The Hacker Crackdown: Law and Disorder on the Electronic Frontier by Bruce Sterling

Read now or download (free!)

Choose how to read this book Url Size
Read online (web) https://www.gutenberg.org/ebooks/101.html.images 695 kB
EPUB3 (E-readers incl. Send-to-Kindle) https://www.gutenberg.org/ebooks/101.epub3.images 354 kB
EPUB (older E-readers) https://www.gutenberg.org/ebooks/101.epub.images 362 kB
EPUB (no images, older E-readers) https://www.gutenberg.org/ebooks/101.epub.noimages 336 kB
Kindle https://www.gutenberg.org/ebooks/101.kf8.images 705 kB
older Kindles https://www.gutenberg.org/ebooks/101.kindle.images 683 kB
Plain Text UTF-8 https://www.gutenberg.org/ebooks/101.txt.utf-8 661 kB
Download HTML (zip) https://www.gutenberg.org/cache/epub/101/pg101-h.zip 350 kB
There may be more files related to this item.

About this eBook

Author Sterling, Bruce, 1954-
Title The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Note Reading ease score: 62.9 (8th & 9th grade). Neither easy nor difficult to read.
Note Wikipedia page about this book: https://en.wikipedia.org/wiki/The_Hacker_Crackdown
Summary "The Hacker Crackdown: Law and Disorder on the Electronic Frontier" by Bruce Sterling is a historical account written in the early 1990s. The book explores the burgeoning world of cyberspace and the complex interplay between hackers, law enforcement, and telecommunications companies, particularly highlighting the significant Hacker Crackdown of 1990, during which government agents targeted the electronic underground and its players. The opening portion of the work sets the stage for a discussion on the changing nature of communication technologies and the legal landscape surrounding them, beginning with a significant incident on January 15, 1990, when a massive telephone system failure at AT&T caused widespread disruption. Bruce Sterling outlines the perceptions and fears of law enforcement regarding hackers, revealing a sense of paranoia following the crash, which some suspected was due to malevolent hacking. This part introduces the complicated dynamics between different stakeholders in cyberspace, such as police, telephone companies, and the hacker community, serving as a prelude to a deeper investigation into the events that shaped the digital environment of that era. (This is an automatically generated summary.)
Language English
LoC Class HV: Social sciences: Social pathology, Social and Public Welfare
Subject Computer crimes -- United States
Subject Telephone -- Corrupt practices -- United States
Subject Computer programming -- Corrupt practices -- United States
Category Text
EBook-No. 101
Release Date
Most Recently Updated Dec 6, 2024
Copyright Status Copyrighted. Read the copyright notice inside this book for details.
Downloads 586 downloads in the last 30 days.
Project Gutenberg eBooks are always free!