RTM β Π ΠΎΠ±Π΅ΡΡ Π’Π°ΠΏΠΏΠ°Π½ ΠΠΎΡΡΠΈΡ-ΠΌΠ»Π°Π΄ΡΠΈΠΉ, ΡΡΡΠ΄Π΅Π½Ρ ΠΠΎΡΠ½Π΅Π»ΡΡΠΊΠΎΠ³ΠΎ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠ°, Π½Π°ΠΏΠΈΡΠ°Π²ΡΠΈΠΉ ΡΠ΅ΡΠ²Ρ, ΠΈΠ·Π²Π΅ΡΡΠ½ΠΎΠ³ΠΎ ΠΏΠΎΠ΄ Π½Π°Π·Π²Π°Π½ΠΈΠ΅ΠΌ RTM.
SPAN β Space Physics Analysis Network (ΠΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½Π°Ρ ΡΠ΅ΡΡ ΠΈΡΡΠ»Π΅Π΄ΠΎΠ²Π°ΡΠ΅Π»Π΅ΠΉ ΡΠΈΠ·ΠΈΠΊΠΈ ΠΊΠΎΡΠΌΠΎΡΠ°), Π³Π»ΠΎΠ±Π°Π»ΡΠ½Π°Ρ ΡΠ΅ΡΡ DECNET, ΠΏΠ΅ΡΠ²ΠΎΠ½Π°ΡΠ°Π»ΡΠ½ΠΎ ΠΊΠΎΠ½ΡΡΠΎΠ»ΠΈΡΠΎΠ²Π°Π»Π°ΡΡ NASA.
Sprint β Π°ΠΌΠ΅ΡΠΈΠΊΠ°Π½ΡΠΊΠ°Ρ ΡΠ΅Π»Π΅ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΡ, ΠΏΡΠΎΠ²Π°ΠΉΠ΄Π΅Ρ ΡΠ΅ΡΠΈ Π₯.25.
Sprintnet β ΡΠ΅ΡΡ Π₯.25, ΠΊΠΎΠ½ΡΡΠΎΠ»ΠΈΡΡΠ΅ΠΌΠ°Ρ Sprint communications.
Sun β Sun Microsystems, ΠΊΡΡΠΏΠ½Π΅ΠΉΡΠΈΠΉ ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΡΠ΅Π»Ρ ΡΠ°Π±ΠΎΡΠΈΡ ΡΡΠ°Π½ΡΠΈΠΉ Unix.
TCP β Transmission Control Protocol (RFC793) (ΠΏΡΠΎΡΠΎΠΊΠΎΠ» ΠΊΠΎΠ½ΡΡΠΎΠ»Ρ ΠΏΠ΅ΡΠ΅Π΄Π°ΡΠΈ), ΡΡΠ°Π½Π΄Π°ΡΡ ΠΏΠ΅ΡΠ΅Π΄Π°ΡΠΈ Π΄Π°Π½Π½ΡΡ ΠΌΠ΅ΠΆΠ΄Ρ Π΄Π²ΡΠΌΡ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ°ΠΌΠΈ Π² ΠΠ½ΡΠ΅ΡΠ½Π΅ΡΠ΅.
TELENET β ΡΠ΅ΡΡ Π₯.25, DNIC 3110.
Telnet β Π’Π΅Π»Π½Π΅Ρ, ΡΠΏΠΎΡΠΎΠ± ΡΠΎΠ΅Π΄ΠΈΠ½Π΅Π½ΠΈΡ ΠΌΠ΅ΠΆΠ΄Ρ Π΄Π²ΡΠΌΡ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ°ΠΌΠΈ Π² ΠΠ½ΡΠ΅ΡΠ½Π΅ΡΠ΅ ΠΈΠ»ΠΈ Π² Π΄ΡΡΠ³ΠΈΡ ΡΠ΅ΡΡΡ TCP/IP.
Tymnet β ΡΠ΅ΡΡ Π₯.25, ΠΊΠΎΠ½ΡΡΠΎΠ»ΠΈΡΡΠ΅ΠΌΠ°Ρ MCI, DNIC 3106.
Unix β ΠΌΠ½ΠΎΠ³ΠΎΠΏΠΎΠ»ΡΠ·ΠΎΠ²Π°ΡΠ΅Π»ΡΡΠΊΠ°Ρ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½Π°Ρ ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΡΠΈΡΡΠ΅ΠΌΠ°, ΡΠ°Π·ΡΠ°Π±ΠΎΡΠ°Π½Π½Π°Ρ AT&T ΠΈ ΡΠ½ΠΈΠ²Π΅ΡΡΠΈΡΠ΅ΡΠΎΠΌ ΠΠ΅ΡΠΊΠ»ΠΈ.
VAX β Virtual Address Extension (Β«Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΠΎΠ΅ Π°Π΄ΡΠ΅ΡΠ½ΠΎΠ΅ ΡΠ°ΡΡΠΈΡΠ΅Π½ΠΈΠ΅Β»), ΡΠ΅ΡΠΈΡ ΠΌΠΈΠ½ΠΈΠΌΡΠΉΠ½-ΡΡΠ΅ΠΉΠΌΠΎΠ², ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΠΌΡΡ ΡΠΈΡΠΌΠΎΠΉ DEC.
VMS β Virtual Memory System (Β«ΡΠΈΡΡΠ΅ΠΌΠ° Π²ΠΈΡΡΡΠ°Π»ΡΠ½ΠΎΠΉ ΠΏΠ°ΠΌΡΡΠΈΒ»), ΠΎΠΏΠ΅ΡΠ°ΡΠΈΠΎΠ½Π½Π°Ρ ΡΠΈΡΡΠ΅ΠΌΠ°, ΠΏΡΠΎΠΈΠ·Π²ΠΎΠ΄ΠΈΠΌΠ°Ρ ΡΠΈΡΠΌΠΎΠΉ DEC ΠΈ ΠΏΡΠΈΠΌΠ΅Π½ΡΠ΅ΠΌΠ°Ρ Π² ΠΌΠ°ΡΠΈΠ½Π°Ρ VAX.
WANK (Worms Against Nuclear Killers) (Β«Π§Π΅ΡΠ²ΠΈ ΠΏΡΠΎΡΠΈΠ² ΡΠ΄Π΅ΡΠ½ΡΡ ΡΠ±ΠΈΠΉΡΒ»), Π½Π°Π·Π²Π°Π½ΠΈΠ΅ ΡΠ΅ΡΠ²Ρ Π½Π° Π±Π°Π·Π΅ DECNET/VMS, Π·Π°ΠΏΡΡΠ΅Π½Π½ΠΎΠ³ΠΎ Π² SPAN/DEC/HEPNET Π² 1989 Π³ΠΎΠ΄Ρ.
Π₯.25 β ΠΌΠ΅ΠΆΠ΄ΡΠ½Π°ΡΠΎΠ΄Π½Π°Ρ ΡΠ΅ΡΡ ΠΏΠ΅ΡΠ΅Π΄Π°ΡΠΈ Π΄Π°Π½Π½ΡΡ , ΠΈΡΠΏΠΎΠ»ΡΠ·ΡΡΡΠ°Ρ ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΠΏΡΠΎΡΠΎΠΊΠΎΠ»Ρ Π₯.25. Π‘Π΅ΡΡ ΡΠΎΠ·Π΄Π°Π½Π° ΠΊΡΡΠΏΠ½ΡΠΌΠΈ ΡΠ΅Π»Π΅ΠΊΠΎΠΌΠΌΡΠ½ΠΈΠΊΠ°ΡΠΈΠΎΠ½Π½ΡΠΌΠΈ ΠΊΠΎΠΌΠΏΠ°Π½ΠΈΡΠΌΠΈ Π½Π° Π±Π°Π·Π΅ ΡΡΠ°Π½Π΄Π°ΡΡΠ° CCITT # Π₯.25.
Zardoz β ΠΎΠ³ΡΠ°Π½ΠΈΡΠ΅Π½Π½ΡΠΉ Π»ΠΈΡΡ ΠΏΠΎΡΡΠΎΠ²ΠΎΠΉ ΡΠ°ΡΡΡΠ»ΠΊΠΈ ΠΌΠ°ΡΠ΅ΡΠΈΠ°Π»ΠΎΠ² ΠΏΠΎ ΠΊΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½ΠΎΠΉ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ.
ΠΠΈΠ±Π»ΠΈΠΎΠ³ΡΠ°ΡΠΈΡ
Australian Federal Police (AFP), Annual Report 1995β1996, Canberra, 1996.
