742:
582:, an item called "ICE Breaker" can be obtained and used as a hacking tool during a sequence on the Leviathan, in which the player chooses one character to remain behind and attempt to rescue the other captured party members.
620:, wherein "ICE" is used intermittently with "firewalls" to reference mainframe defenses which the player-controlled AI program Incognita breaks through to take control of enemy electronics.
533:
598:, where ICE is represented in cyberspace as both autonomous security programs and ICE protection attached to data or software objects appearing as blue crystal formations.
274:
understand ICE to be an acronym for "Intrusion
Countermeasures Electronics", the runner viewpoint is that the acronym should be for "Insidious Cortical Electrocution"
1026:
898:
306:, where the players attempt to gain illicit access systems represented by playing cards arranged in a network while avoiding getting zapped by ICE and Black ICE.
142:
and cyberpunk literature. "The
Gibsonian concept of cyberspace fed back into both computer and information systems design and theory," wrote Roger Burrows.
578:
349:
by
Melissa Scott, wherein IC(E) refers to Intrusion Countermeasures (Electronic), solving the problem of implying that the measures are hardware-based
134:
concept. This can be attributed to the fact that using the term "electronics" to describe software products (such as firewalls) is something of a
170:
The Java bytecode verifier in the Apache ByteCode
Engineering Library (BCEL) is called JustIce (see the 'docs' folder for documentation).
468:
features an item called "Hacker ICE-Breaker Source", which can be further upgraded to "Intrusion
Countermeasure Electronics Upgrade".
1001:
1297:
840:
923:
726:
Wall, D.S. (2012). "The Devil Drives a Lada: the social construction of hackers as cybercriminals". In
Gregoriou, C. (ed.).
167:, an encryption algorithm, may be inspired by Gibson's ICE, but it is explained as meaning "Information Concealment Engine".
1484:
570:
has the player break into various cyberspace systems, which involves fighting the "ICE" security programs in the form of a
100:
refers to ICE that are capable of killing the intruder if deemed necessary or appropriate; some forms of black ICE may be
902:
130:
and similar programs fall under this classification, the term has little real world significance and remains primarily a
1363:
658:
1324:
1105:
710:
174:
On April 28, 2009, the
Information and Communications Enhancement Act, or ICE Act for short, was introduced to the
1338:
1021:
497:
uses the term to refer to defensive countermeasures that prevent netrunners and cyberware from hacking a target.
1524:
877:
1331:
157:
1317:
1221:
994:
1124:
481:
uses the term to describe the technology protecting the characters' "brain chips" and virtual structures.
1490:
529:, where "ICE" in its RPG part refers to shields or armor that can be attacked by various "ICE breaker"s
521:
uses "Black Ice" as a construction material during a cyberspace hacking minigame in the Far Harbor DLC.
153:
117:
39:
17:
1514:
1356:
1242:
562:, features an ICE pick, to hack enemy cameras, turrets, and robots and use them against enemy forces.
862:
270:
setting, where the corporate player uses ICE and the runner player uses icebreakers; while corps in
1452:
1198:
541:
509:
449:
337:
301:
1519:
1235:
987:
817:
790:
610:
489:
uses the term to describe the technology the player must overcome when hacking a computer system.
345:
101:
1460:
1284:
1270:
525:
410:
212:
186:
by the federal government, including the establishment of the
National Office for Cyberspace.
1468:
1186:
614:, where items are protected by various levels of ICE that the player must overcome to access.
537:, where "ICE" is an umbrella term for security measures that shield nodes from being accessed
472:
123:
96:
environment, these constructs are often represented by actual walls of ice, stone, or metal.
501:
395:
288:
183:
175:
8:
1068:
566:
219:
127:
1256:
850:
442:
295:
278:
226:
965:
827:. Lecture Notes in Computer Science. Vol. 1267. Springer-Verlag. pp. 69–82.
764:
1291:
1277:
836:
706:
631:
558:
550:
113:
828:
77:, as well as Gibson's own acknowledgements, the term ICE was originally coined by
1421:
1400:
1228:
927:
663:
617:
372:
131:
93:
1426:
1380:
1263:
1249:
1191:
1167:
1159:
1080:
1043:
1010:
692:
602:
493:
464:
360:
330:
266:
55:
51:
1508:
1477:
1436:
1395:
1385:
1132:
1089:
423:
245:, though in it "ICE" stands for "Integrated Cyber Environment", referring to
668:
1140:
949:
594:
586:
571:
241:
230:, where ICE is referred to directly by name or else as an 'Attack Barrier'.
164:
1052:
697:
590:
features an ability called Black Ice, which the Hacker character may use.
317:
74:
69:
1416:
1060:
899:"ICE Act would restructure cybersecurity rule, create White House post"
832:
505:, where the player's hacking program is referred to as an "ICE Breaker"
418:
325:
246:
179:
139:
90:
78:
60:
702:
606:, where an item that auto-hacks electronics is known as an "ICE-Pick"
517:
478:
437:
379:
260:
199:
156:
built by a
California company named Network ICE in 1999, acquired by
138:. On the other hand, there is a strong connection between real-world
31:
34:
literature to refer to security programs which protect computerized
1390:
485:
384:
135:
979:
145:
The term ICE has occasionally been used for real-world software:
882:
1097:
65:
387:) but is colloquially named "Ice" by hackers in the setting
35:
546:
where ICE, BlackICE, and ICE Breaking are highly featured.
426:
says in a club that he is the hacker known as "IceBreaker"
513:, wherein there are security programs called "ICE walls"
554:, where players use ICE technology to bypass security.
341:, wherein black ICE is used to defend the TechnoCore
916:
453:, in the episode "Security Systems", April 21, 1987
249:, rather than Intrusion Countermeasures Electronics
383:, called IC (The setting drops the "electronics"
1506:
16:"Black ICE" redirects here. For other uses, see
748:. In Westwood, Sallie; Williams, John (eds.).
691:
995:
687:
685:
818:"The design of the ICE encryption algorithm"
653:
651:
649:
941:
635:, icewalls are a standard security measure.
1002:
988:
750:Imagining Cities: Scripts, signs, memories
682:
646:
762:
740:
1507:
896:
579:Star Wars: Knights of the Old Republic
1432:Intrusion Countermeasures Electronics
983:
890:
752:. London: Routledge. pp. 235–48.
84:
24:Intrusion Countermeasures Electronics
1485:William Gibson: A Literary Companion
815:
730:. Palgrave Macmillan. pp. 4–18.
725:
353:
897:Howard, Alexander B. (2009-04-28).
788:
189:
182:to make changes to the handling of
107:
13:
1009:
901:. SearchCompliance. Archived from
321:, original popularizer of the term
58:", which also introduced the term
14:
1536:
1325:Disneyland with the Death Penalty
875:
791:"IBM kills off BlackICE firewall"
414:, mentioned in the opening crawl.
45:
282:, an adaptation of the original
1339:Distrust That Particular Flavor
958:
1027:List of awards and nominations
926:. OpenCongress. Archived from
924:"S.921 - U.S. ICE Act of 2009"
869:
809:
782:
763:Edwards, M (8 December 1999).
756:
734:
719:
457:
393:, a roleplaying game based on
1:
1332:No Maps for These Territories
639:
624:
430:
310:
253:
158:IBM Internet Security Systems
1318:Agrippa (A Book of the Dead)
1222:Fragments of a Hologram Rose
743:"Cyberpunk as Social Theory"
667:. 2003-10-27. Archived from
160:, then discontinued in 2007.
50:The term was popularized by
7:
234:
10:
1541:
154:intrusion detection system
118:Intrusion detection system
111:
18:black ice (disambiguation)
15:
1445:
1409:
1373:
1348:
1309:
1213:
1178:
1151:
1116:
1079:
1042:
1035:
1017:
728:The Construction of Crime
403:
303:Hacker II - The Dark Side
825:Fast Software Encryption
205:
102:artificially intelligent
64:, and in his subsequent
1236:The Gernsback Continuum
741:Burrows, Roger (1997).
391:Shadow of the Beanstalk
346:Trouble and Her Friends
38:from being accessed by
1271:Red Star, Winter Orbit
1106:All Tomorrow's Parties
954:. Season 1. Episode 4.
816:Kwan, Matthew (1997).
422:, wherein a friend of
213:Cyberpunk: Edgerunners
1525:Fiction about malware
1187:The Difference Engine
473:AI: The Somnium Files
1364:First Person Shooter
329:the second novel of
184:information security
176:United States Senate
54:in his short story "
30:) is a term used in
1125:Pattern Recognition
1069:Mona Lisa Overdrive
948:"Fire and I.C.E.".
220:Cyber City Oedo 808
128:anti-virus software
85:Description of ICE
73:. According to the
1257:The Belonging Kind
833:10.1007/BFb0052335
443:Born to the Purple
441:, in the episode "
368:card game is based
279:Android: Netrunner
227:Ghost in the Shell
198:is widely used in
1502:
1501:
1278:The Winter Market
1209:
1208:
970:StarCrawlers Wiki
842:978-3-540-63247-4
797:. CBS Interactive
632:Schlock Mercenary
559:Project Snowblind
551:Perfect Dark Zero
534:Midnight Protocol
364:, upon which the
354:Roleplaying games
122:Though real-life
114:Computer security
89:When viewed in a
1532:
1515:Cyberpunk themes
1446:Derivative works
1117:Blue Ant trilogy
1040:
1039:
1004:
997:
990:
981:
980:
974:
973:
962:
956:
955:
945:
939:
938:
936:
935:
920:
914:
913:
911:
910:
894:
888:
887:
873:
867:
866:
860:
856:
854:
846:
822:
813:
807:
806:
804:
802:
786:
780:
779:
777:
775:
760:
754:
753:
747:
738:
732:
731:
723:
717:
716:
689:
680:
679:
677:
676:
655:
333:"Sprawl trilogy"
331:William Gibson's
190:Usage in fiction
108:Real-world usage
1540:
1539:
1535:
1534:
1533:
1531:
1530:
1529:
1505:
1504:
1503:
1498:
1462:Johnny Mnemonic
1441:
1422:Megacorporation
1405:
1401:Hubertus Bigend
1369:
1344:
1305:
1229:Johnny Mnemonic
1205:
1174:
1147:
1112:
1075:
1031:
1013:
1008:
978:
977:
964:
963:
959:
947:
946:
942:
933:
931:
922:
921:
917:
908:
906:
895:
891:
874:
870:
858:
857:
848:
847:
843:
820:
814:
810:
800:
798:
789:Naraine, Ryan.
787:
783:
773:
771:
761:
757:
745:
739:
735:
724:
720:
713:
690:
683:
674:
672:
664:The Jargon File
657:
656:
647:
642:
627:
618:Invisible, Inc.
460:
433:
411:Johnny Mnemonic
406:
373:GURPS Cyberpunk
356:
313:
256:
237:
208:
192:
132:science fiction
120:
112:Main articles:
110:
94:virtual reality
87:
48:
21:
12:
11:
5:
1538:
1528:
1527:
1522:
1520:William Gibson
1517:
1500:
1499:
1497:
1496:
1492:The Peripheral
1488:
1481:
1474:
1470:New Rose Hotel
1466:
1458:
1449:
1447:
1443:
1442:
1440:
1439:
1434:
1429:
1424:
1419:
1413:
1411:
1410:Story elements
1407:
1406:
1404:
1403:
1398:
1393:
1388:
1383:
1381:Molly Millions
1377:
1375:
1371:
1370:
1368:
1367:
1360:
1352:
1350:
1346:
1345:
1343:
1342:
1335:
1328:
1321:
1313:
1311:
1307:
1306:
1304:
1303:
1299:Burning Chrome
1295:
1292:Skinner's Room
1288:
1281:
1274:
1267:
1264:Burning Chrome
1260:
1253:
1250:New Rose Hotel
1246:
1239:
1232:
1225:
1217:
1215:
1211:
1210:
1207:
1206:
1204:
1203:
1195:
1192:Bruce Sterling
1182:
1180:
1176:
1175:
1173:
1172:
1164:
1160:The Peripheral
1155:
1153:
1152:Jackpot series
1149:
1148:
1146:
1145:
1137:
1129:
1120:
1118:
1114:
1113:
1111:
1110:
1102:
1094:
1085:
1083:
1081:Bridge trilogy
1077:
1076:
1074:
1073:
1065:
1057:
1048:
1046:
1044:Sprawl trilogy
1037:
1033:
1032:
1030:
1029:
1024:
1018:
1015:
1014:
1011:William Gibson
1007:
1006:
999:
992:
984:
976:
975:
957:
940:
915:
889:
876:Haase, Enver.
868:
859:|journal=
841:
808:
781:
755:
733:
718:
711:
693:William Gibson
681:
644:
643:
641:
638:
637:
636:
626:
623:
622:
621:
615:
607:
603:System Shock 2
599:
591:
583:
575:
563:
555:
547:
538:
530:
522:
514:
506:
498:
494:Cyberpunk 2077
490:
482:
476:
469:
465:Anarchy Online
459:
456:
455:
454:
446:
432:
429:
428:
427:
415:
405:
402:
401:
400:
388:
376:
369:
361:Cyberpunk 2020
355:
352:
351:
350:
342:
334:
322:
312:
309:
308:
307:
293:
275:
267:Cyberpunk 2020
255:
252:
251:
250:
236:
233:
232:
231:
223:
216:
207:
204:
191:
188:
172:
171:
168:
161:
109:
106:
86:
83:
56:Burning Chrome
52:William Gibson
47:
46:Origin of term
44:
9:
6:
4:
3:
2:
1537:
1526:
1523:
1521:
1518:
1516:
1513:
1512:
1510:
1495:
1493:
1489:
1487:
1486:
1482:
1480:
1479:
1478:Node Magazine
1475:
1473:
1471:
1467:
1465:
1463:
1459:
1457:
1455:
1451:
1450:
1448:
1444:
1438:
1437:Raygun Gothic
1435:
1433:
1430:
1428:
1425:
1423:
1420:
1418:
1415:
1414:
1412:
1408:
1402:
1399:
1397:
1396:Cayce Pollard
1394:
1392:
1389:
1387:
1386:Bobby Newmark
1384:
1382:
1379:
1378:
1376:
1372:
1365:
1361:
1358:
1354:
1353:
1351:
1347:
1341:
1340:
1336:
1334:
1333:
1329:
1326:
1322:
1320:
1319:
1315:
1314:
1312:
1308:
1302:
1300:
1296:
1293:
1289:
1286:
1282:
1279:
1275:
1272:
1268:
1265:
1261:
1258:
1254:
1251:
1247:
1244:
1240:
1237:
1233:
1230:
1226:
1223:
1219:
1218:
1216:
1214:Short stories
1212:
1201:
1200:
1196:
1193:
1189:
1188:
1184:
1183:
1181:
1177:
1170:
1169:
1165:
1162:
1161:
1157:
1156:
1154:
1150:
1143:
1142:
1138:
1135:
1134:
1133:Spook Country
1130:
1127:
1126:
1122:
1121:
1119:
1115:
1108:
1107:
1103:
1100:
1099:
1095:
1092:
1091:
1090:Virtual Light
1087:
1086:
1084:
1082:
1078:
1071:
1070:
1066:
1063:
1062:
1058:
1055:
1054:
1050:
1049:
1047:
1045:
1041:
1038:
1034:
1028:
1025:
1023:
1022:List of works
1020:
1019:
1016:
1012:
1005:
1000:
998:
993:
991:
986:
985:
982:
971:
967:
961:
953:
952:
944:
930:on 2010-08-31
929:
925:
919:
905:on 2009-11-08
904:
900:
893:
885:
884:
879:
872:
864:
852:
844:
838:
834:
830:
826:
819:
812:
796:
792:
785:
770:
766:
759:
751:
744:
737:
729:
722:
714:
712:0-441-56959-5
708:
704:
700:
699:
694:
688:
686:
671:on 2008-12-04
670:
666:
665:
660:
654:
652:
650:
645:
634:
633:
629:
628:
619:
616:
613:
612:
608:
605:
604:
600:
597:
596:
592:
589:
588:
584:
581:
580:
576:
573:
569:
568:
564:
561:
560:
556:
553:
552:
548:
545:
543:
539:
536:
535:
531:
528:
527:
523:
520:
519:
515:
512:
511:
507:
504:
503:
499:
496:
495:
491:
488:
487:
483:
480:
477:
475:
474:
470:
467:
466:
462:
461:
452:
451:
447:
444:
440:
439:
435:
434:
425:
424:Kevin Mitnick
421:
420:
416:
413:
412:
408:
407:
398:
397:
392:
389:
386:
382:
381:
377:
375:
374:
370:
367:
363:
362:
358:
357:
348:
347:
343:
340:
339:
335:
332:
328:
327:
323:
320:
319:
315:
314:
305:
304:
299:
298:
294:
291:
290:
285:
281:
280:
276:
273:
269:
268:
263:
262:
258:
257:
248:
244:
243:
239:
238:
229:
228:
224:
222:
221:
217:
215:
214:
210:
209:
203:
201:
197:
187:
185:
181:
177:
169:
166:
162:
159:
155:
151:
148:
147:
146:
143:
141:
137:
133:
129:
125:
119:
115:
105:
103:
99:
95:
92:
82:
80:
76:
72:
71:
67:
63:
62:
57:
53:
43:
41:
37:
33:
29:
25:
19:
1491:
1483:
1476:
1469:
1461:
1453:
1431:
1427:Locative art
1337:
1330:
1316:
1298:
1197:
1185:
1166:
1158:
1141:Zero History
1139:
1131:
1123:
1104:
1096:
1088:
1067:
1059:
1051:
969:
960:
951:Phantom 2040
950:
943:
932:. Retrieved
928:the original
918:
907:. Retrieved
903:the original
892:
881:
871:
824:
811:
799:. Retrieved
794:
784:
772:. Retrieved
768:
758:
749:
736:
727:
721:
696:
673:. Retrieved
669:the original
662:
630:
609:
601:
595:System Shock
593:
587:StarCrawlers
585:
577:
572:rail shooter
565:
557:
549:
540:
532:
524:
516:
508:
500:
492:
484:
471:
463:
450:Max Headroom
448:
436:
417:
409:
394:
390:
378:
371:
365:
359:
344:
336:
324:
316:
302:
296:
287:
283:
277:
271:
265:
259:
242:Phantom 2040
240:
225:
218:
211:
195:
193:
173:
149:
144:
121:
97:
88:
68:
59:
49:
27:
23:
22:
1454:Neuromancer
1357:Kill Switch
1243:Hinterlands
1053:Neuromancer
769:ITPro Today
698:Neuromancer
542:Neuromancer
458:Video games
318:Neuromancer
264:, based on
178:by Senator
75:Jargon File
70:Neuromancer
1509:Categories
1456:video game
1417:Cyberspace
1374:Characters
1349:Television
1310:Nonfiction
1301:collection
1061:Count Zero
934:2010-05-07
909:2010-05-07
765:"BlackICE"
675:2008-11-21
640:References
625:Web comics
611:The Ascent
431:Television
419:Track Down
326:Count Zero
311:Literature
254:Card games
247:cyberspace
180:Tom Carper
165:ICE cipher
140:cybercrime
91:cyberspace
79:Tom Maddox
61:cyberspace
1494:TV series
1199:Archangel
878:"JustIce"
861:ignored (
851:cite book
703:Ace Books
526:Mr. Robot
518:Fallout 4
479:Baldr Sky
438:Babylon 5
380:Shadowrun
366:Netrunner
284:Netrunner
272:Netrunner
261:Netrunner
202:fiction.
200:cyberpunk
194:The term
124:firewalls
98:Black ICE
32:cyberpunk
1391:Rei Toei
1285:Dogfight
1194:) (1990)
966:"Hacker"
695:(1984).
510:Dystopia
486:BloodNet
399:universe
385:misnomer
338:Hyperion
286:for the
235:Cartoons
150:BlackICE
136:misnomer
801:16 July
774:16 July
502:Deus Ex
396:Android
292:setting
289:Android
40:hackers
1202:(2016)
1190:(with
1171:(2020)
1168:Agency
1163:(2014)
1144:(2010)
1136:(2007)
1128:(2003)
1109:(1999)
1101:(1996)
1093:(1993)
1072:(1988)
1064:(1986)
1056:(1984)
1036:Novels
883:GitHub
839:
709:
567:Ripper
404:Movies
297:Hacker
1179:Other
1098:Idoru
821:(PDF)
795:ZDNet
746:(PDF)
659:"Ice"
206:Anime
152:, an
66:novel
1472:film
1464:film
863:help
837:ISBN
803:2020
776:2020
707:ISBN
300:and
163:The
116:and
36:data
829:doi
196:ICE
28:ICE
1511::
968:.
880:.
855::
853:}}
849:{{
835:.
823:.
793:.
767:.
705:.
701:.
684:^
661:.
648:^
126:,
104:.
81:.
42:.
1366:"
1362:"
1359:"
1355:"
1327:"
1323:"
1294:"
1290:"
1287:"
1283:"
1280:"
1276:"
1273:"
1269:"
1266:"
1262:"
1259:"
1255:"
1252:"
1248:"
1245:"
1241:"
1238:"
1234:"
1231:"
1227:"
1224:"
1220:"
1003:e
996:t
989:v
972:.
937:.
912:.
886:.
865:)
845:.
831::
805:.
778:.
715:.
678:.
574:.
544:,
445:"
26:(
20:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.