The Hacker Crackdown

Total Page:16

File Type:pdf, Size:1020Kb

The Hacker Crackdown THE HACKER CRACKDOWN Law and Disorder on the Electronic Frontier Texinfo Edition February by Bruce Sterling Literary Freeware Not for Commercial Use c Copyright Bruce Sterling bruceswellsfcaus This is Texinfo edition as of January created by Jorg Heitkotter jokelsinformatikunidortmundde The original plain ASCI I les are available electronically by Gopher from ticcom Permission is granted to make and distribute verbatim copies of this b o oklet provided the copyright notice and this p ermission notice are preserved on all copies Preface to the Electronic Release Preface to the Electronic Release January Austin Texas Hi Im Bruce Sterling the author of this electronic b o ok Out in the traditional world of print The Hacker Crackdown is ISBN X and is formally catalogued by the Library of Congress as Computer crimes United States Telephone United States Corrupt practices Programming Electronic computers United States Corrupt practices Corrupt practices I always get a kick out of that description Librarians are very ingenious p eople The pap erback is ISBN X If you go and buy a print version of The Hacker Crack down an action I encourage heartily you may notice that in the front of the b o ok b eneath the c copyright notice Copyright by Bruce Sterling it has this little blo ck of printed legal b oilerplate from the publisher It says and I quote No part of this b o ok may b e repro duced or transmitted in any form or by any means electronic or mechanical including photo copying recording or by any information storage and retrieval sys tem without p ermission in writing from the publisher For information address Bantam Bo oks This is a pretty go o d disclaimer as such disclaimers go I collect intellectualprop erty dis claimers and Ive seen dozens of them and this one is at least pretty straightforward In this narrow and particular case however it isnt quite accurate Bantam Bo oks puts that disclaimer on every b o ok they publish but Bantam Bo oks do es not in fact own the electronic rights to this b o ok I do b ecause of certain extensive contract maneuverings my agent and I went through b e fore this b o ok was written I want to give those electronic publishing rights away through certain notforprot channels and Ive convinced Bantam that this is a go o d idea Since Bantam has seen t to p eacably agree to this scheme of mine Bantam Bo oks is not going to fuss ab out this Provided you dont try to sell the b o ok they are not going to b other you for what you do with the electronic copy of this b o ok If you want to check this out p ersonally you can ask them theyre at Broadway NY NY However if you were so fo olish as to print this b o ok and start retailing it for money in violation of my copyright and the commercial interests of Bantam Bo oks then Bantam a part of the gigantic Bertelsmann multinational publishing combine would roust some of their heavyduty attorneys out of hib ernation and crush you like a bug This is only to b e exp ected I didnt write this b o ok so that you could make money out of it If anyb o dy is gonna make money out of this b o ok its gonna b e me and my publisher My publisher deserves to make money out of this b o ok Not only did the folks at Bantam Bo oks commission me to write the b o ok and pay me a hefty sum to do so but they bravely printed in text an electronic do cument the repro duction of which was once alleged to b e a federal felony Bantam Bo oks and their numerous attorneys were very brave and forthright ab out this b o ok Furthermore my former editor at Bantam Bo oks Betsy Mitchell genuinely cared ab out this pro ject and worked hard on it and had a lot of wise things to say ab out the manuscript Betsy deserves genuine credit for this b o ok credit that editors to o rarely get The critics were very kind to The Hacker Crackdown and commercially the b o ok has done well On the other hand I didnt write this b o ok in order to squeeze every last nickel and dime out of the mitts of imp overished sixteenyearold cyb erpunk highscho olstudents Teenagers dont have any money no not even enough for the sixdollar Hacker Crackdown pap erback with its attractive brightred cover and useful index Thats a ma jor reason why teenagers sometimes succumb to the temptation to do things they shouldnt such as swiping my b o oks out of libraries Kids this one is all yours all right Go give the print version back Wellmeaning publicspi rited civil lib ertarians dont have much money either And it seems almost criminal to snatch cash out of the hands of Americas direly underpaid electronic law en forcement community The Hacker Crackdown If youre a computer cop a hacker or an electronic civil lib erties activist you are the target audience for this b o ok I wrote this b o ok b ecause I wanted to help you and help other p eople understand you and your unique uhm problems I wrote this b o ok to aid your activities and to contribute to the public discussion of imp ortant p olitical issues In giving the text away in this fashion I am directly contributing to the b o oks ultimate aim to help civilize cyb erspace Information wants to b e free And the information inside this b o ok longs for freedom with a p eculiar intensity I genuinely b elieve that the natural habitat of this b o ok is inside an electronic network That may not b e the easiest direct metho d to generate revenue for the b o oks author but that do esnt matter this is where this b o ok b elongs by its nature Ive written other b o oks plenty of other b o oks and Ill write more and I am writing more but this one is sp ecial I am making The Hacker Crackdown available electronically as widely as I can conveniently manage and if you like the b o ok and think it is useful then I urge you to do the same with it You can copy this electronic b o ok Copy the heck out of it b e my guest and give those copies to anyb o dy who wants them The nascent world of cyb erspace is full of sysadmins teachers trainers cybrarians netgurus and various sp ecies of cyb ernetic activists If youre one of those p eople I know ab out you and I know the hassle you go through to try to help p eople learn ab out the electronic frontier I hop e that p ossessing this b o ok in electronic form will lessen your troubles Granted this treatment of our electronic so cial sp ectrum is not the ultimate in academic rigor And p olitically it has something to oend and trouble almost everyone But hey Im told its readable and at least the price is right You can upload the b o ok onto bulletin b oard systems or Internet no des or electronic discussion groups Go right ahead and do that I am giving you express p ermission right now Enjoy yourself You can put the b o ok on disks and give the disks away as long as you dont take any money for it But this b o ok is not public domain You cant copyright it in your own name I own the copyright Attempts to pirate this b o ok and make money from selling it may involve you in a serious litigative snarl Believe me for the pittance you might wring out of such an action its really not worth it This b o ok dont b elong to you In an o dd but very genuine way I feel it do esnt b elong to me either Its a b o ok ab out the p eople of cyb erspace and distributing it in this way is the b est way I know to actually make this information available freely and easily to all the p eople of cyb erspace including p eople far outside the b orders of the United States who otherwise may never have a chance to see any edition of the b o ok and who may p erhaps learn something useful from this strange story of distant obscure but p ortentous events in socalled American cyb erspace This electronic b o ok is now literary freeware It now b elongs to the emergent realm of alternative information economics You have no right to make this electronic b o ok part of the conventional ow of commerce Let it b e part of the ow of knowledge theres a dierence Ive divided the b o ok into four sections so that it is less ungainly for upload and download if theres a section of particular relevance to you and your colleagues feel free to repro duce that one and skip the rest Just make more when you need them and give them to who ever might want them Now have fun Bruce Sterling bruceswellsfcaus Chronology of the Hacker Crackdown Chronology of the Hacker Crackdown US Secret Service USSS founded Alexander Graham Bell invents telephone First teenage males ung o phone system by enraged authorities Futurian sciencection group raided by Secret Service Yippie phone phreaks start YIPLTAP magazine Ram parts magazine seized in blueb ox ripo scandal Ward Christenson and Randy Suess create rst p ersonal computer bulletin b oard system William Gibson coins term cyb erspace Gang raided ATT dismantled in divestiture Congress passes Compre hensive Crime Control Act giving USSS jurisdiction over credit card fraud and computer fraud Legion of Do om formed The Hacker Quarterly founded Whole Earth Software Catalog published First p olice sting bulletin b oard systems established Whole Earth Lectronic Link computer conference WELL go es online Computer Fraud and Abuse Act passed Electronic Communications Privacy Act passed Chicago prosecutors form Computer Fraud and Abuse Task Force July Secret Service covertly videotap es Sum merCon hacker convention Septemb er Prophet cracks BellSouth AIMSX computer network and downloads E Do cument to his own computer and to Jolnet Septemb er ATT Corp o rate Information Security informed of Prophets action Octob er Bellcore Security informed
Recommended publications
  • Cyber-Conflict Between the United States of America and Russia CSS
    CSS CYBER DEFENSE PROJECT Hotspot Analysis: Cyber-conflict between the United States of America and Russia Zürich, June 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich Cyber-conflict between the United States of America and Russia Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zurich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: Cyber-conflict between the United States of America and Russia, June 2017, Center for Security Studies (CSS), ETH Zürich. 2 Cyber-conflict between the United States of America and Russia Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Tools and techniques 9 3.2 Targets 10 3.3 Attribution and actors 10 4 Effects 11 4.1 Social and internal political effects 11 4.2 Economic effects 13 4.3 Technological effects 13 4.4 International effects 13 5 Consequences 14 5.1 Improvement of cybersecurity 14 5.2 Raising awareness of propaganda and misinformation 15 5.3 Observation of the evolution of relations between the USA and Russia 15 5.4 Promotion of Confidence Building Measures 16 6 Annex 1 17 7 Glossary 18 8 Abbreviations 19 9 Bibliography 19 3 Cyber-conflict between the United States of America and Russia Executive Summary Effects Targets: US State institutions and a political The analysis found that the tensions between the party.
    [Show full text]
  • Paradise Lost , Book III, Line 18
    _Paradise Lost_, book III, line 18 %%%%%%%%%%%%%%%%%%%%%%%% ++++++++++Hacker's Encyclopedia++++++++ ===========by Logik Bomb (FOA)======== <http://www.xmission.com/~ryder/hack.html> ---------------(1997- Revised Second Edition)-------- ##################V2.5################## %%%%%%%%%%%%%%%%%%%%%%%% "[W]atch where you go once you have entered here, and to whom you turn! Do not be misled by that wide and easy passage!" And my Guide [said] to him: "That is not your concern; it is his fate to enter every door. This has been willed where what is willed must be, and is not yours to question. Say no more." -Dante Alighieri _The Inferno_, 1321 Translated by John Ciardi Acknowledgments ---------------------------- Dedicated to all those who disseminate information, forbidden or otherwise. Also, I should note that a few of these entries are taken from "A Complete List of Hacker Slang and Other Things," Version 1C, by Casual, Bloodwing and Crusader; this doc started out as an unofficial update. However, I've updated, altered, expanded, re-written and otherwise torn apart the original document, so I'd be surprised if you could find any vestiges of the original file left. I think the list is very informative; it came out in 1990, though, which makes it somewhat outdated. I also got a lot of information from the works listed in my bibliography, (it's at the end, after all the quotes) as well as many miscellaneous back issues of such e-zines as _Cheap Truth _, _40Hex_, the _LOD/H Technical Journals_ and _Phrack Magazine_; and print magazines such as _Internet Underground_, _Macworld_, _Mondo 2000_, _Newsweek_, _2600: The Hacker Quarterly_, _U.S. News & World Report_, _Time_, and _Wired_; in addition to various people I've consulted.
    [Show full text]
  • Reporting, and General Mentions Seem to Be in Decline
    CYBER THREAT ANALYSIS Return to Normalcy: False Flags and the Decline of International Hacktivism By Insikt Group® CTA-2019-0821 CYBER THREAT ANALYSIS Groups with the trappings of hacktivism have recently dumped Russian and Iranian state security organization records online, although neither have proclaimed themselves to be hacktivists. In addition, hacktivism has taken a back seat in news reporting, and general mentions seem to be in decline. Insikt Group utilized the Recorded FutureⓇ Platform and reports of historical hacktivism events to analyze the shifting targets and players in the hacktivism space. The target audience of this research includes security practitioners whose enterprises may be targets for hacktivism. Executive Summary Hacktivism often brings to mind a loose collective of individuals globally that band together to achieve a common goal. However, Insikt Group research demonstrates that this is a misleading assumption; the hacktivist landscape has consistently included actors reacting to regional events, and has also involved states operating under the guise of hacktivism to achieve geopolitical goals. In the last 10 years, the number of large-scale, international hacking operations most commonly associated with hacktivism has risen astronomically, only to fall off just as dramatically after 2015 and 2016. This constitutes a return to normalcy, in which hacktivist groups are usually small sets of regional actors targeting specific organizations to protest regional events, or nation-state groups operating under the guise of hacktivism. Attack vectors used by hacktivist groups have remained largely consistent from 2010 to 2019, and tooling has assisted actors to conduct larger-scale attacks. However, company defenses have also become significantly better in the last decade, which has likely contributed to the decline in successful hacktivist operations.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • 1.2 Cyber Security
    A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm A NEW VIRTUAL BATTLEFIELD Regional Cooperation Council Secretariat Trg Bosne i Hercegovine 1/V How to prevent online radicalisation 71000 Sarajevo, Bosnia and Herzegovina in the cyber security realm of the T +387 33 561 700 F +387 33 561 701 E [email protected] Western Balkans rcc.int RegionalCooperationCouncil rccint RCCSec RegionalCooperationCouncil Financed by the European Union 1 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm Good. Better. Regional. A NEW VIRTUAL BATTLEFIELD Title: A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the cyber security realm of the Western Balkans - How to prevent online Publisher: Regional Cooperation Council Trg Bosne i Hercegovine 1/V, 71000 Sarajevo Bosnia and Herzegovina Tel: +387 33 561 700; Fax: +387 33 561 701 radicalisation in the cyber E-mail: [email protected] Website: www.rcc.int Authors: Prof. Maura Conway security realm Sheelagh Brady Editor: Amer Kapetanovic, RCC Consulting editor: Zoran Popov, RCC Design & Layout: Šejla Dizdarević ISBN: 978-9926-402-11-2 December 2018 ©RCC2018 All rights reserved. The responsibility for the content, the views, interpretations and conditions expressed herein rests solely with the authors and can in no way be taken to reflect the views Sarajevo, December 2018. of the RCC or of its participants, partners, donors or of the European Union. 2 3 A NEW VIRTUAL BATTLEFIELD - How to prevent online radicalisation in the
    [Show full text]
  • Computers As Invocational Media
    Computers as invocational media Thesis submitted towards the degree of Doctor of Philosophy Christopher Bradford Chesher BA (Media and Communications) Mitchell College of Advanced Eduction MA (Interdisciplinary Studies) University of New South Wales Department of Media and Communications Division of Society, Culture, Media and Philosophy College of Humanities and Social Sciences Macquarie University March 2001 Table of contents Table of contents.............................................................................................iii Acknowledgments ......................................................................................... vii Introduction .......................................................................................................1 1. Computers and the Humanities ................................................................33 2. Invoking concepts .......................................................................................94 3. Ontology of the invocational interval .................................................... 135 4. Command, memory and decision machines.......................................... 172 5. User design................................................................................................. 215 6. Invocational aesthetics ............................................................................. 252 7. Hypertext, technology and invocationary acts ...................................... 289 Conclusions...................................................................................................
    [Show full text]
  • The Unique Cultural & Innnovative Twelfty 1820
    Chekhov reading The Seagull to the Moscow Art Theatre Group, Stanislavski, Olga Knipper THE UNIQUE CULTURAL & INNNOVATIVE TWELFTY 1820-1939, by JACQUES CORY 2 TABLE OF CONTENTS No. of Page INSPIRATION 5 INTRODUCTION 6 THE METHODOLOGY OF THE BOOK 8 CULTURE IN EUROPEAN LANGUAGES IN THE “CENTURY”/TWELFTY 1820-1939 14 LITERATURE 16 NOBEL PRIZES IN LITERATURE 16 CORY'S LIST OF BEST AUTHORS IN 1820-1939, WITH COMMENTS AND LISTS OF BOOKS 37 CORY'S LIST OF BEST AUTHORS IN TWELFTY 1820-1939 39 THE 3 MOST SIGNIFICANT LITERATURES – FRENCH, ENGLISH, GERMAN 39 THE 3 MORE SIGNIFICANT LITERATURES – SPANISH, RUSSIAN, ITALIAN 46 THE 10 SIGNIFICANT LITERATURES – PORTUGUESE, BRAZILIAN, DUTCH, CZECH, GREEK, POLISH, SWEDISH, NORWEGIAN, DANISH, FINNISH 50 12 OTHER EUROPEAN LITERATURES – ROMANIAN, TURKISH, HUNGARIAN, SERBIAN, CROATIAN, UKRAINIAN (20 EACH), AND IRISH GAELIC, BULGARIAN, ALBANIAN, ARMENIAN, GEORGIAN, LITHUANIAN (10 EACH) 56 TOTAL OF NOS. OF AUTHORS IN EUROPEAN LANGUAGES BY CLUSTERS 59 JEWISH LANGUAGES LITERATURES 60 LITERATURES IN NON-EUROPEAN LANGUAGES 74 CORY'S LIST OF THE BEST BOOKS IN LITERATURE IN 1860-1899 78 3 SURVEY ON THE MOST/MORE/SIGNIFICANT LITERATURE/ART/MUSIC IN THE ROMANTICISM/REALISM/MODERNISM ERAS 113 ROMANTICISM IN LITERATURE, ART AND MUSIC 113 Analysis of the Results of the Romantic Era 125 REALISM IN LITERATURE, ART AND MUSIC 128 Analysis of the Results of the Realism/Naturalism Era 150 MODERNISM IN LITERATURE, ART AND MUSIC 153 Analysis of the Results of the Modernism Era 168 Analysis of the Results of the Total Period of 1820-1939
    [Show full text]
  • Vermont Law Review [Vol
    TOWARD A MORE EQUITABLE PROSECUTION OF CYBERCRIME: CONCERNING HACKERS, CRIMINALS, AND THE NATIONAL SECURITY INTRODUCTION When I was fifteen and in tenth grade, on the first Friday of every month, I used to tell my mother I was engaged in some sort of after-school activity and would not be home until late that evening. Instead of engaging in that activity, I took the school bus as close as possible to the train station. I would then take the 3:06 p.m. train from Ronkonkoma, New York—the last stop on Long Island—to Pennsylvania Station, New York City. From Penn Station, I took the “F” Train uptown to 53rd and Lexington. From Lexington, I walked over to 3rd Avenue to what was then called the Citicorp building.1 I would glide down the escalators of the Citicorp building to where fast-food chains surrounded the lobby and a large bank of payphones stood. In the lobby of the Citicorp building, on 53rd and 3rd, next to the payphones, the first Friday of every month, at five o’clock, was where the New York 2600 Meetings took place. This is where the hackers met. It was always a motley group. There were many teens wearing baggy black clothes, toting bags with arcane electronic equipment, radio frequency scanners, magnetic strip readers and writers, laptops, and mysteriously misappropriated telephone-company equipment. There was an older contingency who spoke of the days of yore when the telephone system operated on analog switches and blueboxing was commonplace.2 There were gentlemen in suits selling digital crystals, at an inflated price, that would allow one to construct a redbox.3 Like clockwork, a phone phreak4 from Australia, who used the alias “Phoney,” would call the Citicorp lobby’s payphones just to chat with the New York hackers, and would 1.
    [Show full text]
  • Threat Landscape Report – 1St Quarter 2018
    TLP-AMBER Threat Landscape Report – 1st Quarter 2018 (FINAL) V1.0 – 10/04/2018 This quarterly report summarises the most significant direct cyber threats to EU institutions, bodies, and agencies (EU-I or 'Constituents') in Part I, the development of cyber-threats on a broader scale in Part II, and recent technical trends in Part III. KEY FINDINGS Direct Threats • In Europe, APT28 / Sofacy threat actor (likely affiliated to Russia military intelligence GRU) targeted government institutions related to foreign affairs and attendees of a military conference. Another threat actor, Turla (likely affiliated to Russia’s security service FSB) executed a cyber-operation against foreign affairs entities in a European country. • A spear-phishing campaign that targeted European foreign ministries in the end of 2017 was attributed to a China-based threat actor (Ke3chang) which has a long track record of targeting EU institutions (since 2011). As regards cyber-criminality against EU institutions, attempts to deliver banking trojans are stable, ransomware activities are still in decline and cryptojacking on the rise. Phishing lures involve generic matters (’invoice’, ‘payment’, ‘purchase’, ‘wire transfer’, ‘personal banking’, ‘job application’) and more specific ones (foreign affairs issues, European think tanks matters, energy contracts, EU delegation, EU watch keeper). Almost all EU-I are affected by credential leaks (email address | password) on pastebin-like websites. Several credential- harvesting attempts have also been detected. Attackers keep attempting to lure EU-I staff by employing custom methods such as spoofed EU-I email addresses or weaponisation of EU-I documents. Broader Threats • Critical infrastructure. In the energy sector, the US authorities have accused Russian actors of targeting critical infrastructure (including nuclear) for several years and are expecting this to continue in 2018.
    [Show full text]
  • Cyberpower: the Culture and Politics of Cyberspace and the Internet
    Cyberpower Cyberspace and the Internet are becoming increasingly important in today’s societies and yet there has been little analysis of the forces and powers that construct life there. This book presents for the first time a wide ranging introduction to the politics of the Internet, covering all the key concepts of cyberspace. Subjects analysed include the collective imagination in cyberspace, the virtual individual and power and society as created by the Internet. The author uses examples ranging from cross-gendered virtual selves to the meaning of Bill Gates. In his questioning of who actually governs cyberspace and what powers the individual can control there, Tim Jordan presents a vast range of material, using case studies and original research in interviews as well as statistical and theoretical analysis. Organised around key concepts and providing an extensive bibliography of cyberspace-speak, Cyberpower will appeal to students as the first complete analysis of the politics and culture of the Internet. It will also be essential reading for anyone wondering how cyberspace is remaking global society and where the superhighway might be leading us. Tim Jordan is Senior Lecturer in the Department of Sociology, University of East London. Cyberpower The culture and politics of cyberspace and the Internet Tim Jordan London and New York First published 1999 by Routledge 11 New Fetter Lane, London EC4P 4EE Simultaneously published in the USA and Canada by Routledge 29 West 35th Street, New York, NY 10001 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor & Francis e-Library, 2003. © 1999 Tim Jordan All rights reserved.
    [Show full text]
  • INDEX to CLASSIFICATION - E Ejecting Or Ejector Class Subclass Class Subclass Class Subclass E-Layers in Thermo Nuclear Reactions 376 126 Body Supported
    E-Layers in Thermo Nuclear Reactions INDEX TO CLASSIFICATION - E Ejecting or Ejector Class Subclass Class Subclass Class Subclass E-Layers in Thermo Nuclear Reactions 376 126 Body supported ............................. 248 444 Testing instrument.................... D10 48 Ear Collapsible .................................... 248 460+ Carton Coupling detachable janney type .... 213 157 Copyholder ................................... 248 441.1+ Design ..................................... D09 757+ Guards ............................................. 2 455+ Advanceable copytype ................. 40 342+ Making...................................... 493 52+ Design...................................... D29 112 Line guide type ........................... 40 352+ Paper, compartmented box......... 206 521.1+ Surgical .................................... 128 857+ Painters ........................................ 248 444+ X-art collection ...................... 493 913* Hair cutters..................................... 30 29.5 Photographic enlarging Paperboard ............................... 206 521.1+ Pieces For original ............................... 355 75+ Wooden .................................... 217 18+ Eyeglass with protective............. 351 122 For photosensitive paper............ 355 72+ Cleaning........................................ 134 Speaking tube combined............ 181 20 Seat with ..................................... D06 335+ Brushing or scrubbing .................. 15 3.1+ Telephone................................. 381 385
    [Show full text]
  • Media Technology and Society
    MEDIA TECHNOLOGY AND SOCIETY Media Technology and Society offers a comprehensive account of the history of communications technologies, from the telegraph to the Internet. Winston argues that the development of new media, from the telephone to computers, satellite, camcorders and CD-ROM, is the product of a constant play-off between social necessity and suppression: the unwritten ‘law’ by which new technologies are introduced into society. Winston’s fascinating account challenges the concept of a ‘revolution’ in communications technology by highlighting the long histories of such developments. The fax was introduced in 1847. The idea of television was patented in 1884. Digitalisation was demonstrated in 1938. Even the concept of the ‘web’ dates back to 1945. Winston examines why some prototypes are abandoned, and why many ‘inventions’ are created simultaneously by innovators unaware of each other’s existence, and shows how new industries develop around these inventions, providing media products for a mass audience. Challenging the popular myth of a present-day ‘Information Revolution’, Media Technology and Society is essential reading for anyone interested in the social impact of technological change. Brian Winston is Head of the School of Communication, Design and Media at the University of Westminster. He has been Dean of the College of Communications at the Pennsylvania State University, Chair of Cinema Studies at New York University and Founding Research Director of the Glasgow University Media Group. His books include Claiming the Real (1995). As a television professional, he has worked on World in Action and has an Emmy for documentary script-writing. MEDIA TECHNOLOGY AND SOCIETY A HISTORY: FROM THE TELEGRAPH TO THE INTERNET BrianWinston London and New York First published 1998 by Routledge 11 New Fetter Lane, London EC4P 4EE Simultaneously published in the USA and Canada by Routledge 29 West 35th Street, New York, NY 10001 Routledge is an imprint of the Taylor & Francis Group This edition published in the Taylor & Francis e-Library, 2003.
    [Show full text]