1 See R v. Thompson [1984] 3 All ER 565 concerning the attempt to realise in England the proceeds of a computer fraud perpetrated on a bank in Kuwait.

2(Kevin Andrew Buhr) alt. hackers

3e-mail correspondence from Neil Woods

4The Net News is a term for the many and varied electronic discussion groups which are available on the Internet

5The New Hacker's Dictionary compiled by Eric S. Raymond, MIT Press 1993

reg.UNIX is a registered Trademark of AT&T Laboratories.

6United States v Riggs 739 F. Supp. 414;1990

[7]Female 'hackers' do seem to be rarer than their male counterparts although according to Hacker folklore, 'hacker' marriages are common with romance blossoming online. Leslie Lynne Doucette who in 1990, admitted trafficking in stolen telephone access codes and who was the head of an extensive computer fruad scheme is one of the few reported female 'hacker' cases.

8The Sun Herald, 22 July 1994

9Computer Systems Consulting (CSC). WWW page spy.org

10Newsday March 4th 1994

11Fire Walls are designed to regulate traffic both entering and exiting sites. All outgoing and incoming packets to and from the Internet are examined, often only packets from registered sources are permitted to enter.

12Gopher is a shared protocol on the Internet which allows any site ruuning a gopher client to browse the public domain information available at any Internet site running a gopher server. The gopher software was developed by the University of Minnesota whose state emblem is a gopher. The term was also chosen as the gopher appears to be 'burrowing' across Cyberspace and dragging back a compendium of information resources and presenting them in acommon menu.

13Wire Pirates by Paul Wallich , Scientific American March 1994 and much discussed in the internet newsgroup , alt.hackers.

14World WideWeb page(see next endnote). The Internet Underground which contains a link to the Boxing Page which lists the function of all the colour boxes and describes how to build them !

[15]World Wide Web is the successor to Gopher. Developed by CERN in Switzerland, information sources on the Internet can be accessed via hypertext browsers thus grealty enhancing the ease with which users can navigate the information highways. Gopher sites are linked to the Web which is quickly emerging as the standard information server on the Internet. And yes, 'hacking' the Web is a hot topic for discussion on the Net News. Fears as to its security are also quickly emerging!

[16]Browsers such as Mosaic and Cello offer a high level, hypertext linked interface to the information resources of the Internet.

[17]Christopher Menegay's Security Page, available on World Wide Web

[18]File Transfer Protocol. The precursor to Gopher. This shared protocol allowed sites to exchange files across a common platform. Many sites permit anonymous login to the public domain areas.

19As defined in The New Hacker's Diectionary

20Eugene Spafford in his paper, The Internet Worm:An Analysis (spaf@cs.purdue.edu) commented that many programmers could have written the worm with far fewer errors and that had it been 'properly' written, it could have been considerably more virulent.

21These viruses may lie dormant in a computer for some time and come into operation only when the computer system's internal clock indicates that the date is Friday 13th or March 6, Michaelangelo's birthday.

[22] Both Law Commissions have been active in the field of computer crime. The first actions were taken by the Scottish Law Commission which published a consultative memorandum (No 68) in 1986 entitled Computer Crime and followed this with a report under the same title in 1987 (Cm 174). The Law Commission, arguing that the title computer crime was excessively conclusory as significant aspects of computer related conduct might not constitute an offence under existing provisions of the criminal law, published a Working Paper entitled Computer Misuse in 1988 (No 110) and a Report (No 186) in 1989.

[23] The Audit Commission have conducted triennial surveys since 1980 attempting to assess the scale first of computer fraud and, in its latest report, of other forms of computer abuse. The Audit Commission's statistics can only reflect those instances of fraud and abuse which are reported by their victims, but do provide a counterpoint to some of the wilder speculations about the cost of computer misuse reported in the media.

[24] In the case of United States v. Lambert 446 F.Supp 890 (1978), the defendant sold information derived from a computer owned by the Drug Enforcement Agency which identified informants and described the status of the agency's investigations. No tangible property was removed but the District Court upheld the competence of a prosecution alleging theft of "any record, voucher, money or thing of value to the United States" (18 USC [[section]] 641), holding that the conjunction of the terms "record" and "thing of value" extended the application of the provision beyond the situation where physical property was removed.