skip to main content
chapter

Hackers and cyberpunks

Published:30 April 2020Publication History
First page image

References

  1. fr1 Barbara A. Hanawalt and Anna Grotans, eds., <i>Living Dangerously on the Margins in Medieval and Early Modern Europe</i> (Notre Dame, IN: University of Notre Dame Press, 2007).Google ScholarGoogle Scholar
  2. fr2 Bill Landreth, Out of the Inner Circle: A Hacker's Guide to Computer Security, with Howard Rheingold (Bellevue, WA: Microsoft Press, 1985), 10.Google ScholarGoogle Scholar
  3. fr3 Ron Rosenbaum, "Secrets of the Little Blue Box," <i>Esquire</i>, October 1, 1971, 117-124, 222-227.Google ScholarGoogle Scholar
  4. fr4 Landreth, <i>Out of the Inner Circle</i>, 15.Google ScholarGoogle Scholar
  5. fr5 See Matt Novak, "The untold story of the teen hackers who transformed the early Internet," <i>Gizmodo</i>, April 14, 2016.Google ScholarGoogle Scholar
  6. fr6 Joseph B. Treaster, "Trial and error by intruders led to entry into computer," <i>New York Times</i>, August 23, 1983, A1.Google ScholarGoogle Scholar
  7. fr7 Matt Novak, "Teen hackers."Google ScholarGoogle Scholar
  8. fr8 Rebecca Slayton, "Framing computer security and privacy, 1967-1992," in <i>Communities of Computing: Computer Science and Society in the ACM</i>, ed. Thomas J. Misa (San Francisco, CA: Morgan & Claypool/ACM Books, 2017), 287-329.Google ScholarGoogle Scholar
  9. fr9 Jon Lebkowsky, "Official bio of St. Jude," The Well, August 1, 2003. https://people.well.com/conf/inkwell.vue/topics/190/St-Jude-Memorial-and-Virtual-Wak-page01.html. Accessed August 29, 2019.Google ScholarGoogle Scholar
  10. fr10 Lebkowksy, "Official bio of St. Jude."Google ScholarGoogle Scholar
  11. fr11 State of Alabama, Department of Public Safety, Investigative and Identification Division, "Individuals Active in Civil Disturbances," Vol. 1 (1965). For the striking image of Behling, dated April 21, 1965, see http://digital.archives.alabama.gov/cdm/ref/collection/photo/id/1402.Google ScholarGoogle Scholar
  12. fr12 Dodson, "Obituary: Judith Milhon," 27.Google ScholarGoogle Scholar
  13. fr13 Daniel McCracken's A Guide to FORTRAN Programming (1961), or McCracken's FORTRAN with Engineering Applications (1967).Google ScholarGoogle Scholar
  14. fr14 Butler W. Lampson, "A Scheduling Philosophy for Multi-processing Systems," <i>Communications of the ACM</i> 11, no. 5 (May 1968): 347-359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. fr15 Butler W. Lampson, "Some remarks on a large new time-sharing system." Internal memo, Berkeley Computer Corporation, September 1970.Google ScholarGoogle Scholar
  16. fr16 Levy, Hackers, 160-161.Google ScholarGoogle Scholar
  17. fr17 Stewart Brand, "SPACE WAR: Fanatic life and symbolic death among the computer bums," <i>Rolling Stone</i>, December 7, 1972, 50-56.Google ScholarGoogle Scholar
  18. fr18 Anon., "The Community Memory Project: An Introduction," advertising brochure (August 1982), 11. Available in Community Memory Records, Box 12, Folder 26, Computer History Museum Archive, Fremont, California.Google ScholarGoogle Scholar
  19. fr19 Resource One/Community Memory Index (March 1974), p. 45 [Feb. 17, 1974]; in Community Memory Records, Box 13, Folder 5, Computer History Museum Archive.Google ScholarGoogle Scholar
  20. fr20 Bo Doub, "Community Memory: Precedents in Social Media and Movements, Computer History Museum," Feb 23, 2016. http://www.computerhistory.org/atchm/community-memory-precedents-in-social-media-and-movements/. Accessed August 20, 2019.Google ScholarGoogle Scholar
  21. fr21 "The Community Memory Project: An Introduction," 1982, Community Memory records, Computer History Museum, Box 12, Folder 20, Catalog 102734414.Google ScholarGoogle Scholar
  22. fr22 Claire L. Evans, <i>Broad Band: The Untold Story of the Women Who Made the Internet</i> (London: Penguin, 2018), 102.Google ScholarGoogle Scholar
  23. fr23 Steven Levy, <i>Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age</i> (New York: Viking, 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. fr24 <i>High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace</i>, ed. Peter Ludlow (Cambridge, MA: The MIT Press, 1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. fr25 David Pescovitz, "Mondo 2000: An Open Source History," <i>bOING bOING</i>, April 6, 2010. https://boingboing.net/2010/04/06/mondo-2000-an-open-s.html. Accessed on August 20, 2019.Google ScholarGoogle Scholar
  26. fr26 Rudy Rucker, R. U. Sirius, and Queen Mu, <i>Mondo 2000: A User's Guide To The New Edge: Cyberpunk, Virtual Reality, Wetware, Designer Aphrodisiacs, Artificial Life, Techno-Erotic Paganism, and More</i> (New York: Perennial, 1992).Google ScholarGoogle Scholar
  27. fr27 William Gibson, <i>Neuromancer</i> (New York: Ace, 1984).Google ScholarGoogle Scholar
  28. fr28 Philip Elmer Dewitt, "Cyberpunk!" <i>Time</i>, February 8, 1993: 60.Google ScholarGoogle Scholar
  29. fr29 Lawrence M. Fisher, "Style makers; Ken Goffman and Alison Kennedy, magazine editors," <i>New York Times</i>, September 29, 1990, Section 1, 40.Google ScholarGoogle Scholar
  30. fr30 Fisher, "Style makers," <i>New York Times</i>, 40.Google ScholarGoogle Scholar
  31. fr31 Lee Felsenstein, "The cyberpunk computer," <i>Mondo 2000</i> 2 (Summer 1990): 21.Google ScholarGoogle Scholar
  32. fr32 "Contributors," <i>Mondo 2000</i> 1 (Fall 1989): 159.Google ScholarGoogle Scholar
  33. fr33 St. Jude, R.U. Sirius, and Bart Nagel, <i>The Cyberpunk Handbook: The Real Cyberpunk Fakebook</i> (New York: Random House, 1995).Google ScholarGoogle Scholar
  34. fr34 Nathaniel Popper, "Timothy C. May, early advocate of Internet privacy, Dies at 66," <i>New York Times</i>, December 21, 2018.Google ScholarGoogle Scholar
  35. fr35 Timothy C. May, "The Crypto Anarchist Manifesto," November 22, 1992. https://www.activism.net/cypherpunk/crypto-anarchy.html. Accessed on August 20, 2019.Google ScholarGoogle Scholar
  36. fr36 Levy, <i>Crypto</i>, 211.Google ScholarGoogle Scholar
  37. fr37 Robert Manne, "The Cypherpunk Revolutionary: Julian Assange," <i>The Monthly</i>, March 2011. https://www.themonthly.com.au/issue/2011/february/1324596189/robert-manne/cypherpunk-revolutionary. Accessed on August 19, 2019.Google ScholarGoogle Scholar
  38. fr38 Eric Hughes, "A Cypherpunk's Manifesto," March 9, 1993. https://www.activism.net/cypherpunk/manifesto.html. Accessed on August 19, 2019.Google ScholarGoogle Scholar
  39. fr39 Hanawalt, <i>Living Dangerously on the Margins</i>, 2.Google ScholarGoogle Scholar

