- fr1 Barbara A. Hanawalt and Anna Grotans, eds., <i>Living Dangerously on the Margins in Medieval and Early Modern Europe</i> (Notre Dame, IN: University of Notre Dame Press, 2007).Google Scholar
- fr2 Bill Landreth, Out of the Inner Circle: A Hacker's Guide to Computer Security, with Howard Rheingold (Bellevue, WA: Microsoft Press, 1985), 10.Google Scholar
- fr3 Ron Rosenbaum, "Secrets of the Little Blue Box," <i>Esquire</i>, October 1, 1971, 117-124, 222-227.Google Scholar
- fr4 Landreth, <i>Out of the Inner Circle</i>, 15.Google Scholar
- fr5 See Matt Novak, "The untold story of the teen hackers who transformed the early Internet," <i>Gizmodo</i>, April 14, 2016.Google Scholar
- fr6 Joseph B. Treaster, "Trial and error by intruders led to entry into computer," <i>New York Times</i>, August 23, 1983, A1.Google Scholar
- fr7 Matt Novak, "Teen hackers."Google Scholar
- fr8 Rebecca Slayton, "Framing computer security and privacy, 1967-1992," in <i>Communities of Computing: Computer Science and Society in the ACM</i>, ed. Thomas J. Misa (San Francisco, CA: Morgan & Claypool/ACM Books, 2017), 287-329.Google Scholar
- fr9 Jon Lebkowsky, "Official bio of St. Jude," The Well, August 1, 2003. https://people.well.com/conf/inkwell.vue/topics/190/St-Jude-Memorial-and-Virtual-Wak-page01.html. Accessed August 29, 2019.Google Scholar
- fr10 Lebkowksy, "Official bio of St. Jude."Google Scholar
- fr11 State of Alabama, Department of Public Safety, Investigative and Identification Division, "Individuals Active in Civil Disturbances," Vol. 1 (1965). For the striking image of Behling, dated April 21, 1965, see http://digital.archives.alabama.gov/cdm/ref/collection/photo/id/1402.Google Scholar
- fr12 Dodson, "Obituary: Judith Milhon," 27.Google Scholar
- fr13 Daniel McCracken's A Guide to FORTRAN Programming (1961), or McCracken's FORTRAN with Engineering Applications (1967).Google Scholar
- fr14 Butler W. Lampson, "A Scheduling Philosophy for Multi-processing Systems," <i>Communications of the ACM</i> 11, no. 5 (May 1968): 347-359. Google ScholarDigital Library
- fr15 Butler W. Lampson, "Some remarks on a large new time-sharing system." Internal memo, Berkeley Computer Corporation, September 1970.Google Scholar
- fr16 Levy, Hackers, 160-161.Google Scholar
- fr17 Stewart Brand, "SPACE WAR: Fanatic life and symbolic death among the computer bums," <i>Rolling Stone</i>, December 7, 1972, 50-56.Google Scholar
- fr18 Anon., "The Community Memory Project: An Introduction," advertising brochure (August 1982), 11. Available in Community Memory Records, Box 12, Folder 26, Computer History Museum Archive, Fremont, California.Google Scholar
- fr19 Resource One/Community Memory Index (March 1974), p. 45 [Feb. 17, 1974]; in Community Memory Records, Box 13, Folder 5, Computer History Museum Archive.Google Scholar
- fr20 Bo Doub, "Community Memory: Precedents in Social Media and Movements, Computer History Museum," Feb 23, 2016. http://www.computerhistory.org/atchm/community-memory-precedents-in-social-media-and-movements/. Accessed August 20, 2019.Google Scholar
- fr21 "The Community Memory Project: An Introduction," 1982, Community Memory records, Computer History Museum, Box 12, Folder 20, Catalog 102734414.Google Scholar
- fr22 Claire L. Evans, <i>Broad Band: The Untold Story of the Women Who Made the Internet</i> (London: Penguin, 2018), 102.Google Scholar
- fr23 Steven Levy, <i>Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age</i> (New York: Viking, 2001). Google ScholarDigital Library
- fr24 <i>High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace</i>, ed. Peter Ludlow (Cambridge, MA: The MIT Press, 1996). Google ScholarDigital Library
- fr25 David Pescovitz, "Mondo 2000: An Open Source History," <i>bOING bOING</i>, April 6, 2010. https://boingboing.net/2010/04/06/mondo-2000-an-open-s.html. Accessed on August 20, 2019.Google Scholar
- fr26 Rudy Rucker, R. U. Sirius, and Queen Mu, <i>Mondo 2000: A User's Guide To The New Edge: Cyberpunk, Virtual Reality, Wetware, Designer Aphrodisiacs, Artificial Life, Techno-Erotic Paganism, and More</i> (New York: Perennial, 1992).Google Scholar
- fr27 William Gibson, <i>Neuromancer</i> (New York: Ace, 1984).Google Scholar
- fr28 Philip Elmer Dewitt, "Cyberpunk!" <i>Time</i>, February 8, 1993: 60.Google Scholar
- fr29 Lawrence M. Fisher, "Style makers; Ken Goffman and Alison Kennedy, magazine editors," <i>New York Times</i>, September 29, 1990, Section 1, 40.Google Scholar
- fr30 Fisher, "Style makers," <i>New York Times</i>, 40.Google Scholar
- fr31 Lee Felsenstein, "The cyberpunk computer," <i>Mondo 2000</i> 2 (Summer 1990): 21.Google Scholar
- fr32 "Contributors," <i>Mondo 2000</i> 1 (Fall 1989): 159.Google Scholar
- fr33 St. Jude, R.U. Sirius, and Bart Nagel, <i>The Cyberpunk Handbook: The Real Cyberpunk Fakebook</i> (New York: Random House, 1995).Google Scholar
- fr34 Nathaniel Popper, "Timothy C. May, early advocate of Internet privacy, Dies at 66," <i>New York Times</i>, December 21, 2018.Google Scholar
- fr35 Timothy C. May, "The Crypto Anarchist Manifesto," November 22, 1992. https://www.activism.net/cypherpunk/crypto-anarchy.html. Accessed on August 20, 2019.Google Scholar
- fr36 Levy, <i>Crypto</i>, 211.Google Scholar
- fr37 Robert Manne, "The Cypherpunk Revolutionary: Julian Assange," <i>The Monthly</i>, March 2011. https://www.themonthly.com.au/issue/2011/february/1324596189/robert-manne/cypherpunk-revolutionary. Accessed on August 19, 2019.Google Scholar
- fr38 Eric Hughes, "A Cypherpunk's Manifesto," March 9, 1993. https://www.activism.net/cypherpunk/manifesto.html. Accessed on August 19, 2019.Google Scholar
- fr39 Hanawalt, <i>Living Dangerously on the Margins</i>, 2.Google Scholar
- fr1 Barbara A. Hanawalt and Anna Grotans, eds., <i>Living Dangerously on the Margins in Medieval and Early Modern Europe</i> (Notre Dame, IN: University of Notre Dame Press, 2007).Google Scholar
- fr2 Bill Landreth, Out of the Inner Circle: A Hacker's Guide to Computer Security, with Howard Rheingold (Bellevue, WA: Microsoft Press, 1985), 10.Google Scholar
- fr3 Ron Rosenbaum, "Secrets of the Little Blue Box," <i>Esquire</i>, October 1, 1971, 117-124, 222-227.Google Scholar
- fr4 Landreth, <i>Out of the Inner Circle</i>, 15.Google Scholar
- fr5 See Matt Novak, "The untold story of the teen hackers who transformed the early Internet," <i>Gizmodo</i>, April 14, 2016.Google Scholar
- fr6 Joseph B. Treaster, "Trial and error by intruders led to entry into computer," <i>New York Times</i>, August 23, 1983, A1.Google Scholar
- fr7 Matt Novak, "Teen hackers."Google Scholar
- fr8 Rebecca Slayton, "Framing computer security and privacy, 1967-1992," in <i>Communities of Computing: Computer Science and Society in the ACM</i>, ed. Thomas J. Misa (San Francisco, CA: Morgan & Claypool/ACM Books, 2017), 287-329.Google Scholar
- fr9 Jon Lebkowsky, "Official bio of St. Jude," The Well, August 1, 2003. https://people.well.com/conf/inkwell.vue/topics/190/St-Jude-Memorial-and-Virtual-Wak-page01.html. Accessed August 29, 2019.Google Scholar
- fr10 Lebkowksy, "Official bio of St. Jude."Google Scholar
- fr11 State of Alabama, Department of Public Safety, Investigative and Identification Division, "Individuals Active in Civil Disturbances," Vol. 1 (1965). For the striking image of Behling, dated April 21, 1965, see http://digital.archives.alabama.gov/cdm/ref/collection/photo/id/1402.Google Scholar
- fr12 Dodson, "Obituary: Judith Milhon," 27.Google Scholar
- fr13 Daniel McCracken's A Guide to FORTRAN Programming (1961), or McCracken's FORTRAN with Engineering Applications (1967).Google Scholar
- fr14 Butler W. Lampson, "A Scheduling Philosophy for Multi-processing Systems," <i>Communications of the ACM</i> 11, no. 5 (May 1968): 347-359. Google ScholarDigital Library
- fr15 Butler W. Lampson, "Some remarks on a large new time-sharing system." Internal memo, Berkeley Computer Corporation, September 1970.Google Scholar
- fr16 Levy, Hackers, 160-161.Google Scholar
- fr17 Stewart Brand, "SPACE WAR: Fanatic life and symbolic death among the computer bums," <i>Rolling Stone</i>, December 7, 1972, 50-56.Google Scholar
- fr18 Anon., "The Community Memory Project: An Introduction," advertising brochure (August 1982), 11. Available in Community Memory Records, Box 12, Folder 26, Computer History Museum Archive, Fremont, California.Google Scholar
- fr19 Resource One/Community Memory Index (March 1974), p. 45 [Feb. 17, 1974]; in Community Memory Records, Box 13, Folder 5, Computer History Museum Archive.Google Scholar
- fr20 Bo Doub, "Community Memory: Precedents in Social Media and Movements, Computer History Museum," Feb 23, 2016. http://www.computerhistory.org/atchm/community-memory-precedents-in-social-media-and-movements/. Accessed August 20, 2019.Google Scholar
- fr21 "The Community Memory Project: An Introduction," 1982, Community Memory records, Computer History Museum, Box 12, Folder 20, Catalog 102734414.Google Scholar
- fr22 Claire L. Evans, <i>Broad Band: The Untold Story of the Women Who Made the Internet</i> (London: Penguin, 2018), 102.Google Scholar
- fr23 Steven Levy, <i>Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age</i> (New York: Viking, 2001). Google ScholarDigital Library
- fr24 <i>High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace</i>, ed. Peter Ludlow (Cambridge, MA: The MIT Press, 1996). Google ScholarDigital Library
- fr25 David Pescovitz, "Mondo 2000: An Open Source History," <i>bOING bOING</i>, April 6, 2010. https://boingboing.net/2010/04/06/mondo-2000-an-open-s.html. Accessed on August 20, 2019.Google Scholar
- fr26 Rudy Rucker, R. U. Sirius, and Queen Mu, <i>Mondo 2000: A User's Guide To The New Edge: Cyberpunk, Virtual Reality, Wetware, Designer Aphrodisiacs, Artificial Life, Techno-Erotic Paganism, and More</i> (New York: Perennial, 1992).Google Scholar
- fr27 William Gibson, <i>Neuromancer</i> (New York: Ace, 1984).Google Scholar
- fr28 Philip Elmer Dewitt, "Cyberpunk!" <i>Time</i>, February 8, 1993: 60.Google Scholar
- fr29 Lawrence M. Fisher, "Style makers; Ken Goffman and Alison Kennedy, magazine editors," <i>New York Times</i>, September 29, 1990, Section 1, 40.Google Scholar
- fr30 Fisher, "Style makers," <i>New York Times</i>, 40.Google Scholar
- fr31 Lee Felsenstein, "The cyberpunk computer," <i>Mondo 2000</i> 2 (Summer 1990): 21.Google Scholar
- fr32 "Contributors," <i>Mondo 2000</i> 1 (Fall 1989): 159.Google Scholar
- fr33 St. Jude, R.U. Sirius, and Bart Nagel, <i>The Cyberpunk Handbook: The Real Cyberpunk Fakebook</i> (New York: Random House, 1995).Google Scholar
- fr34 Nathaniel Popper, "Timothy C. May, early advocate of Internet privacy, Dies at 66," <i>New York Times</i>, December 21, 2018.Google Scholar
- fr35 Timothy C. May, "The Crypto Anarchist Manifesto," November 22, 1992. https://www.activism.net/cypherpunk/crypto-anarchy.html. Accessed on August 20, 2019.Google Scholar
- fr36 Levy, <i>Crypto</i>, 211.Google Scholar
- fr37 Robert Manne, "The Cypherpunk Revolutionary: Julian Assange," <i>The Monthly</i>, March 2011. https://www.themonthly.com.au/issue/2011/february/1324596189/robert-manne/cypherpunk-revolutionary. Accessed on August 19, 2019.Google Scholar
- fr38 Eric Hughes, "A Cypherpunk's Manifesto," March 9, 1993. https://www.activism.net/cypherpunk/manifesto.html. Accessed on August 19, 2019.Google Scholar
- fr39 Hanawalt, <i>Living Dangerously on the Margins</i>, 2.Google Scholar
Recommendations
Airplane Hackers
The US Department of Homeland Security and the TSA have been attacked by their first hacker. He wasn't a terrorist; he wasn't out to take over the planes. He isn't even a criminal; he didn't try to extort money. He was a hacker, plain and simple. He ...
Comments