β, Annual Report 1994β1995, Canberra, 1995.
β, Annual Report 1993β1994, Canberra, 1994.
Bourne, Philip E., Β«Internet security; System SecurityΒ», DEC Professional, vol. 11, June 1992.
Cerf, Vinton G., Β«NetworksΒ», Scientific American, vol. 265, september 1991.
Clyde, Robert A., Β«DECnet SecurityΒ», DEC Professional, vol. 10, april 1991.
Commonwealth Attorney-Generalβs Department, Interim Report on Computer Crime (the gibbs Report), Canberra, 1988.
Commonwealth Director of Public Prosecution (DPP), Annual Report 1993β1994, Canberra, 1994.
Commonwealth Scientific and Industrial Research Organisation (CSIRO), Annual Report 1994β1995, Canberra, 1995.
Davis, Andrew W., Β«DEC Pathworks the mainstay in Macto-VAX connectivityΒ», Mac Week, vol. 6, 3 August 1992.
Department of Foreign Affairs and Trade, Australian Treaty Series 1993, no. 40, Australian Government Publishing Service, Canberra, 1993.
Digital Equipment Corporation, Annual Report 1989, securities and Exchange Commission (SEC) Online (USA) Inc., 1989.
β, Quarterly Report for period ending 12.31.89, sec Online (USA).
Gezelter, Robert, Β«The DECnet TASK object; TutorialΒ», Digital Systems Journal, vol. 16, july 1994.
Gianatasio, David, Β«Worm Infestation hits 300 VAX/VMS systems worldwide via DECnetΒ», Digital Review, vol. 6, 20 november 1989.
Haffner, Katie & Markoff John, Cyberpunk, Corgi Books (transworld), Moorebank NSW, 1994.
Halbert, Debora, Β«The Potential for Modern Communication Technology to Challenge Legal Discourses of Authorship and PropertyΒ», Murdoch University E-Law Journal, vol. 1, no. 2.
Kelman, Alistair, Β«Computer Crime in the 1990s: a Barristerβs ViewΒ», Paper for the Twelfth National Symposium on Economic Crime, September 1994.
Law Commission (UK) Working Paper, no. 110, 1988.
Lloyd, J. Ian & Simpson, Moira, Law on the Electronic Frontier, David Hume Institute, Edinburgh, 1996.
Longstaff, Thomas A., & Schultz, E. Eugene, Β«Beyond preliminary analysis of the WANK and OILZ worms: a case study of malicious codeΒ». Computers & Security, vol. 12, february 1993.
Loundy, David J., Β«Information Systems Law and Operator Liability RevisitedΒ», Murdoch University E-Law Journal, vol. 1, no. 3, september 1994. mcmahon, john, Β«Practical DECnet SecurityΒ», Digital Systems Journal, vol. 14, November 1992.
Melford, Robert J., Β«Network security; computer networksΒ», Internal Auditor, institute of Internal Auditors, vol. 50, February 1993.
Natalie, D. & Ball, W, EIS Coordinator, North Carolina Emergency Management, Β«How North Carolina Managed Hurricane HugoΒ», EIS News, vol. 3, no. 11, 1988.
NorTel Australia Pty Ltd, Discovering Tomorrowβs Telecommunications Solutions, chatswood, nsw (n.d.).
Northern Telecom, Annual Report 1993, Ontario, 1993.
Slatalla, Mishelle & Quittner, Joshua, Masters of Deception, Harpercollins, New York, 1995.
Royal Commission into Aboriginal Death in Custody, Report of the Inquiry into the Death of Woman Who Died at Ceduna, Australian government Publishing Service, Canberra, 1990.
Scottish Law Commission Report on Computer Crime, no. 174, 1987.
SPAN Management Office, Β«Security guidelines to be followed in the latest worm attackΒ», an Intranetwork Memorandum released by the SPAN Management Office, NASA, 30 October 1989.
Sterling, Bruce, The Hacker Crackdown, Penguin Books, Melbourne, 1994. [ΠΠ½ΠΈΠ³Π° Π΄ΠΎΡΡΡΠΏΠ½Π° Π½Π° http://lib.rus.ec/b/106013 (ΠΏΡΠΈΠΌ. ΡΠΎΡΡ. FB2)]
Stoll, Clifford, The Cuckooβs Egg, pan books, London, 1991.
Tencati, Ron, Β«Information regarding the DECNET worm and protection measuresΒ», an Intranetwork Memorandum released by the SPAN Management Office, NASA, 19 October 1989.
β, Β«Network Security Suplemental Information β Protecting the DECNET AccountΒ», security advisory, released by SPAN, NASA/Goddard Space Flight Center, 1989.
The Victorian Ombudsman, Operation Iceberg; Investigation of Leaked Police Information and Related Matters, report of the Deputy Ombudsman (Police Complaints), L. V. North Government Printer, Melbourne, 1993.
Β«USA proposes international virus teamΒ», Computer Fraud &. Security Bulletin (Elsevier Advanced Technology Publication), August 1991.
Victoria Police, Operation Iceberg β Investigation and Recommendations into Allegations of Leaked Confidential Police Information, 1 june, memorandum from victoria Police Commander Bowles to Chief Commissioner Comrie (also available as Appendix 1 in the Victorian Ombudsmanβs Operation Iceberg Report, tabled in Victorian Parliament, October 1993), 1993.
Vietor, Richard, Contrived Competition: Regulation and Deregulation in America, belknap/harvard university press, Cambridge, 1994.
Yallop, David, To the Ends of the Earth, corgi books (transworld), moorebank, nsw, 1994.
ΠΠ°ΠΊΠΎΠ½Ρ:
Computer Misuse Act 1990 (UK)
Crimes Act 1914 (no. 5) (cwlth)
Crimes Legislation Amendment Act 1989, no. 108
Computer Fraud and Abuse Act 1986 (us), 18 usc 1030
Computer Misuse Crimes Legislation Amendment Bill 1989 (aus),
Explanatory Memo Clause 7 Crimes (Computers) Act, no. 36 of 1988 (vic)
ΠΡΡΠ³ΠΈΠ΅ ΠΏΡΠ±Π»ΠΈΠΊΠ°ΡΠΈΠΈ ΠΈ Π±Π°Π·Ρ Π΄Π°Π½Π½ΡΡ :
β’ American Bar Association Journal Associated Press
β’ Attorney generalβs information Service (Australia)
β’ Australian Accountant
β’ Australian Computer Commentary
β’ Aviation Week and Space Technology (USA)
β’ Banking Technology
β’ Business Week
β’ Cable News Network (CNN)
β’ Card News (USA)
β’ CERT Advisories (The Computer Emergency Response Team at Carnegie Mellon University)
β’ Chicago Daily Law Bulletin Communications Week
β’ Communications Week International
β’ Computer Incident Advisory Capability (CIAC)
β’ Computer Law and Practice (Australia)
β’ Computer Law and Security Report (Australia)
β’ Computer Weekly
β’ Computergram
β’ Computerworld
β’ Computing
β’ Corporate EFT Report (USA)
β’ Daily Mail (UK)
β’ Daily Telegraph (sydney)
β’ Daily Telegraph (UK)
β’ Data Communications
β’ Datalink
β’ Evening Standard (UK)
β’ Export Control News (USA)
β’ Fintech Electronic Office (The Financial Times)
β’ Gannett news office
β’ Government Computer News (USA)
β’ Info World
β’ Intellectual Property Journal (Australia)
β’ Intelligence Newsletter (Indigo Publication)
β’ Journal of Commerce (The New York Times)
β’ Journal of The Law Society of Scotland
β’ Korea Economic Daily
β’ Law Institute Journal (Melbourne)
β’ Law Society' Gazette (UK)
β’ Law Societyβs Guardian Gazette (UK)
β’ Legal Times (USA)
β’ Lexis-Nexis (Reed Elsevier)
β’ Lloyds List
β’ Mail on Sunday (UK)
β’ Media Week
β’ MIS Week
β’ Mortgage Finance Gazette
β’ Network World
β’ New Law Journal (UK)
β’ New York Law Journal
β’ Newsday
β’ PC Week (USA)
β’ Press Association Newsfile
β’ Reuter
β’ Reuter News Service β United Kingdom Science
β’ South China Morning Post
β’ St Louis Post-Dispatch
β’ St Petersburg Times
β’ Sunday Telegraph (Sydney)
β’ Sunday Telegraph (UK)
β’ Sunday Times (UK)
β’ Telecommunications (Horizon House Publication Inc.)
β’ The Age
β’ The Australian
β’ The Australian Financial Review
β’ The Bulletin
β’ The Computer Lawyer (USA)
β’ The Connecticut Law Tribune
β’ The Daily Record (USA)
β’ The Engineer (UK)
β’ The Gazette (Montreal)
β’ The Guardian
β’ The Herald (Glasgow)
β’ The Herald (Melbourne)
β’ The Herald Sun (Melbourne)
β’ The Independent
β’ The Irish Times
β’ The Legal Intelligencer (USA)
β’ The Los Angeles Times
β’ The Nation
β’ The National Law Journal (USA)
β’ The New York Times
β’ The Recorder (USA)
β’ The Reuter European Community Report
β’ The Reuter Library Report
β’ The Scotsman
β’ The Sun (Melbourne)
β’ The Sunday Age
β’ The Sydney Morning Herald
β’ The Times
β’ The Washington Post
β’ The Washington Times
β’ The Weekend Australian
β’ Time Magazine
β’ United Nations Chronicle
β’ United Press International
β’ USA Today
Π‘ΡΠ΅Π½ΠΎΠ³ΡΠ°ΠΌΠΌΡ:Hearing of the Transportation, Aviation and Materials Subcommittee of the House Science, Space and Technology Committee transcript: witness Clifford Stoll, 10 July 1990
Β«Larry King LiveΒ» transcript, interview with Clifford Stoli, 23 March 1990 The World Uranium Hearing, Salzburg 1992, witness transcript US Government Accounting Office Hearing (computer security) witness transcripts, 1996
Π‘ΡΠ΄Π΅Π±Π½ΡΠ΅ ΠΏΡΠΈΠ³ΠΎΠ²ΠΎΡΡ:
Chris Goggans, Robert Cupps and Scott Chasin, Appellants v. Boyd & Fraser Publishing Co., a division of South-Western Publishing Co., Appellee No. 01-95-00331-Cv 1995 Tex. App.
Gerald Gold v. Australian Federal Police, no v93/1140.
Gerald Gold v. National Crime Authority, no. v93/1141 aat no. 9940 Freedom of Information (1994) 37 ALD 168.
Henry John Tasman Rook v. Lucas Richard Maynard (no.2) lca 52/ 1994; judgement no. A64/1994.
Pedro Juan Cubillo v. Commonwealth of Australia, no. ng 571 of 1991 fed no.1006/95 tort β negligence. R v. Gold and another, house of lords (UK), [1988] 1 AC 1063, [1988] 2 All ER 186, [1988] 2 WLR 984, 87 Cr App Rep 257, 152 JP 445, [1988] Crim Lr 437.
Steve Jackson Games Incorporated, et al., plaintiffs, v. United States Secret Service, United States of America, et al., defendants no. A 91 CA 346 Ss 816 F. Supp. 432; 1993 U.S. Dist.
United States of Americav. Julio Fernandez, et al.,92 cr. 563 (ro).
United States of America, plaintiff, v. Robert J. Riggs, also known as Robert Johnson, also known as Prophet, and Craig Neidorf, also known as Knight Lightning, defendants no. 90 cr 0070 743 F. Supp. 556; 1990 U.S. Dist.
United States of America, appellee, v. Robert Tappan Morris, defendant-Appellant No. 90β 1336 928 F.2d 504; 1991 U.S. App.
Wesley Thomas Dingwall v. Commonwealth of Australia, no. ng 575 of 1991 Fed no.296/94 Torts.
William Thomas Bartlett v. Claire Patricia Wier, Henry J T Rook, Noel E. Aikman, Philip Edwards and Michael Π McCay no. tg 7 of 1992; fed no. 345/94.
ΠΡΡΠ³ΠΈΠ΅ ΡΡΠ΄Π΅Π±Π½ΡΠ΅ ΠΌΠ°ΡΠ΅ΡΠΈΠ°Π»Ρ:
ΠΠΎΠΊΠ»Π°Π΄Π½ΡΠ΅ Π·Π°ΠΏΠΈΡΠΊΠΈ ΠΈ Π΄ΠΎΠΊΠ»Π°Π΄Ρ ΠΎΡ/Π²: