Bibliography

Abbate, Janet. Inventing the Internet. Cambridge, Mass.: MIT Press, 1999.

Abrahams, Ray. Vigilant Citizens: Vigilantism and the State. Cambridge: Polity Press, 1999.

Ackerman, Brad. “Re: Green Card Lottery- Final One?” In alt.internet.services, alt.tasteless, alt.cyberpunk, alt.culture.internet, news.admin.policy, April 23, 1994.

Adler v. Republic of Nigeria, 219 F.3d 869 (9th Cir. 2000), case no. 98–55456.

Agar, Jon. The Government Machine: A Revolutionary History of the Computer. Cambridge, Mass.: MIT Press, 2003.

Akera, Atsushi. Calculating a Natural World: Scientists, Engineers, and Computers During the Rise of U.S. Cold War Research. Cambridge, Mass.: MIT Press, 2007.

Alder, Ken. “America’s Two Gadgets: Of Bombs and Polygraphs.” Isis 98 (1) (March 2007): 124–137.

Alder, Ken. The Lie Detectors: The History of an American Obsession. Lincoln: University of Nebraska Press, 2009.

Anderson, C. W. “Deliberative, Agonistic, and Algorithmic Audiences: Journalism’s Vision of its Public in an Age of Audience Transparency.” International Journal of Communication 5 (2011): 529–547.

Anderson, C. W. “From Indymedia to Demand Media: Journalism’s Visions of Its Audience and the Horizons of Democracy.” In The Social Media Reader, ed. Michael Mandeberg, 77–96. New York: New York University Press, 2012.

Anderson, D. S., et al. “Spamscatter: Characterizing Internet Scam Hosting Infrastructure.” Proceedings of 16th USENIX Security Symposium (2007).

Anderson, Nate. “Massive DDoS Attacks Target Estonia; Russia Accused.” Ars Technica, May 2007. http://arstechnica.com/security/2007/05/massive-ddos-attacks-target-estonia-russia-accused/.

Angwin, Julia. Stealing MySpace: The Battle to Control the Most Popular Website in America. New York: Random House, 2009.

Armstrong, Alice. “‘Sakawa’ Rumours: Occult Internet Fraud and Ghanaian Identity.” UCL working paper no. 8/2011.

Atwood, Jeff. “The Elephant in the Room: Google Monoculture.” Coding Horror (blog), February 9, 2009. http://www.codinghorror.com/blog/2009/02/the-elephant-in-the-room-google-monoculture.html.

Battelle, John. The Search: How Google and Its Rivals Rewrote the Rules of Business and Transformed Our Culture. New York: Portfolio, 2005.

BBC News. “‘God of the Internet’ Is Dead.” BBC News, October 19, 1998. http://news.bbc.co.uk/2/hi/science/nature/196487.stm

Benkler, Yochai. “Sharing Nicely: On Shareable Goods and the Emergence of Sharing as a Modality of Economic Production.” Yale Law Journal 114 (2) (November 2004): 273–358.

Benkler, Yochai. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven: Yale University Press, 2006.

Borges, Jorge Luis. Ficciones. New York: Grove Press, 1962.

Bowker, Geoffrey C., and Susan Leigh Star. Sorting Things Out: Classification and Its Consequences. Cambridge, Mass.: MIT Press, 1999.

Boyle, Alan. “Spam Hits the House of Representatives.” ZDNet, October 5, 1999. http://www.zdnet.com/news/spam-hits-the-house-of-representatives/103422.

Brand, Stewart. The Media Lab: Inventing the Future at MIT. New York: Penguin, 1988.

Bridle, James. “The New Aesthetic.” RIG London (blog), May 6, 2011. http://www.riglondon.com/blog/2011/05/06/the-new-aesthetic/.

Brin, Sergey, and Lawrence Page. “The Anatomy of a Large-Scale Hypertextual Web Search Engine.” Computer Networks & ISDN Systems 30 (1–7) (April 1, 1998): 107–117.

Brunker, Mike. “In the Trenches of the ‘Spam Wars.’” MSNBC.com, August 7, 2003. http://www.msnbc.msn.com/id/3078650/ns/technology_and_science-security/t/trenches-spam-wars/.

Brunner, John. The Shockwave Rider. New York: Ballantine, 1976.

Burk, Dan. “The Trouble with Trespass.” Journal of Small and Emerging Business Law 4 (2000): 27–56.

Burrell, Jenna. “Problematic Empowerment: West African Internet Scams as Strategic Misrepresentation.” Information Technology and International Development 4 (4) (Fall/Winter 2008): 15–30.

Bygrave, Lee A., and Jon Bing. Internet Governance: Infrastructure and Institutions. Oxford: Oxford University Press, 2009.

Call, K. T., et al. “Bias in Telephone Surveys that Do Not Sample Cell Phones: Uses and Limits of Poststratification Adjustments.” Medical Care 49 (4) (April 2011): 355–364.

Canter, Laurence. Interview by Sharael Feist, “The Father of Modern Spam Speaks.” CNET News, March 26, 2002. http://news.cnet.com/2008-1082-868483.html.

Canter, Laurence, and Martha Siegel. How to Make a Fortune on the Information Superhighway: Everyone’s Guerrilla Guide to Marketing on the Internet and Other On-Line Services. New York: HarperCollins, 1994.

Cantillo, Brandon A. “Re: Green Card Lottery- Final One?” In alt.internet.services, alt.tasteless, alt.cyberpunk, alt.culture.internet, news.admin.policy, April 13, 1994.

Cardwell, Mike. “SpamAssassin 2010 Bug.” Grepular (blog), January 1, 2010. https://grepular.com/SpamAssassin_2010_Bug.

Carlson, Nicholas. “LEAKED: AOL’s Master Plan.” Business Insider, February 1, 2011. http://www.businessinsider.com/the-aol-way?op=1.

Carr, J. Frank. “The ‘Quick Excerpt’ Splog and Why You Shouldn’t Worry.” OpTempo, November 12, 2007. http://optempo.com/2007/11/12/the-quick-excerpt-splog-and-why-you-shouldnt-worry/.

Carter, Rick. “From Drawings to Sets.” AI: Artificial Intelligence DVD Disc 2. Dreamworks Video, 2002.

Casey, Timothy D. ISP Liability Survival Guide: Strategies for Managing Copyright, Spam, Cache, and Privacy Regulations. New York: Wiley, 2000.

Cavanagh, Allison. Sociology in the Age of the Internet. Berkshire: Open University, 2007.

Ceruzzi, Paul E. A History of Modern Computing. Cambridge, Mass.: MIT Press, 2003.

Chansler, Bob. “Re: Close, but No Cigar.” As quoted in Brian Reid, “MSGGROUP# 506 Message headers: a note from the grass roots.” April 18, 1977. http://www.std.com/obi/Networking/archives/msggroup/.

Chapman, George. The Works of George Chapman: Poems and Minor Translations. London: Chatto and Windus, 1875.

Chesterton, G. K. The Man Who Was Thursday: A Nightmare. London: Penguin, 1986.

Chitika Insights. “The Value of Google Result Positioning” (news release). May 2010. http://insights.chitika.com/2010/the-value-of-google-result-positioning/.

Claburn, Thomas. “Internet Poker Sites Seized For Fraud.” InformationWeek Government (blog), April 11, 2011. http://www.informationweek.com/news/government/policy/229401726.

Coate, John. “Cyberspace Innkeeping: Building Online Community,” 1998. http://cervisa.com/innkeeping.html.

Cohen, Norm. “He Wrote 200,000 Books (but Computers Did Some of the Work).” New York Times, April 14, 2008.

Coleman, Gabriella. “Old and New Net Wars over Free Speech, Freedom and Secrecy; or How to Understand the Hacker and Lulz Battle against the Church of Scientology” (lecture, Institute for Public Knowledge, New York University), March 31, 2009.

CompuServe v. Cyber Promotions, Inc., 962 F. Supp. 1015 (S.D. Ohio 1997).

comScore. “comScore Releases January 2011 U.S. Search Engine Rankings” (news release). February 11, 2011. http://www.comscore.com/Press_Events/Press_Releases/2011/2/comScore_Releases_January_2011_U.S._Search_Engine _Rankings.

Cormack, Gordon, and Thomas Lynam. “Spam Corpus Creation for TREC.” Proceedings of the Second Conference on Email and Anti-Spam (CEAS) (2005).

Cormack, Gordon, and Thomas Lynam. “TREC 2005 Spam Track Overview.” Proceedings of the Fourteenth Text REtrieval Conference (TREC) (2005). http://trec.nist.gov/pubs/trec14/papers/SPAM.OVERVIEW.pdf.

Crispin, Mark. “MSGGROUP# 696 in Reply to Jake’s Message about Advertising.” May 7, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Crocker, Dave. “MSGGROUP# 004 Use of a Teleconferencing System, in Place of Net Mail.” June 8, 1975. http://www.std.com/obi/Networking/archives/msggroup/.

Crocker, Stephen D. “How the Internet Got Its Rules.” New York Times, April 6, 2009.

Crocker, Stephen D. RFC 3: “Documentation Conventions.” April 1969. http://tools.ietf.org/html/rfc3.

Cukier, Wendy L., et al. “Genres of Spam: Expectations and Deceptions.” HICSS ’06: Proceedings of the 39th Annual Hawaii International Conference on System Sciences (2006).

Customer Service at Portal Communications. “A Note from Portal Regarding the ‘JJ’ Incident.” In news.admin, misc.misc, June 1, 1988.

Customer Service at Portal Communications. “JJ’s Posting.” In news.admin, news.sysadmin, May 27, 1988.

Da Chronic. “AOHell v3.0 Rage Against The Machine.” n.d. http://www.aolwatch.org/chronic2.htm.

Dagon, David, Cliff Zou, and Wenke Lee. “Modeling Botnet Propagation Using Time Zones.” Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS ’06) (2006).

DataPresser. “Pricing & Signup.” January 2, 2010. http://web.archive.org/web/20100102111619/https://datapresser.com/signup_options.

Davis, Joshua. “Hackers Take Down the Most Wired Country in Europe.” Wired 15.09, August 2007. http://www.wired.com/politics/security/magazine/15-09/ff_estonia?currentPage=all.

Davis, Natalie Zemon. The Return of Martin Guerre. Boston: Harvard University Press, 1983.

Den Beste, Steve. “Trivia on the Net.” In net.misc, March 15, 1982.

Department of Defense. “DoD Internet Host Table,” v. 712, PDP-10 Software Archive, February 4, 1988. http://pdp-10.trailing-edge.com/bb-ev83b-bm/01/new-system/hosts.txt.

Deutsch, Debbie. “MSGGROUP# 684 Re: The Quasar Discussion.” May 2, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Dewey, John. The Public and Its Problems. New York: Swallow, 1954.

Dibbell, Julian. “A Rape in Cyberspace: How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database Into a Society.” The Village Voice, December 23, 1993.

Dibbell, Julian. My Tiny Life: Crime and Passion in a Virtual World. New York: Henry Holt, 1998.

Dixon, Robyn. “‘I Will Eat Your Dollars.’” Los Angeles Times, October 20, 2005.

Dyson, Freeman. “How We Know.” New York Review of Books 58 (4) (March 10, 2011). http://www.nybooks.com/articles/archives/2011/mar/10/how-we-know/?pagination=false.

Edwards, Brent Eric. “Re: ABUSE: CHAG.” In news.admin.net-abuse.email, news.admin.net-abuse.misc, July 15, 1996.

Edwards, Paul. A Vast Machine: Computer Models, Climate Data, and the Politics of Global Warming. Cambridge, Mass.: MIT Press, 2010.

Edwards, Paul. The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, Mass.: MIT Press, 1996.

Elmer, Greg. “Robots.txt: The Politics of Search Engine Exclusion.” In The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture, ed. Jussi Parikka and Tony D. Sampson, 217–227. Cresskill, N.J.: Hampton Press, 2008.

Enright, Brandon, et al. “Storm: When Researchers Collide.” USENIX ;login: 33 (4) (August 2008). https://www.usenix.org/publications/login/august-2008-volume-33-number-4/storm-when-researchers-collide.

Evans, Brynn. “Ethically Improper Use of Mechanical Turk?” Flickr, August 28, 2008. http://www.flickr.com/photos/bmevans/2806469717/.

Federal Energy Regulatory Commission. “Western Energy Markets: Major Issuance on March 26, 2003—Information Released in Investigation.” October 10, 2003. http://web.archive.org/web/20031011133628/http://ferc.gov/industries/electric/indus-act/wem/03-26-03-release.asp.

Feenberg, Andrew. Alternative Modernity: The Technical Turn in Philosophy and Social Theory. Berkeley: University of California Press, 1995.

Fetterly, Dennis, et al. “Spam, Damn Spam, and Statistics: Using Statistical Analysis to Locate Spam Web Pages.” Proceedings of the 7th International Workshop on the Web and Databases 67 (2004): 1–6.

Finjan Software. “Finjan Discovers Compromised Business and Customer Data of 40 Top-tier Global Businesses” (news release). May 6, 2008. http://www.finjan.com/Pressrelease.aspx?id=1944&PressLan=1819&lan=3.

Fishkin, Rand. “Linkbaiting for Fun and Profit.” Search Engine Journal, November 18, 2005. http://www.searchenginejournal.com/linkbaiting-for-fun-profit/2541/.

Fitzgerald, Dan. “AOL Gives Up Treasure Hunt.” Boston Herald, July 24, 2007. http://bostonherald.com/business/general/view/AOL_gives_up_treasure_hunt.

Forbes, Amy Wiese. The Satiric Decade: Satire and the Rise of Republicanism in France, 1830–1840. Lanham, Md.: Lexington Books, 2010.

Flynn, Laurie. “‘Spamming’ on the Internet.” New York Times, October 16, 1994.

Franklin, Jason, et al. “An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.” Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2007).

Fraser, Matthew. “Viral Vigilantes: The Unblinking Panopticon and the Wheelie-Bin Cat Lady.” 2011. http://www.digitallymediatedsurveillance.ca/wp-content/uploads/2011/04/Fraser-Viral-vigilantes.pdf.

French, Peter A. The Virtues of Vengeance. 2001. Lawrence, Kans.: University Press of Kansas.

Friedman, Richard. “Re: Green Card Lottery- Final One?” In alt.internet.services, alt.tasteless, alt.cyberpunk, alt.culture.internet, news.admin.policy, April 13, 1994.

FTC. “FTC Launches Crackdown on Deceptive Junk E-mail” (news release). February 12, 2002. http://www.ftc.gov/opa/2002/02/eileenspam1.shtm.

Fuller, Matthew, and Andrew Goffey. “Toward an Evil Media Studies.” In The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture, ed. Jussi Parikka and Tony D. Sampson, 141–159. Cresskill, N.J.: Hampton Press, 2008.

Furr, Joel. “Re: ARMM: ARMM: >>>>Ad Infinitum.” In alt.fan.dick-depew, news.admin.policy, alt.folklore.computers, March 31, 1993.

Gady, Franz-Stefan. “Africa’s Cyber WMD.” Foreign Policy, March 2010. http://www.foreignpolicy.com/articles/2010/03/24/africas_cyber_wmd.

Galloway, Alexander R. “Position Paper.” In Exploring New Configurations of Network Politics, ed. Jussi Parikka and Joss Hands. Cambridge, Mass.: ARCDigital, 2010. http://www.networkpolitics.org/request-for-comments/alexander-r-galloways-position-paper.

Galloway, Alexander R., and Eugene Thacker. “On Narcolepsy.” In The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture, ed. Jussi Parikka and Tony D. Sampson, 251–263. Cresskill, N.J.: Hampton Press, 2008.

Galloway, Alexander R., and Eugene Thacker. The Exploit: A Theory of Networks. Minneapolis: University of Minnesota Press, 2007.

Gansing, Kristoffer. “The Production of Waste: Functional Trash and the Politics of Spamculture” (unpublished).

Garfield, Eugene. “Citation Indexes for Science: A New Dimension in Documentation through Association of Ideas.” Science 122 (1955): 108–111.

Genova, Judith. “Turing’s Sexual Guessing Game.” Social Epistemology 8 (4) (1994): 313–326.

Gibson, William. Neuromancer. New York: Penguin, 2000.

Gibson, William. Zero History. New York: Putnam’s, 2010.

Gillett, Walter. “bozo lawyers.” In comp.lang.c++, comp.client-server, alt.sys.pc-clone.gateway2000, April 12, 1994.

Gilman, Nils, Steven Weber, and Jesse Goldhammer, eds. Deviant Globalization: Black Market Economy in the 21st Century. London: Continuum, 2011.

Gitelman, Lisa. Always Already New: Media, History, and the Data of Culture. Cambridge, Mass.: MIT Press, 2006.

Glenny, Misha. McMafia: A Journey through the Global Criminal Underworld. New York: Knopf, 2008.

Goodfellow, Geoffrey S. “MSGGROUP# 699 [THUERK at DEC-MARLBORO: ADRIAN@SRI-KL].” May 10, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Google Inc. Securities Exchange Commission Form 10-Q. September 30, 2009. http://investor.google.com/documents/20090930_google_10Q.html.

Graham, Paul. “A Plan for Spam.” paulgraham.com, August 2002. http://www .paulgraham.com/spam.html.

Graham, Paul. “Better Bayesian Filtering.” paulgraham.com, January 2003. http://www.paulgraham.com/better.html.

Graham, Paul. “Plan for Spam FAQ.” paulgraham.com, n.d. http://www .paulgraham.com/spamfaq.html.

Graham, Paul. “So Far, So Good.” paulgraham.com, August 2003. http:// paulgraham.com/sofar.html.

Graham, Paul. “Spam Is Different.” paulgraham.com, August 2002. http://www .paulgraham.com/spamdiff.html.

Graham, Paul. “Will Filters Kill Spam?” paulgraham.com, December 2002. http://www.paulgraham.com/wfks.html.

Greenberg, Andy. “Reformed Hacker Looks Back.” Forbes.com, August 21, 2008. http://www.forbes.com/2008/08/21/mitnick-hackers-security-tech-security-cx_ag_0821mitnick.html.

Greene, Tim. “Storm Worm Strikes Back at Security Pros.” Network World, October 24, 2007. http://www.networkworld.com/news/2007/102407-storm-worm-security.html.

Grossman, Wendy. Net.Wars. New York: New York University Press, 1997.

Grow, Brian, and Jason Bush. “Hacker Hunters: An Elite Force Takes on the Dark Side of Computing.” Business Week, May 30, 2005.

Hafner, Katie. The Well: A Story of Love, Death and Real Life in the Seminal Online Community. New York: Carroll & Graf, 2001.

Hafner, Katie, and Matthew Lyon. Where Wizards Stay Up Late: The Origins of the Internet. New York: Touchstone, 1998.

Hansell, Saul. “Spam Sender Settles Case in New York.” New York Times, July 2004: 20.

Hansen, Robert. “Conversations with a Blackhat.” ha.ckers.org (blog), March 14, 2010. http://ha.ckers.org/blog/20100314/conversations-with-a-blackhat/.

Hardy, Thomas. The Mayor of Casterbridge. London: Ballantyne, 1887.

Harris, Oliver. William Burroughs and the Secret of Fascination. Carbondale: Southern Illinois University Press, 2003.

Hartcup, Guy. Camouflage: A History of Concealment and Deception in War. Barnsely, UK: Pen & Sword Books, 2008.

Hauben, Michael, and Ronda Hauben. “On the Early Days of Usenet: The Roots of the Cooperative Online Culture.” First Monday 3 (8) (August 3, 1998): http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/613/534.

Hauben, Ronda. “The Evolution of Usenet News: The Poor Man’s Arpanet” (lecture, Michigan Association of Computer Users in Learning), March 12, 1993. http://gos.sbc.edu/h/hauben.html.

Haugh, John F. II. “Re: HELP ME!!!” In news.admin, June 10, 1988.

Hawkesworth, James. An Account of the Voyages Undertaken by the Order of His Present Majesty, for Making Discoveries in the Southern Hemisphere, and Successively Performed by Commodore Byron, Captain Wallis, Captain Carteret, and Captain Cook, In the Dolphin, the Swallow, and the Endeavour: Drawn up from the Journals which were kept by the several Commanders, and from the Papers of Joseph Banks, Esq., vol. 1. Dublin: James Williams, 1775.

Hayes, Dave. “An Alternative Primer on Net Abuse, Free Speech, and Usenet.” 1996. http://www.jetcafe.org/dave/usenet/freedom.html.

Hayes, Dave. “The USENET Site of Virtue FAQ.” Rev. 1.7, December 6, 1997. http://www.jetcafe.org/dave/usenet/virtue.html.

Hayles, N. Katherine. “Hyper and Deep Attention: The Generational Divide in Cognitive Modes.” Profession (2007): 187–199.

Henderson, Austin. “MSGGROUP# 522 Re: CONTENTS OF SUBJECT FIELDS.” April 25, 1977. http://www.std.com/obi/Networking/archives/msggroup/.

Hess, Elizabeth. Yib’s Guide to MOOing: Getting the Most from Virtual Communities on the Internet. Victoria, BC, Canada: Trafford, 2003.

Hilderbrand, Lucas. Inherent Vice: Bootleg Histories of Videotape and Copyright. Durham, N.C.: Duke University Press, 2009.

Hofstadter, Douglas. Gödel, Escher, Bach: An Eternal Golden Braid. New York: Basic Books, 1999.

Hofstadter, Douglas. Metamagical Themas: Questing for the Essence of Mind and Pattern. New York: Basic Books, 1985.

Hofstadter, Douglas. “The Turing Test: A Coffeehouse Conversation.” In The Mind’s I, ed. Douglas Hofstadter and Daniel Dennett, 69–95. New York: Basic Books, 1981.

Hollis, Ken, et al. “alt.spam FAQ or ‘Figuring out fake E-Mail & Posts.’” Rev. 20050130, January 30, 2005. http://digital.net/~gandalf/spamfaq.html.

Holt, Thomas J. “Examining Costs, Benefits, and Economics in Malware and Carding Markets” (lecture, Hackers on Planet Earth Conference, New York City), July 16, 2010.

Holt, Thomas J., and Eric Lampke. “Exploring Stolen Data Markets On-Line: Products and Market Forces.” Criminal Justice Studies 23 (1) (2010): 33–50.

Ianelli, Nicholas, and Aaron Hackworth. “Botnets as a Vehicle for Online Crime.” International Journal of Forensic Computer Science 2 (1) (2007): 19–39.

Jerz, Dennis G. “Somewhere Nearby Is Colossal Cave: Examining Will Crowther’s Original ‘Adventure’ in Code and in Kentucky.” Digital Humanities Quarterly 1 (2) (Summer 2007). http://www.digitalhumanities.org/dhq/vol/001/2/000009/000009.html.

Johnson, David R. “Due Process and Cyberjurisdiction.” In Crypto-Anarchy, Cyberstates, and Pirate Utopias, ed. Peter Ludlow. Cambridge, Mass.: MIT Press, 2001.

Johnston, Jessica. Technological Turf Wars: A Case Study of the Computer Antivirus Industry. Philadelphia: Temple University Press, 2009.

Jones, Matt. “The Robot-Readable World.” BERG London (blog), August 3, 2011. http://berglondon.com/blog/2011/08/03/the-robot-readable-world/.

Jones, Matt. “Sensor-Vernacular.” BERG London (blog), May 13, 2011. http://berglondon.com/blog/2011/05/13/sensor-vernacular/.

Joselit, David. Feedback: Television against Democracy. Cambridge, Mass.: MIT Press, 2007.

Joy, Bill. Interview by Eugene Eric Kim, “The Joy of Unix.” Linux Magazine, November 15, 1999. http://www.linux-mag.com/id/349/.

“The Junk Man.” “MNS: Bury the Hatchet.” BlackHatWorld, February 14, 2010. http://www.blackhatworld.com/blackhat-seo/adsense/171744-mns-bury-hatchet.html.

Kafka, Franz. The Metamorphosis and Other Stories. New York: Penguin, 2000.

Kanaley, Reid. “Sanford Wallace, the Spam King, Abdicates and Apologizes Online.” Philadelphia Inquirer, April 15, 1998.

Kaplan, David E. “A Land Where Con Is King.” U.S. News & World Report (April 2001): 29.

Kelly, Kevin. “Networked Books and Networked Reading” (lecture, Books in Browsers, The Internet Archive, San Francisco), October 27, 2011. http://www.youtube.com/watch?v=HdtXo9z7uaI.

Kelly, Kevin. “Spammer AI.” The Technium (blog), May 6, 2008. http://www.kk.org/thetechnium/archives/2008/05/spammer_ai.php.

Kelty, Christopher. Two Bits: The Cultural Significance of Free Software. Durham, N.C.: Duke University Press, 2008.

Kendall, Lori. “Community and the Internet.” In The Handbook of Internet Studies, ed. Robert Burnett, Mia Consalvo, and Charles Ess, 309–325. Singapore: Wiley, 2010.

Kharif, Olga. “‘Likejacking’: Spammers Hit Social Media.” Bloomberg Businessweek, May 24, 2012. http://www.businessweek.com/articles/2012-05-24/likejacking-spammers-hit-social-media.

Kilna, Anthony. “Re: Green Card Lottery- Final One?” In alt.internet.services, alt.tasteless, alt.cyberpunk, alt.culture.internet, news.admin.policy, April 13, 1994.

King, David. The Commissar Vanishes: The Falsification of Photographs and Art in Stalin’s Russia. New York: Metropolitan Books, 1997.

Kinsmen, Gary. “‘Character Weakness’ and ‘Fruit Machines’: Towards an Analysis of the Anti-Homosexual Security Campaign in the Canadian Civil Service.” Labour/Le Travail 35 (Spring 1995): 133–161.

Kleinpaste, Karl. “Re: C&S Have Declared War on the Net. How to Defend the Net?” In news.admin.misc, news.admin.policy, May 11, 1994.

Kleinrock, Leonard. Interview by Charles Petrie, “Len Kleinrock on the Origins of the Internet: ‘This is login.’” Computing Now, n.d. http://www.computer.org/portal/web/computingnow/internet40/login.

Klimt, Bryan, and Yiming Yang. “The Enron Corpus: A New Dataset for Email Classification Research.” Proceedings of the European Conference on Machine Learning (2004).

Kostakis, Vasilis. “Identifying and Understanding the Problems of Wikipedia’s Peer Governance: The Case of Inclusionists versus Deletionists.” First Monday 15 (3) (March 1, 2010): http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/viewArticle/2613/2479.

Krebs, Brian. “Amazon: Hey Spammers, Get Off My Cloud!” Washington Post, July 1, 2008.

Krebs, Brian. “Virtual Sweatshops Defeat Bot-or-Not Tests.” Krebs on Security (blog), January 9, 2012. http://krebsonsecurity.com/2012/01/virtual-sweatshops-defeat-bot-or-not-tests/.

Kreibich, Christian, et al. “On the Spam Campaign Trail.” Proceedings of the 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats (2008).

Kremen, Rachel. “‘Emergent’ Images to Outwit Spambots.” Technology Review (January 2010): 6.

Kropotkin, Peter. Anarchism: A Collection of Revolutionary Writings. Mineola, N.Y.: Dover, 2002.

Kumar, Ravi et al. “Trawling the Web for Emerging Cyber-Communities.” Computer Networks: The International Journal of Computer and Telecommunications Networking 31 (11–16) (1999): 1481–1493.

Kwinter, Sanford. “New Babylons: Urbanism at the End of the Millennium.” Assemblage, no. 25 (1995): 80–81.

Lane, Frederick S., III. Obscene Profits: The Entrepreneurs of Pornography in the Cyber Age. New York: Routledge, 2000.

Lanham, Richard A. The Economics of Attention: Style and Substance in the Age of Information. Chicago: University of Chicago Press, 2006.

Larson, William L. “Re: Green Card Lottery—Final One?” In news.admin.policy, April 12, 1994.

Latour, Bruno. Aramis, or the Love of Technology. Cambridge, Mass.: Harvard, 1996.

Latour, Bruno. “Can We Get Our Materialism Back, Please?” Isis 98 (2007): 138–142.

Latour, Bruno. Reassembling the Social: An Introduction to Actor-Network-Theory. Oxford: Oxford University Press, 2005.

Leader, Jeffery J. “Re: I’M OUT!” In news.admin.net-abuse.email, April 11, 1998.

Leonard, Andrew. Bots: The Origin of a New Species. New York: Penguin, 1997.

Lessig, Lawrence. Code and Other Laws of Cyberspace: Version 2.0. New York: Basic, 2006.

Levchenko, Kirill, et al. “Click Trajectories: End-to-End Analysis of the Spam Value Chain.” Proceedings of the IEEE Symposium and Security and Privacy (May 2011), 431–446.

Levy, Steven. Hackers: Heroes of the Computer Revolution. Sebastopol, Calif.: O’Reilly Media, 2010.

Lewis, Peter H. “Protest Halts E-Mail ‘Spam’—Aurora Nissan Gives Up Its Brief Attempt to Solicit New Customers by Sending E-Mail,” Seattle Times, May 8, 1998.

Lewis, Peter H. “Sneering at a Virtual Lynch Mob.” New York Times, May 11, 1994.

Leyden, John. “Spam DDoS Assault Cuts Off South Pacific State.” The Register, June 25, 2008. http://www.theregister.co.uk/2008/06/25/email_ddos/.

Le Corbusier. Aircraft. New York: Universe Books, 1988.

Lialina, Olia. “A Vernacular Web 2.” In Digital Folklore Reader, ed. Olia Lialina and Dragan Espenschied, 58–69. Stuttgart: Merz Akademie, 2009.

Licklider, J. C. R., and Robert Taylor. “The Computer as a Communication Device.” Science and Technology 76 (April 1968). Reprinted in In Memoriam: J.C.R. Licklider 1915–1990. Palo Alto: Digital Systems Research Corporation, 1990.

Lindqvist, Sven. A History of Bombing. New York: The New Press, 2003.

Lions, John. Commentary on UNIX 6th Edition, with Source Code. San Diego: Annabooks, 1977.

Litman, Jessica. “Stealing and Sharing.” Hastings Communication and Entertainment Law Journal 27 (1) (2004): 1–50.

Littman, Jonathan. The Fugitive Game: Online with Kevin Mitnick. New York: Little, Brown and Company, 1996.

Liu, Alan. Interview by Geert Lovink. “net critique,” Institute of Network Cultures, February 28, 2006. http://networkcultures.org/wpmu/geert/interview-with-alan-liu.

Liu, Dongxiao. “Human Flesh Search Engine: Is It a Next Generation Search Engine?” 3rd Communication Policy Research, South Conference, Beijing (2008).

Lloyd, Don. “Re: Green Card Lottery—Final One?” In alt.cyberpunk, April 14, 1994.

Lovink, Geert. “The Principle of Notworking (Concepts in Critical Internet Culture)” (lecture, Hogeschool van Amsterdam), February 24, 2005.

Ludovico, Alessandro. “Spam, the Economy of Desire.” Neural.it, December 1, 2005. http://www.neural.it/art/2005/12/spam_the_economy_of_desire.phtml.

Maltz, Tamir. “Customary Law and Power in Internet Communities.” Journal of Computer-Mediated Communication 2 (1) (1996). http://jcmc.indiana.edu/vol2/issue1/custom.html.

“Man in the Wilderness.” In beyond-enemy-lines archive. May 24, 2000.

Markoff, John. What the Dormouse Said: How the Sixties Counterculture Shaped the Personal Computer Industry. New York: Viking Penguin, 2005.

Martin, Will. “MSGGROUP# 546 ABSENTEE ADDRESSEES.” May 11, 1977. http://www.std.com/obi/Networking/archives/msggroup/.

Marwick, Alice. “Status Update: Celebrity, Publicity and Self-Branding in Web 2.0” (PhD dissertation, New York University), 2010.

McCarthy, John. “MSGGROUP# 692 Reaction.” May 4, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

McColo Hosting Solutions. “About Company.” February 9, 2008. http://web.archive.org/web/20080209180850/mccolo.com/about/.

McDermott, J. “US Postal Service Is Cracking Down on Nigerian Scams.” Wall Street Journal, November 11, 1998.

McNeil, Joanne. “The New Aesthetic: Seeing like Digital Devices at SXSW 2012.” Joannemcneil.com, March 14, 2012. http://joannemcneil.com/index.php?/talks-and-such/new-aesthetic-at-sxsw-2012/.

McWilliams, Brian. Spam Kings: The Real Story Behind the High-Rolling Hucksters Pushing Porn, Pills, and %*@)# Enlargements. Sebastopol, CA: O’Reilly Media, 2005.

Messaging Anti-Abuse Working Group. “Email Metrics Program: The Network Operators’ Perspective. Report #15—First, Second and Third Quarter 2011.” November 2011. http://www.maawg.org/sites/maawg/files/news/MAAWG_2011_Q1Q2Q3_Metrics_Report_15.pdf.

Metsis, Vangelis, et al. “Spam Filtering with Naive Bayes—Which Naive Bayes?” Proceedings of Third Conference on E-mail and Anti-Spam (CEAS) (2006).

“mk590.” “AOL for Free?” In alt.2600, January 28, 1996.

Molloy, Judy. “Public Literature: Narratives and Narrative Structures in Lambda MOO.” In Art and Innovation: The Xerox PARC Artist-in-Residence Program, ed. Craig Harris, 102–117. Cambridge, Mass.: MIT Press, 1999.

Moore, Sally Falk. “Epilogue: Uncertainties in Situations, Indeterminacies in Culture.” In Symbol and Politics in Communal Ideology, ed. Sally Falk Moore and Barbara G. Myerhoff, 234–235. Ithaca: Cornell University Press, 1975.

Moran, John M. “The Day the Net Changed Forever.” Hartford Courant, June 30, 2002.

Morris, Errol. “Did My Brother Invent E-Mail with Tom Van Vleck?” Parts 1–5, New York Times, June 19, 2011. http://opinionator.blogs.nytimes.com/tag/tom-van-vleck/.

Moser, Bob. “Davis Wolfgang Hawke Promotes Neo-Nazi Agenda Online, Calls Himself Future American Hitler.” Southern Poverty Law Center Intelligence Report 111 (Fall 2003). http://www.splcenter.org/get-informed/intelligence-report/browse-all-issues/2003/fall/return-of-the-kosher-nazi.

Motoyama, Marti, et al. “Re:CAPTCHAs—Understanding CAPTCHA-Solving Services in an Economic Context.” Proceedings of the USENIX Security Symposium (August 2010), 435–452.

Mueller, Milton L. Ruling the Root: Internet Governance and the Taming of Cyberspace. Cambridge, Mass.: MIT Press, 2002.

Naughton, John J. A Brief History of the Future: From Radio Days to Internet Years in a Lifetime. New York: Overlook, 2000.

Nazario, Jose. “Estonian DDoS Attacks—A Summary to Date.” Arbor Networks, May 17, 2007. http://ddos.arbornetworks.com/2007/05/estonian-ddos-attacks-a-summary-to-date/.

Nelson, Bruce. “MSGGROUP# 569 Does It Know about Mail, Too?” May 26, 1977. http://www.std.com/obi/Networking/archives/msggroup/.

Nelson, Theodor. Dream Machines: New Freedoms Through Computer Screens—A Minority Report. South Bend, Ind.: Self-published, 1974.

Neuwirth, Robert. Stealth of Nations: The Global Rise of the Informal Economy. New York: Pantheon, 2011.

Newman, Barry. “Poor Penmanship Spells Job Security for Post Office’s Scribble Specialists.” Wall Street Journal, November 3, 2011.

Nicholson, Robert. “Re: Green Card Lottery—Final One?” In bit.listserv.vse-l, demon.local, news.admin.policy, April 12, 1994.

Nissenbaum, Helen. “Privacy as Contextual Integrity.” Washington Law Review 79 (1) (February 2004): 119–158.

Noha, Rob “JJ.” “HELP ME!!AA.” In comp.cog-eng, May 23, 1988.

North, Jeanne B. and Jean Iseli. ARPANET News 1 (March 1973). http://archive .org/details/Issue1.

“An Old Swindle Revived.” New York Times, March 20, 1898.

Oman, Nathan B. “Washington Supreme Court Upholds State Anti-Spamming Law.” Harvard Law Review 115 (2002): 931–937.

Optify Research. “The Changing Face of SERPs: Organic Click Through Rate” (report). April 2011. http://www.optify.net/search-marketing/organic-click-through-rate.

Paasonen, Susanna. “Irregular Fantasies, Anomalous Uses: Pornography Spam as Boundary Work.” In The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture, ed. Jussi Parikka and Tony D. Sampson, 165–179. Cresskill, N.J.: Hampton Press, 2008.

Palmer, Bryan D. “Discordant Music: Charivaris and Whitecapping in Nineteenth-Century North America.” Labour/Le Travail 3 (1978): 5–62.

Pansters, Danny. “mydoom.exe decyphering?” Full Disclosure (mailing list), January 31, 2004. http://seclists.org/fulldisclosure/2004/Jan/1339.

Pappalardo, Denise, and Ellen Messmer. “Extortion via DDoS on the Rise.” Network World, May 16, 2005. http://www.networkworld.com/news/2005/051605-ddos-extortion.html.

Parikka, Jussi. Digital Contagions: A Media Archeology of Computer Viruses. New York: Peter Lang, 2007.

Parikka, Jussi, and Tony D. Sampson. “On Anomalous Objects of Digital Culture: An Introduction.” In The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture, ed. Jussi Parikka and Tony D. Sampson, 1–21. Cresskill, N.J.: Hampton Press, 2009.

Parikka, Jussi, and Tony D. Sampson. “Part II: Bad Objects.” In The Spam Book: On Viruses, Porn, and Other Anomalies from the Dark Side of Digital Culture, ed. Jussi Parikka and Tony D. Sampson, 101–103. Cresskill, N.J.: Hampton Press, 2009.

Parker, Graham. Fair Use (Notes from Spam). London: Book Works, 2009.

Parker, Philip M. “Method and Apparatus for Automated Authoring and Marketing.” U.S. Patent 7,266,767, issued September 4, 2007.

Parry, James. “Re: ‘Totally Spam? It’s Lubricated.’” In rec.arts.comics.strips, alt.religion.kibology, September 2, 2003.

Perez, Sarah. “Amazon’s Mechanical Turk Used for Fraudulent Activities.” ReadWriteWeb, August 29, 2008. http://www.readwriteweb.com/archives/amazons_mechanical_turk_used_for_fraud.php.

Peters, Tim. “Re: [Python-checkins] python/nondist/sandbox/spambayes GBayes.py,1.7,1.8.” Python-Dev, August 22, 2002. http://mail.python.org/pipermail/python-dev/2002-August/028216.html.

Pfaffenberger, Bryan. “‘If I Want It, It’s Okay’: Usenet and the (Outer) Limits of Free Speech.” Information Society 12 (4) (1996): 365–386.

Pfaffenberger, Bryan. “Technological Dramas.” Science, Technology and Human Values 17 (3) (1992): 282–312.

Pfanner, Eric, and Heather Timmons. “U.K. Seeks Global Rules for Online Gambling.” New York Times, November 2, 2006.

Phifer, Lisa. “2006 MSSP Survey, Part 6: Managed Anti-Spam and Content Filtering.” ISP-Planet, December 22, 2006. http://isp-ceo.net/technology/mssp/2006/mssp6a.html.

Pickering, Andrew. The Cybernetic Brain: Sketches of Another Future. Chicago: University of Chicago Press, 2010.

Postel, Jon. RFC 706: “On the Junk Mail Problem.” November 1975.

Postel, Jon. “MSGGROUP# 561 Comments on RFC 724.” May 23, 1977. http://www.std.com/obi/Networking/archives/msggroup/.

Prasad, Sumeet. “Microsoft’s CAPTCHA Revolutions Busted by Spammers—Again and Again.” Websense (blog), February 15, 2009. http://securitylabs.websense.com/content/Blogs/3306.aspx.

Preston, Richard. The Wild Trees: A Story of Passion and Daring. New York: Random House, 2007.

Price, Monroe E., and Stefaan G. Verhulst. Self-Regulation and the Internet. The Hague: Kluwer Law, 2005.

Pringle, Glen, et al. “What Is a Tall Poppy among Web Pages?” Computer Networks & ISDN Systems 30 (1–7) (April 1, 1998): 369–377.

Reid, Brian. “MSGGROUP# 614 Fake Robot: A Call for Help.” November 21, 1977. http://www.std.com/obi/Networking/archives/msggroup/.

Rennie, Jason D.M. “Improving Multi-class Text Classification with Naive Bayes” (Master’s thesis, MIT), September 2001.

Rennie, Jason D. M. “ifile: An Application of Machine Learning to E-Mail Filtering.” Proceedings of the KDD-2000 Text Mining Workshop (2000).

Rennie, Jason D. M. “ifile README 0.1a.” August 3, 1996. http://people.csail.mit.edu/jrennie/ifile/old/README-0.1A.

Reuters. “WTO Confirms U.S. Loss in Internet Gambling Case.” Reuters, March 30, 2007. http://uk.reuters.com/article/2007/03/30/oukin-uk-trade-gambling-wto-idUKL3047306520070330.

Rheingold, Howard. “The Tragedy of the Electronic Commons.” Tomorrow, December 19, 1994. http://www.well.com/~hlr/tomorrow/index.html.

Rheingold, Howard. The Virtual Community: Homesteading on the Electronic Frontier. New York: Harper Collins, 1994.

Rheingold, Howard. “What the WELL's Rise and Fall Tell Us about Online Community.” The Atlantic, July 6, 2012. http://www.theatlantic.com/technology/archive/12/07/what-the-wells-rise-and-fall-tell-us-about-online-community/259504/.

Ritchie, Dennis M. “The Evolution of the Unix Time-Sharing System.” AT&T Bell Laboratories Technical Journal 63 (6, Part 2) (October 1984): 1577–1593.

Rosenbaum, H. Jon, and Peter C. Sederberg, eds. Vigilante Politics. Philadelphia: University of Pennsylvania Press, 1976.

Roth, Daniel. “The Answer Factory: Demand Media and the Fast, Disposable, and Profitable as Hell Media Model.” Wired 17 (11) (November 2009). http://www.wired.com/magazine/2009/10/ff_demandmedia/.

Rowe, Brent, Dallas Wood, and Douglas Reeves. “How the Public Views Strategies Designed to Reduce the Threat of Botnets.” In Trust and Trustworthy Computing, ed. Alessandro Acquisti, Sean W. Smith, and Ahmad-Reza Sadeghi, 337–351. Berlin: Springer, 2010.

Ryan, Johnny. A History of the Internet and the Digital Future. London: Reaktion, 2010.

Sahami, Mehran, et al. “A Bayesian Approach to Filtering Junk Email.” Proceedings of the AAAI Workshop on Learning for Text Categorization, AAAI Technical Report WS-98-05 (1998).

Schwartz, John. “Preparing for a Digital Pearl Harbor.” New York Times, June 24, 2007.

Scoblionkov, Deborah. “Senate Embraces Spam Bill.” Wired News, June 18, 1998. http://www.wired.com/politics/law/news/1998/06/13080.

Scott, James C. Seeing Like a State: How Certain Schemes to Improve the Human Condition Have Failed. New Haven: Yale University Press, 1998.

Scott, Jason. “Episode 4: ‘Fidonet.’” In BBS: The Documentary, 2005. http://archive.org/details/BBS.The.Documentary.

Scurr, Erica. “Re: Green Card Lottery- Final One?” In rec.aviation.ifr, trumpet.announce, April 13, 1994.

EC Administrative Proceeding File No. 3-10843. “Cease-and-Desist Proceedings Instituted against Rodona Garst.” July 24, 2002. http://www.sec.gov/litigation/admin/33-8113.htm.

SecureList. “Email-Worm.Win32.Mydoom.a.” January 27, 2004. http://www.securelist.com/en/descriptions/old22686.

Shaviro, Steven. Doom Patrols: A Theoretical Fiction about Postmodernism. London: Serpent’s Tail, 1997.

Shoch, John, and Jon Hupp. “The ‘Worm’ Programs—Early Experience with a Distributed Computation.” Communications of the ACM 25 (3) (March 1982): 172–180.

Shubik, Martin. “The Dollar Auction Game: A Paradox in Noncooperative Behavior and Escalation.” Journal of Conflict Resolution 15 (1) (1971): 109–111.

Sibona, Christopher, and Steven Walczak. “Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis.” 44th Hawaii International Conference on System Sciences, Internet and the Digital Economy Track: Social Networking and Communities (2011), 1–10.

Simon, Herbert A. “Designing Organizations for an Information-Rich World.” In Computers, Communication, and the Public Interest, ed. Martin Greenberger, 37–72. Baltimore: The Johns Hopkins UniversityPress, 1971.

“sine nomine.” “proposed press release, 2nd draft.” In news.admin.misc, June 6, 1994.

Singel, Ryan. “Curtain Call for Junk-Fax Blaster.” Wired News, October 9, 2004. http://www.wired.com/techbiz/media/news/2004/10/65291.

Skirvin, Tim. “What Is the Format of a Cancel Message.” In “Cancel Messages” FAQ, sec. II.C, ver. 1.75. http://wiki.killfile.org/projects/usenet/faqs/cancel/.

Smith, Daniel Jordan. A Culture of Corruption: Everyday Deception and Popular Discontent in Nigeria. Princeton: Princeton University Press, 2007.

Smith, David. “WikiLeaks Cables: Shell’s Grip on Nigerian State Revealed.” The Guardian, December 8, 2010.

Sophos Ltd. “Pitcairn Islands Relays Most Spam per Person, Reveals Sophos” (news release). March 10, 2008. http://www.sophos.com/en-us/press-office/press-releases/2008/03/pitcairn.aspx.

Sophos Threat Analyses. “W32/MyDoom-B.” January 30, 2004. http://www .sophos.com/en-us/threat-center/threat-analyses/viruses-and-spyware/W32~MyDoom-B/detailed-analysis.aspx.

Spatt, Hartley S. “Postel, Jon.” In The Scribner Encyclopedia of American Lives, Vol. 5: Notable Americans Who Died between 1997 and 1999, ed. Kenneth T. Jackson, Karen Markoe, and Arnie Markoe. New York: Scribner’s, 2002.

Stallman, Richard. “MSGGROUP# 697 Some Thoughts about Advertising.” May 8, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Stallman, Richard. “MSGGROUP# 698 DEC Message [VERY TASTY!].” May 9, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Stallman, Richard. “Why Schools Should Exclusively Use Free Software.” GNU Project, June 10, 2012. http://www.gnu.org/education/edu-schools.html.

Stefferud, Einar, and Dave Farber. “MSGGROUP# 675 The Quasar Discussion.” May 1, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Stephenson, Neal. Anathem. New York: HarperCollins, 2008.

Stephenson, Neal. “Cryptonomicon Spam.” n.d. http://corporation9592.com/Cryptonomicon_spam.html.

Stephenson, Neal. “Mother Earth Mother Board.” Wired 4 (12) (December 1996): 95–161.

Stiegler, Bernard. Taking Care of Youth and the Generations. Stanford: Stanford University Press, 2010.

Stivale, Charles J. “Spam: Heteroglossia and Harassment in Cyberspace.” In Internet Culture, ed. David Porter, 133–144. London: Routledge, 1997.

Stross, Charles. “It’s Made Out of Meat.” Charlie’s Diary (blog), December 12, 2010. http://www.antipope.org/charlie/blog-static/2010/12/its-made-out-of-meat.html.

Sullivan, Danny. “Death of a Meta Tag.” Search Engine Watch, September 30, 2002. http://searchenginewatch.com/article/2066825/Death-Of-A-Meta-Tag.

Symantec.cloud. “Global Spam Drops as Rustock Botnet Is Dismantled.” March 2011 Intelligence Report. Symantec.cloud MessageLabs Intelligence, 2011. http://www.symanteccloud.com/mlireport/MLI_2011_03_March_Final-EN.pdf.

Szpakowski, Mark. “Community Memory: 1972–1974, Berkeley and San Francisco, California.” November 4, 2006. http://www.well.com/~szpak/cm/.

Taylor, Robert. Interview by William Aspray, OH154, transcript, February 28, 1989. Charles Babbage Institute, University of Minnesota, Minneapolis.

Templeton, Brad. “Problems with H.R. 1748 (the ‘Smith Bill’).” On behalf of the Electronic Frontier Foundation, 1997. http://www.templetons.com/brad/spam/badsmith.html.

Templeton, Brad. “Reaction to the DEC Spam of 1978.” n.d. http://www.templetons.com/brad/spamreact.html.

Terranova, Tiziana. “The Bios of Attention” (lecture, Scandic Linköping Vast, Linköping, Sweden), September 7, 2010.

Thatcher, Margaret. Interview by Douglas Keay, “Aids, Education and the Year 2000!” September 23, 1987. http://www.margaretthatcher.org/speeches/displaydocument.asp?docid=106689.

Thompson, E. P. “Rough Music: Le Charivari Anglais.” Annales 27 (1972): 285–312.

Thompson, E. P. “Rough Music Reconsidered.” Folklore 103 (1992): 3–26.

Train, Arthur. “The Spanish Prisoner.” Cosmopolitan, March 1910.

Tung, Liam. “Storm Worm: More Powerful than Blue Gene?” ZDNet, September 12, 2007. http://www.zdnet.com/storm-worm-more-powerful-than-blue-gene-3039289226/.

Turing, Alan. “Computing Machinery and Intelligence.” Mind 59 (October 1950): 433–460.

Turkle, Sherry. Life on the Screen: Identity in the Age of the Internet. New York: Touchstone, 1997.

Turner, Fred. From Counterculture to Cyberculture: Stewart Brand, the Whole Earth Network, and the Rise of Digital Utopianism. Chicago: University of Chicago Press, 2006.

U.S. House of Representatives. Netizens Protection Act of 1997. HR 1748. 105th Cong., 1st Sess.

U.S. House of Representatives. CAN-SPAM. 15 U.S.C. 7701, et seq., Public Law No. 108–187, S.877.

U.S. House of Representatives. Unlawful Internet Gambling Enforcement Act of 2006. 31 USC §§ 5361–5367.

Van Vleck, Tom. “The History of Electronic Mail.” multicians.org, December 20, 2010. http://www.multicians.org/thvv/mail-history.html.

Van Vleck, Tom. “The Who Command.” multicians.org, August 9, 1997. http://www.multicians.org/who.html.

The Virtual Magistrate. “Virtual Magistrate Issues Its First Decision.” In Crypto-Anarchy, Cyberstates, and Pirate Utopias, ed. Peter Ludlow, 343–345. Cambridge, Mass.: MIT Press, 2001.

Vixie, Paul, and Nick Nicholas. “How to Sue MAPS.” Internet Archive, February 29, 2000. http://web.archive.org/web/20000817002153/www.mail-abuse.com/lawsuit/.

von Uexküll, Jakob. A Foray into the Worlds of Animals and Humans, with a Theory of Meaning. Minneapolis: University of Minnesota Press, 2010.

Waldrop, M. Mitchell. The Dream Machine: J. C. R. Licklider and the Revolution That Made Computing Personal. New York: Viking Penguin, 2001.

Walker, Steve. “MSGGROUP# 002 Message Group Status.” June 7, 1975. http://www.std.com/obi/Networking/archives/msggroup/.

Wall, David S. Cybercrime: The Transformation of Crime in the Information Age. Cambridge: Polity, 2007.

Webb, Jason. “COMMUN—THE FEMINIZATION OF CYBERSPACE,” appended to “Doctress Neutopia”/Libby Hubbard, “The Feminization of Cyberspace.” The Electronic Frontier Foundation Archive, March 1994. http://w2.eff.org/Net_culture/Gender_issues/net_feminization.paper.

Webber, Bob. “FCC? U.S.Mail.? (Re: JJ’s Revenge—Part II).” In news.admin, news.sysadmin, June 1, 1988.

Werry, Chris. “Imagined Electronic Community: Representations of Virtual Community in Contemporary Business Discourse.” First Monday 4 (9) (September 6, 1999). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/690/600.

White, Harrison C. Identity and Control: A Structural Theory of Social Action. Princeton: Princeton University Press, 1992.

Whoriskey, Peter. “Digital Deception.” Washington Post, May 1, 2008.

Wiener, Matthew P. “Nebraska letter.” In news.misc, May 27, 1988.

Wiener, Norbert. Cybernetics: or Control and Communication in the Animal and the Machine. Cambridge, Mass.: MIT Press, 1948.

Williams, Alex. “The Largest Cloud in the World Is Owned by a Criminal Network.” ReadWriteWeb (blog), April 19, 2010. http://www.readwriteweb.com/cloud/2010/04/the-largest-cloud-in-the-world.php.

Williams, Raymond. Keywords: A Vocabulary of Culture and Society. New York: Oxford University Press, 1985.

Williamson, Charles W., III. “Carpet Bombing in Cyberspace: Why America Needs a Military Botnet.” Armed Forces Journal, May 2008.

Wohl, Robert. A Passion for Wings: Aviation and the Western Imagination 1908–1918. New Haven: Yale University Press, 1996.

Wohl, Robert. The Spectacle of Flight: Aviation and the Western Imagination 1920–1950. New Haven: Yale University Press, 2007.

Wolcott, Jennifer. “You Call It Spam, They Call It a Living.” Christian Science Monitor, March 22, 2004. http://www.csmonitor.com/2004/0322/p12s02-ussc .html.

Wu, Tim. The Master Switch: The Rise and Fall of Information Empires. New York: Knopf, 2010.

Yardi, Sarita, et al. “Detecting Spam in a Twitter Network.” First Monday 15 (4) (January 2010). http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2793/2431.

Zellich, Rich. “MSGGROUP# 693 INOVATIONS IN ENGINEERING PUBLICATION.” May 4, 1978. http://www.std.com/obi/Networking/archives/msggroup/.

Zhang, Harry. “The Optimality of Naive Bayes.” Proceedings of the Seventeenth Florida Artificial Intelligence Research Society Conference (2004).

Zielinski, Siegfried. Deep Time of the Media: Toward an Archaeology of Hearing and Seeing by Technical Means. Cambridge, Mass.: MIT Press, 2008.

Zipf, George K. Human Behavior and the Principle of Least Effort: An Introduction to Human Ecology. Cambridge, Mass.: Addison-Wesley, 1949.

Zipf, George K. The Psycho-Biology of Language: An Introduction to Dynamic Philology. Cambridge, Mass.: MIT, 1965.