References

  1. fr1 Barbara A. Hanawalt and Anna Grotans, eds., <i>Living Dangerously on the Margins in Medieval and Early Modern Europe</i> (Notre Dame, IN: University of Notre Dame Press, 2007).Google ScholarGoogle Scholar
  2. fr2 Bill Landreth, Out of the Inner Circle: A Hacker's Guide to Computer Security, with Howard Rheingold (Bellevue, WA: Microsoft Press, 1985), 10.Google ScholarGoogle Scholar
  3. fr3 Ron Rosenbaum, "Secrets of the Little Blue Box," <i>Esquire</i>, October 1, 1971, 117-124, 222-227.Google ScholarGoogle Scholar
  4. fr4 Landreth, <i>Out of the Inner Circle</i>, 15.Google ScholarGoogle Scholar
  5. fr5 See Matt Novak, "The untold story of the teen hackers who transformed the early Internet," <i>Gizmodo</i>, April 14, 2016.Google ScholarGoogle Scholar
  6. fr6 Joseph B. Treaster, "Trial and error by intruders led to entry into computer," <i>New York Times</i>, August 23, 1983, A1.Google ScholarGoogle Scholar
  7. fr7 Matt Novak, "Teen hackers."Google ScholarGoogle Scholar
  8. fr8 Rebecca Slayton, "Framing computer security and privacy, 1967-1992," in <i>Communities of Computing: Computer Science and Society in the ACM</i>, ed. Thomas J. Misa (San Francisco, CA: Morgan & Claypool/ACM Books, 2017), 287-329.Google ScholarGoogle Scholar
  9. fr9 Jon Lebkowsky, "Official bio of St. Jude," The Well, August 1, 2003. https://people.well.com/conf/inkwell.vue/topics/190/St-Jude-Memorial-and-Virtual-Wak-page01.html. Accessed August 29, 2019.Google ScholarGoogle Scholar
  10. fr10 Lebkowksy, "Official bio of St. Jude."Google ScholarGoogle Scholar
  11. fr11 State of Alabama, Department of Public Safety, Investigative and Identification Division, "Individuals Active in Civil Disturbances," Vol. 1 (1965). For the striking image of Behling, dated April 21, 1965, see http://digital.archives.alabama.gov/cdm/ref/collection/photo/id/1402.Google ScholarGoogle Scholar
  12. fr12 Dodson, "Obituary: Judith Milhon," 27.Google ScholarGoogle Scholar
  13. fr13 Daniel McCracken's A Guide to FORTRAN Programming (1961), or McCracken's FORTRAN with Engineering Applications (1967).Google ScholarGoogle Scholar
  14. fr14 Butler W. Lampson, "A Scheduling Philosophy for Multi-processing Systems," <i>Communications of the ACM</i> 11, no. 5 (May 1968): 347-359. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. fr15 Butler W. Lampson, "Some remarks on a large new time-sharing system." Internal memo, Berkeley Computer Corporation, September 1970.Google ScholarGoogle Scholar
  16. fr16 Levy, Hackers, 160-161.Google ScholarGoogle Scholar
  17. fr17 Stewart Brand, "SPACE WAR: Fanatic life and symbolic death among the computer bums," <i>Rolling Stone</i>, December 7, 1972, 50-56.Google ScholarGoogle Scholar
  18. fr18 Anon., "The Community Memory Project: An Introduction," advertising brochure (August 1982), 11. Available in Community Memory Records, Box 12, Folder 26, Computer History Museum Archive, Fremont, California.Google ScholarGoogle Scholar
  19. fr19 Resource One/Community Memory Index (March 1974), p. 45 [Feb. 17, 1974]; in Community Memory Records, Box 13, Folder 5, Computer History Museum Archive.Google ScholarGoogle Scholar
  20. fr20 Bo Doub, "Community Memory: Precedents in Social Media and Movements, Computer History Museum," Feb 23, 2016. http://www.computerhistory.org/atchm/community-memory-precedents-in-social-media-and-movements/. Accessed August 20, 2019.Google ScholarGoogle Scholar
