Article ID: CBB806064945

Telenet, the 1983 Hacking Incidents, and the Construction of Network Security in the United States (2024)

unapi

1983 marked an important point in the development of how people behaved regarding security on data networks in the United States. The confluence of the movie WarGames with a series of high-profile network breaches of Telenet, one of the biggest commercial data networking providers at the time, created a great deal of popular media attention. This public attention exposed how multiple social groups approached security in the formative period of data networking. As seen through these hacking incidents, persistent problems in network security such as the use of insecure passwords were well established and understood in the 1980s, and led to shifts in social behavior and expectations rather than a change in the technology.

...More
Citation URI
data.isiscb.org/p/isis/citation/CBB806064945

This citation is part of the Isis database.

Similar Citations

Book David D. Clark; Sandra Braman; (2018)
Designing an Internet (/p/isis/citation/CBB601148284/) unapi

Article Karl Grindal; (2022)
Artist Collectives as the Origins of DDoS the Strano Network and Electronic Disturbance Theater (/p/isis/citation/CBB585173916/) unapi

Article Camille Paloque-Berges; (2022)
How EUNET Hacked European Digital Networks and Disappeared (/p/isis/citation/CBB402035453/) unapi

Article DuPont, Quinn; Fidler, Bradley; (2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity (/p/isis/citation/CBB760734420/) unapi

Book Duane C. Wilson; (2021)
Cybersecurity (/p/isis/citation/CBB201310866/) unapi

Article Nina Klimburg-Witjes; Alexander Wentland; (November 2021)
Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses (/p/isis/citation/CBB420821642/) unapi

Book Geoff White; (2020)
Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went Global (/p/isis/citation/CBB227937681/) unapi

Article Iván Chaar-López; (2019)
Sensing Intruders: Race and the Automation of Border Control (/p/isis/citation/CBB923205579/) unapi

Article Dunbar-Hester, Christina; (2009)
“Free the spectrum!” Activist encounters with old and new media technology (/p/isis/citation/CBB001180356/) unapi

Book Tsiao, Sunny; (2008)
“Read You Loud and Clear!”: The Story of NASA's Spaceflight Tracking and Data Network (/p/isis/citation/CBB001032649/) unapi

Article Umpleby, Stuart A.; (2008)
A Short History of Cybernetics in the United States (/p/isis/citation/CBB001032250/) unapi

Article Lukasik, Stephen J.; (2011)
Why the Arpanet Was Built (/p/isis/citation/CBB001231710/) unapi

Article Abbate, Janet; (2010)
Privatizing the Internet: Competing Visions and Chaotic Events, 1987--1995 (/p/isis/citation/CBB001231740/) unapi

Book Johnston, Jessica R.; (2009)
Technological Turf Wars: A Case Study of the Computer Antivirus Industry (/p/isis/citation/CBB001230682/) unapi

Article P. L. Frana; (2018)
Telematics and the Early History of International Digital Information Flows (/p/isis/citation/CBB402121196/) unapi

Article Thomas Erslev; (2018)
A brain worth keeping? Waste, value and time in contemporary brain banking (/p/isis/citation/CBB481072702/) unapi

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/p/isis/citation/CBB663965321/) unapi

Article Aynne Kokas; (2018)
Platform Patrol: China, the United States, and the Global Battle for Data Security (/p/isis/citation/CBB992297943/) unapi

Authors & Contributors
Abbate, Janet
Braman, Sandra
Clarke, David D.
Dunbar-Hester, Christina
Frana, Philip L.
Jasanoff, Sheila
Journals
IEEE Annals of the History of Computing
American Quarterly
Journal of Asian Studies
New Media & Society
Österreichische Zeitschrift für Geschichtswissenschaften
Science, Technology, and Human Values
Publishers
Harvard University
MIT Press
National Aeronautics and Space Administration, NASA History Division
Reaktion Books
Temple University Press
The MIT Press
Concepts
Computer networks
Internet
Computer security; cyber security
Computers and computing
Data protection
Hacking
Time Periods
20th century, late
21st century
20th century
Places
United States
China
Denmark
European Union
United Kingdom
Institutions
Apple (firm)
United States. National Aeronautics and Space Administration
National Science Foundation (U.S.)
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment