to the destruction of the race that created it. ReferencesAbreu, E.M. (1999, September). Experts find Microsoft Hotmail hack easier than claimed. Company Business and Marketing.Bernardo, R. (May 4, 2001). State law moves to address technology crime. Honolulu Star-BulletinCisco Secure IDS (2001). [On-line]. Available: http://www.cisco.comEaton, J.W. (1986). Card-carrying Americans. Privacy;, Security, and the national i.d card debate. United States of America: Rowman & Littlefield.Farrow, R. & Power, R. (2001). Five vendors some no-nonsense questions on IDS. CSI Intrusion System Resource Goodwin, B. (2000, August ). Safeway site is still down after hack attack.. Company Business and Marketing.Network ICE Corporation (1998-2000). Password theft [On-line]. Available: http://www.netice.comNiccolai, J. (02/11/2000). Analyst puts recent hacker damage at $1.2 billion and rising [On-line]. Available: http://www.nwfusion.comn/newsReal Secure (2001). [On-line]. Available: http://www.securehq.comSchindler, D.J. (2000, March). E-Crime and what to do about it. Los Angeles Business Journal.SilentRunnerTM. SilentRunnerTM [On-line]. Available: http://www.silentrunner.com/about/index.html.Teach, E. (1998, February). Look who's hacking now. CFO, The Magazine for Senior Financial Executives....