controls Information," 91 Technology Review 62 (April 1988). See House Committee on Science, Space, and Technology, H.R. Rep. No. 153, pt. 1, 100th Cong., 1st Sess. 18, 19, 19 (1987), reprinted in 1988, U.S. Code Congressional and Administrative News 3133, 3134, 3133. See Marc Rotenberg, Testimony on the Computer Security Act, Before the Subcommittee on Legislation and National Security, Committee on Government Operations, U.S. House of Representatives 2-5, May 4, 1989.Google Scholar
- {fr13} See Mary Karen Dahl, "'Sensitive, Not 'Secret': A Case Study," 5 CPSR Newsletter 1 (Fall 1987), Marc Rotenberg, Testimony on the Computer Security Act, Before the Subcommittee on Legislation and National Security, Committee on Government Operations, U.S. House of Representatives, May 4, 1989, Letter to Representative Dan Glickman from Marc Rotenberg regarding NSA efforts to suppress dissemination of encryption technology, August 18, 1989. See also "Computer Security Questioned," The Baltimore Sun, April 10, 1989, at A7.Google Scholar
- {fr14} Anonymous, "Warning About CERT Warnings," 9 Forum on Risks to the Public in Computers and Related Systems 36 (October 27, 1989) (Internet computer conference) (moderated by Peter Neumann).Google Scholar
- {fr15} General Accounting Office, Computer Security: Virus Highlights Needfor Improved Internet Management (June 1989) (GAO/ IMTEC-89-57).Google Scholar
- {fr16} Jon A. Rochlis and Mark W. Eichin, "With Microscope and Tweezers: The Worm from MIT's Perspective," 32 Communications of the ACM 687, 697 (June 1989). Google ScholarDigital Library
- {fr17} Ibid.Google Scholar
- {fr18} See American Council on Education and United Educators Insurance, A White Paper on Computer Viruses (May 1989) (prepared by David R. Johnson, Thomas P. Oison, and David G. Post). See also "The Computer Worm: A Report_ to the Provost of Cornell University on an investigation Conducted by the Commission of Preliminary Enquiry (February 1989) (Cornell University).Google Scholar
- {fr19} See Handbook for Students, Harvard College 1987-1988 85 ("Misuse of Computer Systems").Google Scholar
- {fr20} See, e.g., Donn B. Parker and Bruce N. Baker, "Ethical Conflicts in Information and Computer Science, Technology and Business" (August 1988), Deborah Johnson and John W. Snapper, Ethical Issues In the Use of Computers (1985), Glenda Eoyang, "Acquisition and Maintenance of Ethical Codes," and John Ladd, "Ethics and the Computer Revolution," DIAC-88: Directions and implications of Advanced Computing 102, 108 (Computer Professionals for Social Responsibility 1988) (edited by Nancy Leveson and Douglas Schuler).Google Scholar
- {fr21} Anne W. Branscomb, Rogue Computer Programs - Viruses, Worms, Trojan Horses, and Time Bombs: Pranks, Prowess, Protection or Protection? 20-28, 33-42 (September 1989). Robert Helfant and Glenn J. McLoughlin, "Computer Viruses" Technical Overview and Policy Considerations" (August 15, 19.88) (8.8-5.56 SPR).Google Scholar
- {fr22} See Branscomb at 28-31 . See also Department of Justice, Computer Crime: Legislative Resource Manual (Bureau of Justice Statistics).Google Scholar
- {fr23} A compelling argument for the need to avoid restrictions on electronic communication can be found in Ithiel de Sola Pool, Technologies of Freedom (1983).Google Scholar
- {fr24} See Lawrence Tribe, American Constitutional Law 1022-39 (2nd ed. 1988).Google Scholar
- {fr25} See Anne W. Branscomb, Rogue Computer Programs - Viruses, Worms, Trojan Horses, and Time Bombs: Pranks, Prowess, Protection of Prosecution? 5-6 (September 1989)Google Scholar
- {fr26} See Wayne R. LaFave and Austin W. Scott, Jr., Criminal Law 5-6 (1972).Google Scholar
- {fr27} John Markoff, "Computer Virus Cure May Be Worse Than Disease," The New York Times, October 7, 1989, at A1.Google Scholar
- {fr28} Vanessa Jo Grimm, "Hill Halves FIST Budget For Security," Government Computer News, October 30, 1989, at 1.Google Scholar
- {fr29} Peter G. Neumann, "A Glitch in Our Computer Thinking: We Create Powerful Systems with Pervasive Vulnerabilities," The Los Angeles Times, August 2, 1988, part II, at 7. A similar view was expressed by Professor Pamela Samuelson.Google Scholar
- {fr30} "Can Hackers Be Sued for Damages Caused by Computer Viruses?" 32 Communications of the ACM 666, 668-69 (June 1989).Google Scholar
Index Terms
- Prepared testimony and statement for the record on computer virus legislation
Recommendations
Internet tax legislation: distinguishing issues
Internet policies and issuesThe Internet Tax Freedom Act (ITFA), enacted in 1998, placed a three-year moratorium on the ability of state and local governments to impose new taxes on Internet access, or to impose any multiple or discriminatory taxes on electronic commerce. The ...
Computer crime legislation update
Thirty-five state plus the Federal Government have various forms of computer crime legislation on the books. These laws plus additional ones which are being added each year attempt to make computer related crime less attractive to individuals and groups ...
Comments