Federal Internet Law & Policy
An Educational Project


Dont be a FOOL; The Law is Not DIY
- Agencies
- - White House
- - DHS
- - NIST
- - NTIA
- - FCC
- Reference
- Cryptography

Crimes Against Network
- Worms, Viruses, Attacks
- Hackers
- Wireless Malware
- WiFi Security
- Cyberwar
- Network Reliability
- Infrastructure Protection
- - Kill Switch

Crimes Over Network
- CyberStalking
- Fraud
- - Auctions
- - Phishing
- Gambling
- ID Theft
- Offensive Words

Info Gathering
- Wiretaps
- Forensics
- Carnivore
- Patriot Act
- Data Retention
- Safe Web Act

- Assessment
- Reliability
- Vulnerabilities

"As the majority of hobbyists must be aware, most of you steal your software. Hardware must be paid for, but software is something to share. Who cares if the people who worked on it get paid?" Bill Gates Open Letter to Hacker HobbyistsLeaving CT, Feb. 3, 1976

The earliest computer hackers often were individuals with sophisticated computer skills who simply enjoyed exploring programming and stretching their computer’s capabilities. Hackers of this type still exist. Others, however, use their skills to write damaging code that propagates over the Internet or to break into private networks for malicious or criminal purposes. While many malicious hacker attacks rank as nuisances rather than being harmful, other hackers have moved into more damaging hostile or criminal activities, producing increasingly sophisticated malicious technologies and tools that proliferate across the Internet. Some of these hackers are taking advantage of their skills to earn money through information theft, identity theft, fraud, denial-ofservice (DoS) attacks, and extortion. The impact of hackers may expand even further if nation states and others, such as terrorist or organized criminal groups, hire the talent or exploit the hacker developed technologies. - Federal Plan for Cyber Security and Information Assurance: Research and Development, NSTC p. 7 (April 2006)

Federal Activity

  • FTC, Department of Justice to Host Forum on Child Identity Theft, FTC 6/6/2011
  • Mar. 8 Senate Commerce Committee hearing on Internet Security / Hacker Attacks 9:30 am  Room 253 Russell SOB.
  • Mar 9 Senate Small Business Committee CyberCrime: Can a Small Business Protect Itself? 9:30 a.m. 428A Senate Russell Office Building.
  • Consumer Information


  • David W. Opderbeck, Cybersecurity and Executive Power, Seton Hall Public Law Research Paper 3/25/2011
  • Stuxnet as Cyberwarfare: Applying the Law of War to the Virtual Battlefield, SSRN 7/28/2011
  • Caroline Eisenmann, When Hackers Turn to Blackmail , HBR Case Study, October 2009
  • PBS Frontline HACKERS
  • How to 0wn the Internet in Your Spare Time ICSI 10/30/02
  • The worm that ate the Internet? NWFusion 10/30/02
  • Researchers predict worm that eats the Internet in 15 minutes NWFusion 10/24/02
  • W. Reid Wittliff, Computer Hacking and Liability Issues: When Does Liability Attach
  • Michael Lee et al., Electronic Commerce, Hackers, and the Search for Legitimacy: A Regulatory Proposal, 14 BERKELEY TECH. L.J. 839 (1999)
  • Books




  • Hackers contest makes a mess of Internet, sify 7/8/03
  • Phone Networks Open Doors for Hackers, Wash Post 6/16/03
  • Hackers converge on Pittsburgh, CNN 6/9/03
  • Cyber Alert: Portrait of an Ex-Hacker, BWO 6/2/03
  • NASA Servers Hacked, IDG 2/4/03
  • Why Can't Hackers Be Stopped? Newsfactor 11/1/02
  • Briton indicted for hacking into US systems FCW 11/15/02
  • Hacker Suspect to Fight Extradition ABC 11/15/02
  • Dot-Mil Hacker's Download Mistake Wired 11/15/02
  • Hackers Use Skills To Promote Politically Motivated Mischief, Newsfactor 5/15/02
  • Midwest Express Hackers Cause A Stir, MSNBC 5/6/02
  • Hackers Exploit Korea to attack global system, Korea Herald 5/1/02
  • Crackers Favor War Dialing, Register 4/26/02
  • How Teens Hack Million-Dollar Systems, Newsfactor 4/22/02
  • EU To Clamp Down On Hack Attacks, Reuters 4/22/02
  • Hacking 'legal' in Argentina, BBC 4/17/02
  • Businesses Loath To Report Hack Attacks, Newsbytes 4/8/02
  • Hacking made easy, CNEWS 3/4/02
  • Hacker: Web Worm Meant To Combat Sexism, Reuters 3/6/02
  • Internet Firm Hacked Out of Business, Yahoo 2/1/02
  • Hackers Set Sights On Home PC Users, AP 1/4/02
  • XP vulnerable to Hackers, CNEWS 12/20/01
  • Routers May Be Latest Hacker Target, IWeek 12/18/01
  • Hacker explains recent exploits inside WorldCom network, CW 12/7/01
  • Hacker views MCI network, MSNBC 12/6/01
  • Satanic Hacking Group Targets Church Sites, Newsbytes 11/28/01
  • Hack Attacks Become Deadlier: Is There a Defense?, Newsfactor 11/28/01
  • Alpha Force on Voyage to Hack Web Servers, Newsfactor 11/27/01
  • Hackers Could Easily Shut Down Net, Reuters 11/15/01
  • Cambridge: Hacking bank computers not so hard, USAToday 11/9/01
  • Russian hacker's story shows financial system's weak spots, USAToday 10/30/01
  • Swiss Hackers Grab 250,000 E-mail Addresses, Passwords, Newsbytes 7/24/01
  • Hacker suspect nabbed at Net show, CNN 5/6/03
  • Suspected Web Hacker Arrested At Show, Reuters 4/30/03
  • Hacker causes havoc for websites, BBC 4/23/03
  • Be the hacker, NWFusion 4/14/03
  • Hacking Attacks Jump 37 Percent, Newsfactor 4/9/03
  • Worm Targets Hackers, TechTV 3/3/03
  • FBI Seeks Hacker, USA Today 2/7/03
  • NIPC Gets "F" In Hack Attack Warnings, InternetNews 5/23/01
  • Pentagon Computers Hacked 215 Times in Past Year, Newsfactor 5/18/01
  • Vandals Attack, CNET 5/4/01
  • ***
  • © Cybertelecom ::