  21. fr21 "The Community Memory Project: An Introduction," 1982, Community Memory records, Computer History Museum, Box 12, Folder 20, Catalog 102734414.Google ScholarGoogle Scholar
  22. fr22 Claire L. Evans, <i>Broad Band: The Untold Story of the Women Who Made the Internet</i> (London: Penguin, 2018), 102.Google ScholarGoogle Scholar
  23. fr23 Steven Levy, <i>Crypto: How the Code Rebels Beat the Government--Saving Privacy in the Digital Age</i> (New York: Viking, 2001). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. fr24 <i>High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace</i>, ed. Peter Ludlow (Cambridge, MA: The MIT Press, 1996). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. fr25 David Pescovitz, "Mondo 2000: An Open Source History," <i>bOING bOING</i>, April 6, 2010. https://boingboing.net/2010/04/06/mondo-2000-an-open-s.html. Accessed on August 20, 2019.Google ScholarGoogle Scholar
  26. fr26 Rudy Rucker, R. U. Sirius, and Queen Mu, <i>Mondo 2000: A User's Guide To The New Edge: Cyberpunk, Virtual Reality, Wetware, Designer Aphrodisiacs, Artificial Life, Techno-Erotic Paganism, and More</i> (New York: Perennial, 1992).Google ScholarGoogle Scholar
  27. fr27 William Gibson, <i>Neuromancer</i> (New York: Ace, 1984).Google ScholarGoogle Scholar
  28. fr28 Philip Elmer Dewitt, "Cyberpunk!" <i>Time</i>, February 8, 1993: 60.Google ScholarGoogle Scholar
  29. fr29 Lawrence M. Fisher, "Style makers; Ken Goffman and Alison Kennedy, magazine editors," <i>New York Times</i>, September 29, 1990, Section 1, 40.Google ScholarGoogle Scholar
  30. fr30 Fisher, "Style makers," <i>New York Times</i>, 40.Google ScholarGoogle Scholar
  31. fr31 Lee Felsenstein, "The cyberpunk computer," <i>Mondo 2000</i> 2 (Summer 1990): 21.Google ScholarGoogle Scholar
  32. fr32 "Contributors," <i>Mondo 2000</i> 1 (Fall 1989): 159.Google ScholarGoogle Scholar
  33. fr33 St. Jude, R.U. Sirius, and Bart Nagel, <i>The Cyberpunk Handbook: The Real Cyberpunk Fakebook</i> (New York: Random House, 1995).Google ScholarGoogle Scholar
  34. fr34 Nathaniel Popper, "Timothy C. May, early advocate of Internet privacy, Dies at 66," <i>New York Times</i>, December 21, 2018.Google ScholarGoogle Scholar
  35. fr35 Timothy C. May, "The Crypto Anarchist Manifesto," November 22, 1992. https://www.activism.net/cypherpunk/crypto-anarchy.html. Accessed on August 20, 2019.Google ScholarGoogle Scholar
  36. fr36 Levy, <i>Crypto</i>, 211.Google ScholarGoogle Scholar
  37. fr37 Robert Manne, "The Cypherpunk Revolutionary: Julian Assange," <i>The Monthly</i>, March 2011. https://www.themonthly.com.au/issue/2011/february/1324596189/robert-manne/cypherpunk-revolutionary. Accessed on August 19, 2019.Google ScholarGoogle Scholar
  38. fr38 Eric Hughes, "A Cypherpunk's Manifesto," March 9, 1993. https://www.activism.net/cypherpunk/manifesto.html. Accessed on August 19, 2019.Google ScholarGoogle Scholar
  39. fr39 Hanawalt, <i>Living Dangerously on the Margins</i>, 2.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in

Full Access

  • Published in

    cover image ACM Books
    Code Nation: Personal Computing and the Learn to Program Movement in America
    April 2020
    404 pages
    ISBN:9781450377584
    DOI:10.1145/3368274

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 30 April 2020

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • chapter

    Appears In

  • Article Metrics

    • Downloads (Last 12 months)1
    • Downloads (Last 6 weeks)0

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader