skip to main content
article
Free Access

Prepared testimony and statement for the record on computer virus legislation

Authors Info & Claims
Published:01 March 1990Publication History
First page image

References

  1. {fr1} John Schmeridewaind, "The Virus Perpetrator: Criminal or Hero?" The San Francisco Chronicle , November 23, 1988, at C1.Google ScholarGoogle Scholar
  2. {fr2} John Markoff, "U.S. Moving to Restrict Access to Facts About Computer Virus," The New York Times, November 11, 1988.Google ScholarGoogle Scholar
  3. {fr3} T.R. Reid, "Bulletin Board Systems: Gateway to Citizenship in the Network Nation," The Washington Post, November 6, 1989, at 27 (Washington Business section).Google ScholarGoogle Scholar
  4. {fr4} King, K.M. "Overreaction to External Attacks on Computer Systems could be More Harmful than the Viruses Themselves," Chronicle of Higher Education, November 23, 1988, at A36.Google ScholarGoogle Scholar
  5. {fr5} Cliff Stoll, The Cuckoo's Egg 302-03, 311 (1989) . See also, Cliff Stoll, Testimony on Computer Viruses, The Subcommittee on Technology and the Law, Committee on the Judiciary, United States Senate, May 15, 1989.Google ScholarGoogle Scholar
  6. {fr6} "Proposed NORAD Computer System Called Flawed," The Washington Post, December 16, 1988, at A22.Google ScholarGoogle Scholar
  7. {fr7} Peter G. Neumann, "A Glitch in Our Computer Thinking: We Create Powerful Systems With Pervasive Vulnerabilities," The Los Angeles Times, August 2, 1988, part II, at 7. See also Ken Thompson, "Reflections on Trusting Trust," 27 Communications of the ACM 761 (August 1984) (1983 ACM Turing Award Lecture).Google ScholarGoogle Scholar
  8. {fr8} John Markoff, "Virus Outbreaks Thwart Computer Experts," The New York Times, May 30, 1989, at C1.Google ScholarGoogle Scholar
  9. {fr9} John P. Wack and Lisa J. Carnahan, Computer Viruses and Related Threats: A Management Guide (August 1989) (NIST Special Publication 500-166). Stanley A. Kurzban, "Viruses and Worms -What Can you Do?" 7 ACMSIG Security Audit and Control Review 16 (Spring 1989). Charles K. Wilk, Defending Secrets Sharing Data: New Locks and Keys for Electronic Information (October 1987)Google ScholarGoogle Scholar
  10. {fr10} Martin Marshall, "Virus Control Center Proposed," Infoworld, December 12, 1989, at 8. See also General Accounting Office, Computer Security: Virus Highlights Needfor Improved Internet Management 24-25 (June 1989) (GAO/ IMTEC-89-57).Google ScholarGoogle Scholar
  11. {fr11} See Computer Security Act of 1987: Hearings on H.R. 145 Before a Subcommittee of the Committee on Government Operations, House of Representatives, 100th Cong., 1st Sess. 525-26, 456, 23. See Bob Davis, "Federal Agencies Press Data-Base Firms to Curb Access to 'Sensi tive' Information," The Wall Street Journal, January 28, 1987, Judith Axler Turner, "Pentagon Planning to Restrict Access to Public Data Bases," The Chronicle of Higher Education, January 21, 1987; Connie Oswald Stofko, "Inquiry by FBI Causes Libraries to Assess Records, SUNY Reporter, February 12, 1987; Jerry J. Berman, "National Security vs. Access to Computer Databases: A new Threat to Freedom of Information," 2 Software Law Journal 1 (1987).Burnham, "US Examines if Computer Used in '84 Elections is Open to Fraud," The New York Times, September 24, 1985, at A17.Google ScholarGoogle Scholar
  12. {fr12} See American Library Association, Less Access to Less Information by and about the U.S. Government (1988); Steven Lo Katz, "National Security Controls, Information, and Communications in the United States," 4 Government Information Quarterly 63 (1987); People For the American Way, Government Secrecy: Decisions without Democracy (1987); John Shattuck & Muriel Morisey Spence, Government Information Controls: Implications for Scholarship, Science and Technology, excerpted in "When Government Controls Information," 91 Technology Review 62 (April 1988). See House Committee on Science, Space, and Technology, H.R. Rep. No. 153, pt. 1, 100th Cong., 1st Sess. 18, 19, 19 (1987), reprinted in 1988, U.S. Code Congressional and Administrative News 3133, 3134, 3133. See Marc Rotenberg, Testimony on the Computer Security Act, Before the Subcommittee on Legislation and National Security, Committee on Government Operations, U.S. House of Representatives 2-5, May 4, 1989.Google ScholarGoogle Scholar
  13. {fr13} See Mary Karen Dahl, "'Sensitive, Not 'Secret': A Case Study," 5 CPSR Newsletter 1 (Fall 1987), Marc Rotenberg, Testimony on the Computer Security Act, Before the Subcommittee on Legislation and National Security, Committee on Government Operations, U.S. House of Representatives, May 4, 1989, Letter to Representative Dan Glickman from Marc Rotenberg regarding NSA efforts to suppress dissemination of encryption technology, August 18, 1989. See also "Computer Security Questioned," The Baltimore Sun, April 10, 1989, at A7.Google ScholarGoogle Scholar
  14. {fr14} Anonymous, "Warning About CERT Warnings," 9 Forum on Risks to the Public in Computers and Related Systems 36 (October 27, 1989) (Internet computer conference) (moderated by Peter Neumann).Google ScholarGoogle Scholar
  15. {fr15} General Accounting Office, Computer Security: Virus Highlights Needfor Improved Internet Management (June 1989) (GAO/ IMTEC-89-57).Google ScholarGoogle Scholar
  16. {fr16} Jon A. Rochlis and Mark W. Eichin, "With Microscope and Tweezers: The Worm from MIT's Perspective," 32 Communications of the ACM 687, 697 (June 1989). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. {fr17} Ibid.Google ScholarGoogle Scholar
  18. {fr18} See American Council on Education and United Educators Insurance, A White Paper on Computer Viruses (May 1989) (prepared by David R. Johnson, Thomas P. Oison, and David G. Post). See also "The Computer Worm: A Report_ to the Provost of Cornell University on an investigation Conducted by the Commission of Preliminary Enquiry (February 1989) (Cornell University).Google ScholarGoogle Scholar
  19. {fr19} See Handbook for Students, Harvard College 1987-1988 85 ("Misuse of Computer Systems").Google ScholarGoogle Scholar
  20. {fr20} See, e.g., Donn B. Parker and Bruce N. Baker, "Ethical Conflicts in Information and Computer Science, Technology and Business" (August 1988), Deborah Johnson and John W. Snapper, Ethical Issues In the Use of Computers (1985), Glenda Eoyang, "Acquisition and Maintenance of Ethical Codes," and John Ladd, "Ethics and the Computer Revolution," DIAC-88: Directions and implications of Advanced Computing 102, 108 (Computer Professionals for Social Responsibility 1988) (edited by Nancy Leveson and Douglas Schuler).Google ScholarGoogle Scholar
  21. {fr21} Anne W. Branscomb, Rogue Computer Programs - Viruses, Worms, Trojan Horses, and Time Bombs: Pranks, Prowess, Protection or Protection? 20-28, 33-42 (September 1989). Robert Helfant and Glenn J. McLoughlin, "Computer Viruses" Technical Overview and Policy Considerations" (August 15, 19.88) (8.8-5.56 SPR).Google ScholarGoogle Scholar
  22. {fr22} See Branscomb at 28-31 . See also Department of Justice, Computer Crime: Legislative Resource Manual (Bureau of Justice Statistics).Google ScholarGoogle Scholar
  23. {fr23} A compelling argument for the need to avoid restrictions on electronic communication can be found in Ithiel de Sola Pool, Technologies of Freedom (1983).Google ScholarGoogle Scholar
  24. {fr24} See Lawrence Tribe, American Constitutional Law 1022-39 (2nd ed. 1988).Google ScholarGoogle Scholar
  25. {fr25} See Anne W. Branscomb, Rogue Computer Programs - Viruses, Worms, Trojan Horses, and Time Bombs: Pranks, Prowess, Protection of Prosecution? 5-6 (September 1989)Google ScholarGoogle Scholar
  26. {fr26} See Wayne R. LaFave and Austin W. Scott, Jr., Criminal Law 5-6 (1972).Google ScholarGoogle Scholar
  27. {fr27} John Markoff, "Computer Virus Cure May Be Worse Than Disease," The New York Times, October 7, 1989, at A1.Google ScholarGoogle Scholar
  28. {fr28} Vanessa Jo Grimm, "Hill Halves FIST Budget For Security," Government Computer News, October 30, 1989, at 1.Google ScholarGoogle Scholar
  29. {fr29} Peter G. Neumann, "A Glitch in Our Computer Thinking: We Create Powerful Systems with Pervasive Vulnerabilities," The Los Angeles Times, August 2, 1988, part II, at 7. A similar view was expressed by Professor Pamela Samuelson.Google ScholarGoogle Scholar
  30. {fr30} "Can Hackers Be Sued for Damages Caused by Computer Viruses?" 32 Communications of the ACM 666, 668-69 (June 1989).Google ScholarGoogle Scholar

Index Terms

  1. Prepared testimony and statement for the record on computer virus legislation

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image ACM SIGCAS Computers and Society
      ACM SIGCAS Computers and Society  Volume 20, Issue 1
      March 1990
      34 pages
      ISSN:0095-2737
      DOI:10.1145/379288
      Issue’s Table of Contents

      Copyright © 1990 Author

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 March 1990

      Check for updates

      Qualifiers

      • article
    • Article Metrics

      • Downloads (Last 12 months)28
      • Downloads (Last 6 weeks)11

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader