hackerpress.

We stop paying attention in 1985; by this time the battle is well and truly lost, and the term "hacker" means a computer criminal or vandal. Interesting turns of phrases are in red. Events that might be considered "seminal" or "wide-net" are in blue. Some of these articles don't contain the hacker term in the summary below; after the full article is pulled, the relevant passage will be put in.

"Hacker" precedes relevance with computers as a term used in Golf.

1980.

Boston Globe - December 9, 1980
COMPUTERS AND YOU BY PHIL BERTONI - A BATCH OF NEEDS FOR REAL-TIME RESPONSE

In our last exorcism of the devils of computer terminology, we named and expelled the demon "time-sharing." That's the process by which many users share the resources of a computer system simultaneously, or seemingly so, under the illusion that each has the exclusive use of the system. We peered amongst the bluish vapors and reflections that contribute to the illusion, noting that the computer is so fast, relative to humans, that it can service each user in turn for the barest...

1982.

June, 1982
USENET NEWS POSTING THREAD: IS "HACKER" GOOD?

Miami Herald, The (FL) - November 21, 1982
IF YOU CAN'T HACK THE JARGON

The act of retrieving information or hooking up to another computer system. Usage: "If you know your way around, you can access the country."CRASH -- When a program-- or the whole computer system-- suddenly becomes inoperable. "Shane recently crashed the entire mail system."DOWN -- When the computers are shut off. "The system goes down at 4 a.m."FILE -- Work stored in the computer, much like an electronic file cabinet. "If they were...

Miami Herald, The (FL) - November 21, 1982
HACKERS: MISCREANTS OR JUST MISUNDERSTOOD?

The question remains: Are hackers a threat or a boon to the normal conventions of society? Further, is it healthy to be a hacker? This is being debated by psychologists, investigators and computer scientists on the college campuses where hackers most frequently appear.James Milojkovic, an Australian psychologist studying for his Ph.D at Stanford University, is writing a dissertation on the "cognitive and emotional consequences of micro-computing." His work has led him to...

Miami Herald, The (FL) - November 21, 1982
IMPS OF AN ELECTRONIC PRIESTHOOD

They lock the doors at 11. But if you're in the Florida International University Computer Lab by then, you can stay practically all night or, at least, until they shut the system down at 4 a.m. This is, one might think, as long as any living human being might want to spend interacting with a machine.This is an incorrect assumption.It is a Friday night. One side of the FIU campus out west on Tamiami Trail is hopping. A hot high school football game is in progress, and cars...

1983.

June 3, 1983
WARGAMES IS RELEASED.

1984.

January, 1984
2600 MAGAZINE ISSUE #1 PUBLISHED.

1984 (Still unsure of exact month)
"HACKERS: HEROES OF THE COMPUTER REVOLUTION" BY STEVEN LEVY PUBLISHED.

The Daily Oklahoman - April 8, 1984
NEW COMPUTER CRIME LAW AIMED AT SYSTEM CRASHERS

With Gov. George Nigh's signature two weeks ago, Oklahoma became the 21st state to put a computer crime law on the books. ""There was input from a tremendous amount of people . . . banking industry, oil industry and various chambers of commerce,'' said Sen. Robert Hopkins, D-Tulsa, one of two sponsors of the Oklahoma Computer Crimes Act.As much as providing state legal officials with local guidelines to prosecute high-tech thieves, business leaders and...

Boston Globe - September 1, 1984
US/WORLD NEWS IN BRIEF: HACKER' AIDS FRAUD PROBE

COLUMBIA, Md. - A boy who allegedly bought rare comic books and other goods worth thousands of dollars by using a computer to get credit-card numbers is helping authorities trace other "hackers" across the country, police said yesterday. The boy, whose name has not been released because he is only 13, had the equipment delivered to unoccupied model homes in his housing development in this Baltimore suburb, Howard County police...

Miami Herald, The (FL) - November 23, 1984
HACKER: I TAPPED INTO PENTAGON

A convicted computer "hacker" who is apparently under FBI investigation claims he gained access to a Defense Department computer network about 100 times -- once learning military plans to monitor earthquakes in Communist countries.Steven Rhoades, 20, of Pasadena, a suspect in a separate investigation by the district attorney's office for allegedly gaining access to telephone company computers, said it was difficult to stop hacking "because it's so...

Philadelphia Daily News (PA) - December 5, 1984
HACKED MAG WRITER FEELS WRATH OF COMPUTER WHIZ KIDS

For a while, it was kind of fun for Montana Wildhack. The calls from his former associates were only mildly abusive, however numerous. At times, he engaged in playful banter with them; other times, he'd simply hang up.But then things turned ugly.They got access to his credit history, his credit-card numbers and other highly confidential personal records in an effort to exact revenge against one who they felt had betrayed them.Wildhack, in reality Newsweek correspondent...

Philadelphia Inquirer, The (PA) - December 5, 1984
COMPUTER HACKERS REPORTEDLY HARASSING WRITER

Computer hackers, seeking revenge against a Newsweek reporter who cracked their secret network and wrote about their abuses, have threatened him, stolen his credit-card numbers and put him on "teletrial," the reporter charged yesterday. "The hardest part about this is remembering how significant what they've done is," reporter Richard Sandza said in an interview. "Calling me up and harassing me is one thing. But going into my credit reports got my attention....

Washington Post, The (DC) - December 6, 1984
HACK ATTACK

It was a terrific story, and Richard Sandza knew it. In four columns, which his editors at Newsweek headlined "Night of the Hackers," Sandza led the reader through the disembodied and mostly illegal world of bright young men who play a kind of cross-country electronic chicken with their home computers. Using long-distance telephone lines that they break into by duplicating telephone company tones, Sandza wrote, the hackers log onto each other's underground "bulletin...

Lexington Herald-Leader (KY) - December 9, 1984
'PIRATE BOARD' OPERATOR TEETERS AT EDGE OF LAW

CHARLESTON, W.Va. - He readily admits dealing on the fringe of legality, but the computer "pirate board" operator known as Scan Man insists there's nothing wrong with his secret electronic meeting place."I'm just running a nice technical hobby - although slightly nefarious," said Scan Man, a 31-year-old Charleston resident named Scott who asks that his last name be kept secret.For the last two years, Scott has run Pirate 80, an underground electronic...

Boston Globe - December 10, 1984
INFORMATION PIRATES

Information on more than 120 million consumers in the nation's largest credit information storage system is readily available to computer pirates who pilfer access codes from its users, a spokeswoman for the credit company says. So-called hackers invade TRW's vast computerized credit library using codes stolen from the banks, stores or finance companies who are its customers, according to Delia Fernandez. She said TRW cannot secure its system against...

Washington Post, The (DC) - December 10, 1984
Hounding Teenage Hackers Won't Plug Those Leaky Computers

The petulant boys and girls who play in the sandbox called the U.S. Senate got into one of their typical temper tantrums in the last hours of the 98th Congress this fall. They were so busy shouting and calling each other names that nobody seemed interested in passing any legislation.In desperation, the Senate leadership decided that the only way to make these mature, responsible public servants do their work was to hold an all-night session. A long line of cots was set up in the Capitol...

SACRAMENTO BEE - December 11, 1984
WRITER OVERCOMES 'QUEEG,' 'BLOTTO' IN COMPUTER TRIAL

The judge was called the Axe Murderer. The jury was screaming kill the dude. Things didn't look good for Richard Sandza. His crime? Upsetting a bunch of outlaw computer hackers, mysterious computer operators who use their machines to break into corporate computers for fun and sometimes fraud. They put him on teletrial for infiltrating their world by computer and writing about it in Newsweek magazine. In a sudden turn of events over the weekend, Newsweek staff writer Sandza said...

Boston Globe - December 18, 1984
SOMETHING FOR THE HACKER ON YOUR CHRISTMAS LIST

So your friend/spouse/sibling has discovered the agony and the ecstasy of personal computers. Now you need to come up with a holiday gift. Short of spending $150 or more for a modem, or $350-plus for a color monitor or $800-plus for a hard disk drive, you need to come up with a gift or a stocking stuffer without exhausting your credit-card limit. -...

Miami Herald, The (FL) - December 28, 1984
COMPUTER HACKERS ACCUSED OF RIPPING $12,000 IN CALLS OFF PHONE COMPANY

Young "hackers" in Brevard County used their home computers to access codes for a discount long-distance telephone service that resulted in at least $12,000 in illegal calls, officials said Thursday.Joe Rudd, security chief for Transcall America long- distance phone service, said five teen-age hackers learned the codes and put them on computer "bulletin boards" so others could use them.Rudd said the hackers spread the codes to other juveniles in the area. In all,...
1985.

Detroit Free Press (MI) - January 2, 1985
FBI RESOLUTION: GET COMPUTER 'HACKERS'

The Detroit FBI office -- whose investigations led to trials in 1984 that resulted in convictions of Detroit's former water director and the mayor of Dearborn Heights -- will begin 1985 with a new law that signals an offensive against "hackers" and other computer criminals."The Comprehensive Crime Control Act of 1984 does broaden our area of application in computer crime, so we'll be even more active in that area than we have previously," said Wayne...

The San Diego Tribune - January 14, 1985
Computer `hacker' sentenced for harassment

LOS ANGELES(UPI) -- A convicted computer "hacker" who claimed he illegally accessed a Defense Department computer network about 100 times was sentenced to 90 days in jail for conducting a campaign of harassment against a woman.Steven Rhoades, 20, used his home computer to learn personal information about Wendy Melnick, the target of his harassment campaign, Deputy City Attorney Stephanie Sautner said.Sautner said Rhoades harassed the woman from June to September at the request ...

The Record (New Jersey) - January 14, 1985
UNLOCKING EVIDENCE IS CHILD'S PLAY `HACKER, 15, CRACKS COMPUTER FOR POLICE

A 15-year-old "hacker" who once broke into a bank's computer has eased his conscience by helping police crack a computer code that led to evidence sought in a child sex-abuse investigation.Police were trying to break computer security measures keeping them from what they suspected to be a 37-year-old man's accounts of sex with young boys. Peter Lippik was called in to try to get to the accounts, recorded on the computer's software."Well, I've been...

Miami Herald, The (FL) - January 14, 1985
TEEN 'HACKER' TURNS CRACKER IN SEX CASE

A 15-year-old "hacker" who once tapped into a bank's computer has eased his conscience by helping police to crack a computer code that led to evidence sought in a child sex abuse investigation.suspect's accounts of sex with young boys. Peter Leppik was called in to try to get to the accounts, recorded on the computer's software.On Saturday, it...

THE SAN FRANCISCO CHRONICLE - January 15, 1985
THE HELPFUL HACKER

Young computer `hacker' Peter Leppik of Minneapolis was credited by police with acquiring electronic evidence that will be used in the trial of a computer programmer on charges of sexual conduct with a teenage boy. After hearing that Lyle Paton, 37, used a computer to store information about his sexual encounters, police confiscated the computer in December but were unable for more than a month to crack the code in which the information was entered. Finally they turned to the 15-year-old...

THE SAN FRANCISCO CHRONICLE - January 31, 1985
BAY AREA VICTIM HACKERS BIG PHONE RIPOFF

Teenage computer gremlins around the country are suspected of stealing a Campbell man's Sprint telephone number and using it to make long-distance calls worth $60,000 over two months. Tom Bestor, speaking for Sprint-GTE in Burlingame, said yesterday that the culprits rang up more than 250,000 minutes of calls that left their victim with a 722-page telephone bill for December - so heavy that it had to be delivered by Federal Express. Several of the computer hackers...

The San Diego Union - February 3, 1985
Through The Computer Glass, Beware The Mad Hacker

DEEPER INTO THE electronic underground, deeper still. When Alice slipped through the looking glass, she entered no stranger a world. In the electronic underground, you're likely to run into Mad Hackers, pirates and phreakers, and kids looking for love and neo-Nazis looking for revenge, and electronic courtrooms meting out electronic punishment -- and, wooo!, where's the door outta here?