642 lines
30 KiB
Plaintext
642 lines
30 KiB
Plaintext
|
||
|
||
****************************************************************************
|
||
>C O M P U T E R U N D E R G R O U N D<
|
||
>D I G E S T<
|
||
*** Volume 1, Issue #1.09 (May 16, 1990) **
|
||
****************************************************************************
|
||
|
||
MODERATORS: Jim Thomas / Gordon Meyer
|
||
REPLY TO: TK0JUT2@NIU.bitnet
|
||
|
||
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
|
||
information among computerists and to the presentation and debate of
|
||
diverse views.
|
||
--------------------------------------------------------------------
|
||
DISCLAIMER: The views represented herein do not necessarily represent the
|
||
views of the moderators. Contributors assume all responsibility
|
||
for assuring that articles submitted do not violate copyright
|
||
protections.
|
||
--------------------------------------------------------------------
|
||
|
||
|
||
In This Issue:
|
||
|
||
File 1: Moderators' Corner (news and notes)
|
||
File 2: From the Mail Bag (Richard Duffy)
|
||
File 3: Operation Sun Devil: Press Release
|
||
File 4: Operation Sun Devil: Secret Service Statement
|
||
File 5: News Excerpts about Operation Sun Devil
|
||
File 6: Software Publishers Association Update
|
||
--------------------------------------------------------------------
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.09 / File 1 of 6 ***
|
||
***************************************************************
|
||
|
||
In this file:
|
||
-- Operation Sun Devil
|
||
-- FTP (Clarification)
|
||
-- Dr. Ripco's Final Words
|
||
---------------------------------------------------------------
|
||
----------
|
||
Operation Sun Devil
|
||
-----------
|
||
|
||
Operation Sun Devil, another phase in the crackdown against the computer
|
||
underground, was begun May 8 (See this issue, Files 3 and 4). At least 28
|
||
search warrants were served, and a number of arrests have resulted,
|
||
although not all directly related to the May 8 operation. Judging from
|
||
comments we have received, people are either quite angry about it or highly
|
||
supportive of it. We will give our own views in File #3, but we urge you to
|
||
send reasoned opinions on either side.
|
||
|
||
One of the best commentaries of the entire crackdown can be in Emmanuel
|
||
Goldstein's articles in 2600 MAGAZINE (May 15, 1990). People can contact
|
||
2600/M at:
|
||
2600@well.sf.ca.us OR
|
||
2600 EDITORIAL DEPARTMENT
|
||
P.O. BOX 99,
|
||
MIDDLE ISLAND, NY 11953
|
||
|
||
We will have an expanded article on Sun Devil in CuD #1.10
|
||
------------
|
||
FTP SITE
|
||
------------
|
||
|
||
DATE: FRI, 11 MAY 90 06:38 EDT
|
||
FROM: <KRAUSER@SNYSYRV1>
|
||
SUBJECT: FTP SITE (FILE TRANSFER PERSON)
|
||
TO: TK0JUT2
|
||
|
||
|
||
OK EVERYONE. THE "FTP" SIGHT IS REALLY REFERRING TO A FILE TRANSFER PERSON
|
||
WHICH IS ME. TO REQUEST A FILE SEND MESSAGE CONTAINING THE FOLLOWING
|
||
INFORMATION:
|
||
|
||
1. YOUR NETWORK ADDRESS
|
||
2. WHAT FILES YOU WANT (GIVE ME AN EXACT IDEA IE. ISSUES 1-12 OF PHRACK)
|
||
|
||
AFTER RECEIVING YOUR REQUEST, I WILL SEND YOU A MESSAGE THAT I HAVE
|
||
RECEIVED YOUR REQUEST. THIS WILL SERVE TWO PURPOSES, THE FIRST TO LET YOU
|
||
KNOW THAT I RECEIVED YOUR REQUEST AND TO LET ME MAKE SURE THAT THE FILES
|
||
WILL GET TO YOU.
|
||
|
||
YOU SHOULD RECEIVE THE FILES WITHIN A 48 HOURS TIME PERIOD AND ALL PAST
|
||
REQUESTS WILL BE SENT THIS WEEKEND. AT THIS TIME I HAVE ALL OF PHRACK
|
||
(EXCEPT ISSUE 24 AND WE WON'T WANT TO SEND THAT ONE NOW WOUDLD WE), LOD
|
||
TECH JOURNALS, AND P/HUN. I WILL BE RECEIVING THE REST OF THE ATI AND
|
||
PIRATE ARTICLES SOON. ALSO IF YOU HAVE A LIST OF FILES THAT
|
||
YOU WOULD LIKE TO SHARE WITH EVERYONE, INCLUDE THAT LIST WITH YOUR REQUEST.
|
||
HOPEFULLY THIS METHOD OF FILE TRANSFER WILL ONLY BE FOR A WHILE SINCE I AM
|
||
IN THE MIDST OF HUNTING DOWN A FTP SITE.
|
||
|
||
DARKMAGE
|
||
--------------------------------------------------------------------
|
||
|
||
-------------
|
||
RIPCO
|
||
-------------
|
||
|
||
Ripco was one of the boards that went down on May 8. It was probably the
|
||
longest running decent board in the country. Judging from our knowledge of
|
||
the users and the content of the logs, less than 3 percent of the callers
|
||
claimed to be identified in illegal activity, and of those, we'd guess that
|
||
at least half were faking it. Given the nature of undercover operations,
|
||
which include "infiltrating" boards, we also assume some were law
|
||
enforcement agents. Ripco had a number of message sections, all of which
|
||
were lively, generally intelligent, and invariably interesting. Raiding
|
||
Ripco seems to be throwing the baby out with the bath water by intimidating
|
||
sysops willing to allow provocative discussions. We repeat: THE BULK OF
|
||
RIPCO'S USERS WERE NOT IN ANY WAY INVOLVED IN *ANY* ILLEGAL ACTIVITY, but
|
||
now names are in the hands of agents. We have seen from past experience
|
||
what can happen when they start generating "lists." We can see some
|
||
aggressive hot-shot prosecutor now, about to seek political office: "I HAVE
|
||
IN MY HAND A LIST OF 200 SUBVERSIVE HACKER SCUM....!" In our view, this is
|
||
no long a computer underground issue, but one of First Amendment
|
||
protections.
|
||
|
||
We reprint Dr. Ripco's final message left to his users:
|
||
******************************************************************
|
||
|
||
This is 528-5020.
|
||
|
||
As you are probably aware, on May 8, the Secret Service conducted a series
|
||
of raids across the country. Early news reports indicate these raids
|
||
involved people and computers that could be connected with credit card and
|
||
long distance toll fraud. Although no arrests or charges were made, Ripco
|
||
BBS was confiscated on that morning. It's involvement at this time is
|
||
unknown. Since it is unlikely that the system will ever return, I'd just l
|
||
say goodbye, and thanks for your support for the last six and a half years.
|
||
It's been interesting, to say the least.
|
||
|
||
Talk to ya later.
|
||
%Dr. Ricpo%
|
||
|
||
*** END OF VOICE MESSAGE ***
|
||
--------------------------------------------------------------------
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.09 / File 2 of 6 ***
|
||
***************************************************************
|
||
|
||
To: tk0jut2
|
||
Subject: passwordless account argument in alt.security
|
||
Date: Sun, 13 May 90 02:54:18 -0500
|
||
From: Richard Duffy <zeno@zaphod.UChicago.EDU>
|
||
|
||
|
||
There is currently a thought-provoking, ongoing argument raging in the
|
||
Usenet group alt.security, concerning a user at St. Olaf College who
|
||
deliberately maintains a null password on one of his accounts there. That
|
||
newsgroup has been engaged in a detailed, continuing discussion of Unix
|
||
security issues, especially concerning policies about user passwords
|
||
(forcing users to change them regularly, forcing them to choose from a
|
||
software-generated list of choices, etc. etc.) and the associated ideas
|
||
about the general need for security measures. The user in question, Peter
|
||
Seebach, takes the provocative but firmly held position that Unix is so
|
||
insecure anyway that there's not even a point in having passwords for user
|
||
accounts. He advertised in this highly public forum (Usenet) the fact that
|
||
his own account lacks one, and a major flame-war has ensued, partly
|
||
precipitated by the fact that someone, possibly a reader of his public
|
||
admission, promptly logged in to Peter's account and gave it a password,
|
||
thus temporarily locking him out of his own account.
|
||
|
||
The resulting verbiage has a lot of the usual puerile, vindictive,
|
||
posturing qualities associated with Usenet flame-wars, but in spite of all
|
||
that, some interesting points about "hackers," privacy, ethics and trust
|
||
are beginning to make themselves discernible through all the noise. I
|
||
highly recommend it to those of you with Usenet access, for a little
|
||
mind-bending on some issues you might have thought you were already
|
||
completely decided on. It's also rather entertaining!
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.09 / File 3 of 6 ***
|
||
***************************************************************
|
||
|
||
U.S. Department of Justice
|
||
United States Attorney
|
||
District of Arizona
|
||
--------------------------------------------------------------------
|
||
|
||
4000 United States Courthouse
|
||
Phoenix, Arizona 82505
|
||
602-379-3011 /FTS/261-3011
|
||
|
||
|
||
PRESS RELEASE
|
||
|
||
|
||
FOR IMMEDIATE RELEASE: CONTACT: Wendy Harnagel
|
||
Wednesday, May 9, 1990 United States Attorney's Office
|
||
(602) 379-3011
|
||
|
||
|
||
PHOENIX--Stephen M. McNamee, United States Attorney for the District of
|
||
Arizona, Robert K. Corbin, Attorney General for the state of Arizona, and
|
||
Henry R. Potosky, Acting Special Agent in Charge of the United States
|
||
Secret Service Office in Phoenix, today announced that approximately
|
||
twenty-seven search warrants were executed on Monday and Tuesday, May 7 and
|
||
8, 1990, in various cities across the nation by 150 Secret Service agents
|
||
along with state and local law enforcement officials. The warrants were
|
||
issued as a part of Operation Sundevil, which was a two year investigation
|
||
into alleged illegal computer hacking activities.
|
||
|
||
The United States Secret Service, in cooperation with the United States
|
||
Attorney's Office, and the Attorney General for the State of Arizona,
|
||
established an operation utilizing sophisticated investigative techniques,
|
||
targeting computer hackers who were alleged to have trafficked in and abuse
|
||
stolen credit card numbers, unauthorized long distance dialing codes, and
|
||
who conduct unauthorized access and damage to computers. While the total
|
||
amount of losses cannot be calculated at this time, it is
|
||
(MORE)
|
||
estimated that the losses may run into the millions of dollars. For
|
||
example, the unauthorized accessing of long distance telephone cards have
|
||
resulted in uncollectible charges. The same is true of the use of stolen
|
||
credit card numbers. Individuals are able to utilize the charge accounts to
|
||
purchase items for which no payment is made.
|
||
|
||
Federal search warrants were executed in the following cities:
|
||
|
||
Chicago, IL
|
||
Cincinnati, OH
|
||
Detroit, MI
|
||
Los Angeles, CA
|
||
Miami, FL
|
||
Newark, NJ
|
||
New York, NY
|
||
Phoenix, AZ
|
||
Pittsburgh, PA
|
||
Plano, TX
|
||
Richmond, VA
|
||
San Diego, CA
|
||
San Jose, CA
|
||
|
||
Unlawful computer hacking imperils the health and welfare of individuals,
|
||
corporations and government agencies in the United States who rely on
|
||
computers and telephones to communicate.
|
||
|
||
Technical and expert assistance was provided to the United States Secret
|
||
Service by telecommunication companies including Pac Bel, AT&T, Bellcore,
|
||
Bell South, MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S.
|
||
West, and by the many corporate victims. All are to be commended for their
|
||
efforts in researching intrusions and documenting losses.
|
||
|
||
McNamee and Corbin expressed concern that the improper and alleged illegal
|
||
use of computers may become the White Collar crime of the
|
||
(MORE)
|
||
1990's. McNamee and Corbin reiterated that the state and federal government
|
||
will vigorously pursue criminal violations of statutes under their
|
||
jurisdiction. Three individuals were arrested yesterday in other
|
||
jurisdictions on collateral or independent state charges. The
|
||
investigations surrounding the activities of Operation Sundevil are
|
||
continuing.
|
||
|
||
The investigations are being conducted by agents of the United States
|
||
Secret Service and Assistant United States Attorney Tim Holtzen, District
|
||
of Arizona, and Assistant Arizona Attorney General Gail Thackery.
|
||
|
||
END STORY
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.09 / File 4 of 6 ***
|
||
***************************************************************
|
||
|
||
Assistant Director Garry M. Jenkins' Prepared Remarks
|
||
|
||
Operation Sun Devil
|
||
|
||
|
||
Today, the Secret Service is sending a clear message to those computer
|
||
hackers who have decided to violate the laws of this nation in the mistaken
|
||
belief that they can successfully avoid detection by hiding behind the
|
||
relative anonymity of their computer terminals.
|
||
|
||
In 1984, Congress enacted the Comprehensive Crime Control Act which
|
||
prohibits, among other things, credit card fraud and computer fraud. Since
|
||
1984, the Secret Service has been aggressively enforcing these laws and has
|
||
made over 9,000 arrests nationwide.
|
||
|
||
Recently we have witnessed an alarming number of young people who, for a
|
||
variety of sociological and psychological reasons, have become attached to
|
||
their computers and are exploiting thier potential in a criminal manner.
|
||
Often, a progression of criminal activity occurs which involves
|
||
telecommunications fraud (free long distance phone calls), unauthorized
|
||
access to other computers (whether for profit, fascination, ego, or the
|
||
intellectual challenge), credit card fraud (cash advances and unauthorized
|
||
purchases of goods), and then move on to other destructive activities like
|
||
computer viruses.
|
||
|
||
Some computer abusers form close associations with other people having
|
||
similar interests. Underground groups have been formed for the purpose of
|
||
exchanging information relevant to their criminal activities. These groups
|
||
often communicate with each other through message systems between computers
|
||
called "bulletin boards."
|
||
|
||
Operation Sun Devil was an investigation of potential computer fraud
|
||
conducted over a two-year period with the use of sophisticated
|
||
investigative techniques.
|
||
|
||
This investigation exemplifies the commitment and extensive cooperation
|
||
between federal, state and local law enforcement agencies and private
|
||
governmental industries which have been targeted by computer criminals.
|
||
|
||
While state and local law enforcement agencies successfully investigate and
|
||
prosecute technological crimes in specific geographical locations, federal
|
||
intervention is clearly called for when the nature of these crimes becomes
|
||
interstate and international.
|
||
|
||
(PAGE 1)
|
||
|
||
On May 8, 1990, over 150 Special Agents of the United States Secret
|
||
Service, teamed with numerous local and state law enforcement agencies,
|
||
served over two dozen search warrants in approximately fifteen (15) cities
|
||
across this nation.
|
||
|
||
Several arrests and searches were made during the investigation to protect
|
||
the public from impending dangers. In one situation, computer equipment
|
||
was seized after unauthorized invasion into a hospital computer.
|
||
|
||
Our experience shows that many computer hacker suspects are no longer
|
||
misguide teenagers mischievously playing games with their computers in
|
||
their bedrooms. Some are now high tech computer operators using computers
|
||
to engage in unlawful conduct.
|
||
|
||
The losses to the american public in this case are expected to be
|
||
significant. The Secret Service takes computer crime very seriously, and
|
||
we will continue to investigate aggressively those crimes which threaten
|
||
our nation's businesses and government services.
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.09 / File 5 of 6 ***
|
||
***************************************************************
|
||
|
||
These excerpts from media sources on operation Sun Devil were
|
||
sent by various contributors.
|
||
|
||
*************************************************************************
|
||
Probe Focuses on Entry, Theft by Computers
|
||
(From: CHICAGO TRIBUNE, May 10, 1990: p. I-6)
|
||
|
||
|
||
PHOENIX--An interstate probe of computer invasions has uncovered losses
|
||
that may reach millions of dollars and could be "just the tip of the
|
||
iceberg," federal law enforcement officials said Wednesday.
|
||
|
||
The investigation is focused on illegal entry into computer systems and
|
||
unauthorized use of credit-card numbers and long-distance codes, said Garry
|
||
Jenkins, assistant Secret Service director for investigations.
|
||
|
||
No arrests for computer crime resulted, however, when 27 search warrants
|
||
were served in 12 cities, including Chicago, by 150 Secret Service agents
|
||
and police on Tuesday, officials said.
|
||
|
||
In Chicago, federal agents seized computers and information disks at a
|
||
business and a private home, said Tim McCarthey, chief of the Secret
|
||
Service's criminal enforcement division in Chicago. Nationwide, some 40
|
||
computers and 23,000 disks of computer information were seized.
|
||
|
||
Secret Service officials declined to release an specifics, including the
|
||
number of people targeted, saying the two-year investigation, code-named
|
||
"Operation Sun Devil," is continuing.
|
||
|
||
"The losses that we estimate on this may run to the millions of dollars,"
|
||
said Stephen McNamee, U.S. Atty. for Arizona.
|
||
|
||
Much of the alleged loss stems from unpaid telephone and computer access
|
||
charges, officials said.
|
||
|
||
They said it was possible that computer hackers had obtained goods or cash
|
||
through use of unauthorized credit cards, but could not cite any instance
|
||
of it.
|
||
|
||
In addition to misuse of credit cards and phone lines the hackers are
|
||
believed to have gained access to computers that store medical and
|
||
financial histories, officials said.
|
||
|
||
Under new computer crime laws, the Secret Service has jurisdiction to
|
||
investigate allegations of electronic fraud through the use of access
|
||
devices such as credit-card numbers and long-distance codes.
|
||
|
||
Defendants convicted of unauthorized use of such devices can be sentenced
|
||
up to 10 years in prison if they commit fraud of more than $,100.
|
||
|
||
A similar investigation supervised by federal prosecutors in Chicago has
|
||
resulted in several indictments.
|
||
********************************************************************
|
||
|
||
AT&T NEWS BRIEFS via Consultant's Liason Program
|
||
|
||
Wednesday, May 9, 1990
|
||
|
||
HACKER WHACKER -- The Secret Service is conducting a coast-to-coast
|
||
investigation into the unauthorized use of credit-card numbers and
|
||
long-distance dialing as well as illegal entry into computer systems
|
||
by hackers, according to sources. ... AP ... Authorities fanned out
|
||
with search warrants in fourteen cities Tuesday in an investigation of
|
||
a large nationwide computer hacker operation. Officials of the Secret
|
||
Service, U.S. Attorney's Office and Arizona Attorney General's office
|
||
scheduled a news conference Wednesday to release details of the
|
||
operation.
|
||
|
||
UPI, 5/8 ... A Long Island [NY] teen, caught up in [the investigation],
|
||
dubbed Operation Sun Devil, has been charged ... with computer
|
||
tampering and computer trespass. State Police, who said [Daniel
|
||
Brennan, 17], was apparently trying to set up a surreptitious
|
||
messaging system using the [computer system of a Massachusetts firm]
|
||
and 800 numbers, raided his home Monday along with security officials
|
||
of AT&T. ... [A State Police official] said that in tracing phone
|
||
calls made by Brennan ... AT&T security people found that he was
|
||
regularly calling one of the prime targets of the Sun Devil probe, a
|
||
... hacker who goes by the handle "Acid Phreak." ... New York
|
||
Newsday, p. 31.
|
||
****************************************************************************
|
||
|
||
[from risks 9.90]
|
||
|
||
------------------------------
|
||
|
||
Date: Tue, 8 May 90 09:46:06 -0700
|
||
From: "David G. Novick" <novick@cse.ogi.edu>
|
||
Subject: %Hacker' alters phone services
|
||
|
||
The Spring, 1990, issue of Visions, the Oregon Graduate Institute's
|
||
quarterly magazine, has an interesting article on a man who broke into
|
||
telephone computers, creating the kinds of disruptions that have been
|
||
discussed lately on RISKS. The programmer, named Corey Lindsly, lives
|
||
in Portland, OR. He was eventually arrested and pled guilty to a
|
||
felony count of stealing long-distance phone service.
|
||
Here is an excerpt.
|
||
|
||
--David
|
||
**************************************************************************
|
||
|
||
Confessions of a Computer Hacker
|
||
by Michael Rose
|
||
Visions (Oregon Graduate Institute quarterly magazine)
|
||
Spring, 1990
|
||
|
||
...
|
||
|
||
Perhaps the most disturbing part of Lindsly's adventures was his
|
||
penetration of AT&T Switching Control Center Systems. These sensitive
|
||
computers support long distance telephone service. System
|
||
administrators for 17 of these computers spent over 520 hours mopping
|
||
up Lindsly's damages.
|
||
|
||
According to [AT&T New Jersey manager of corporate security Allen]
|
||
Thompson, Lindsly could have "severely disrupted" the nations's
|
||
telephone service.
|
||
|
||
Lindsly, however, bristles at the suggestion of his doing potentially
|
||
dangerous stunts. Anything beyond harmless pranks is "beneath the
|
||
hacker ethic and uncouth," he says.
|
||
|
||
He does admit to disconnecting phones, changing billing status, and
|
||
adding custom calling features. He also likes to convert residential
|
||
lines to coin class service, so when the unwitting homeowner picked up
|
||
his phone, a recorded voice would tell him to deposit 25 cents.
|
||
|
||
"Swapping people's phone numbers ... now that was great trick," he
|
||
recalls, with obvious amusement. "You would have your next door
|
||
neighbor's number and he would have yours, and people would call you
|
||
and and ask for your neighbor, and vice versa, and everyone's getting
|
||
totally confused."
|
||
|
||
--------------------------------------------------------------------------
|
||
|
||
RISKS-LIST: RISKS-FORUM Digest Sunday 13 May 1990 Volume 9 : Issue 91
|
||
|
||
FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
|
||
ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
|
||
|
||
Contents:
|
||
"Feds Pull Plug On Hackers" (James K. Huggins)
|
||
<...other articles removed...>
|
||
--rjc
|
||
|
||
------------------------------
|
||
|
||
Date: Fri, 11 May 90 12:26:08 -0400
|
||
From: James K. Huggins <huggins@dip.eecs.umich.edu>
|
||
Subject: "Feds Pull Plug On Hackers": Newspaper Article
|
||
|
||
>EXCERPTED From The Detroit News, Thursday, May 10, 1990, Section B, p.1:
|
||
|
||
FEDS PULL PLUG ON HACKERS
|
||
Computer-fraud raid hits two homes in Michigan
|
||
|
||
By Joel J. Smith, Detroit News Staff Writer
|
||
|
||
Secret Service agents got a big surprise when they raided a Jackson-area
|
||
home as part of an investigation of a nationwide computer credit card and
|
||
telephone fraud scheme. They found a manual that details how almost
|
||
anybody can use a computer to steal. It also describes how to avoid
|
||
detection by federal agents. On Wednesday, James G. Huse, Jr., special
|
||
agent in charge of the Secret Service office in Detroit, said the manual
|
||
was discovered when his agents and Michigan State Police detectives broke
|
||
into a home in Clark Lake, near Jackson, on Tuesday. Agents, who also
|
||
raided a home in Temperance, Mich., near the Ohio border, confiscated
|
||
thousands of dollars in computer equipment suspected of being used by
|
||
computer buffs -- known as hackers -- in the scheme.
|
||
|
||
The raids were part of a national computer fraud investigation called
|
||
Operation Sundevil in which 150 agents simultaneously executed 28 search
|
||
warrants in 16 U.S. cities. Forty-two computer systems and 23,000 computer
|
||
disks were seized across the country. The nationwide network reportedly
|
||
has bilked phone companies of $50 million. Huse said the Secret Service
|
||
has evidence that computers in both of the Michigan homes were used to
|
||
obtain merchandise with illegally obtained credit card numbers. He said
|
||
long-distance telephone calls from the homes also were billed to
|
||
unsuspecting third parties.
|
||
|
||
There were no arrests, because it was not known exactly who was using the
|
||
computers at the homes. Huse also said there was no evidence that the
|
||
suspects were working together. Rather, they probably were sharing
|
||
information someone had put into a national computer "bulletin board".
|
||
|
||
*****************************************************************************
|
||
"Computer Hacker Ring with a Bay Area Link"
|
||
(From: San Francisco Chronical, May 9, 1990: A-30)
|
||
|
||
The Secret Service yesterday searched as many as 29 locations in 13 cities,
|
||
including the family home of an 18-year-old San Jose State University
|
||
student, in an investigation of alleged fraud by computer hackers, law
|
||
enforcement sources said.
|
||
|
||
The 6 a.m. search on Balderstone Drive in San Jose sought computer
|
||
equipment allegedly used to "deal in pirate software and electronic fraud,"
|
||
San Jose police Seargeant Richard Saito said in a prepared statement.
|
||
|
||
The nationwide investigation, code-named "Operation Sun Devil," concerns
|
||
the unauthorized use of credit card numbers and long-distance dialing codes
|
||
as well as illegal entry into computer systems by hackers, said sources.
|
||
|
||
Saito said the probe centered on the "Billionaire Boys Cub computer
|
||
bulletin board" based in Phoenix. A press conference on the probe is
|
||
scheduled today in Phoenix.
|
||
|
||
The investigation in Phoenix is also focusing on incidents in which
|
||
copmputer hackers allegedly changed computerized records at hospitals and
|
||
police 911-emergency lines, according to one source.
|
||
|
||
The San Jose suspect was identified as Frank Fazzio Jr., whom neighors said
|
||
was a graduate of Pioneer High School and lives at home with his younger
|
||
sister and parents. Neither he nor his family could be reached for comment.
|
||
|
||
"I've never thought him capable of that sort of thing," said one neighbor
|
||
in the block-long stret located in the Almaden Valley section of south San
|
||
Jose.
|
||
|
||
Warrants were obtained by the Secret Service to conduct the search in San
|
||
Jose, as well as in Chicago; Cincinnati; Detroit; Los Angeles; Miami;
|
||
Newark, N.J.; New York City; Pittsburgh; Richmond, Va.; Plano Texas; and
|
||
San Diego.
|
||
|
||
Under new computer crime laws, the Secret Service has jurisdiction to
|
||
investigate allegations of electronic fraud through the use of access
|
||
devices such as credit card numbers and codes that long-distance companies
|
||
issue to indivdual callers. Defendants convicted of unauthorized use of
|
||
such "access devaices" can be sentenced to 10 years in prison if they
|
||
commit fraud of more than $1,000.
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|
||
***************************************************************
|
||
*** Computer Underground Digest Issue #1.09 / File 6 of 6 ***
|
||
***************************************************************
|
||
|
||
|
||
In CuD 1.05 I discussed the Software Publisher's Association (SPA)
|
||
toll-free piracy hot line and the less than informative response my call
|
||
recieved. As an addendum here is some information culled from "PC
|
||
Computing" March 1990, Page 80.
|
||
|
||
Software Manufacturers Tempt Illegal Users to Change Their Evil Ways
|
||
|
||
This brief article, written by Christine Triano, discusses "amnesty"
|
||
programs offered by XTree, XyQuest, and Unison World where users could
|
||
"register" pirated copies of XTree Pro, Xywrite, and Printmaster Plus
|
||
(respectively) and recieve legitimate versions at a reduced cost. XTree
|
||
reports that 5000 people took them up on their SAFE (Software Amnesty Fore
|
||
Everyone) offer, but the other companies have so far declined to comment on
|
||
the success of thier programs.
|
||
|
||
Also discussed is the SPA's auditing process where the SPA asks companies
|
||
that are suspected of being users of pirated warez to let the Association
|
||
examine hard drives and software purchase records, in return for strict
|
||
confidentiality of the outcome. The corporation then purchases legitimate
|
||
copies of all the pirated programs found, and "contributes" an equal amount
|
||
to the SPA's Copyright Protection Fund. Thus the software gets purchased,
|
||
the SPA's coffers are lined, and the corporation stays out of court. To
|
||
date "more than half a dozen" audits have been conducted.
|
||
|
||
The article concludes with a short paragraph concerning the toll-free
|
||
piracy hotline:
|
||
"The SPA has also set up a toll-free piracy hot line (800-388-PIR8).
|
||
According to SPA director Ken Wasch, the hot line receives 15 serious calls
|
||
a week. Who finks? The majority of callers are unhappy or former employees
|
||
serving up their own version of just desserts."
|
||
|
||
|
||
|
||
Final Note: Perhaps the "Ken" I spoke to at the SPA is Ken Wasch, the
|
||
director of the organization. If so, I wonder if he considered my call
|
||
about a pirate BBS to be "serious"?
|
||
|
||
GRM
|
||
Internet: 72307.1502@Compuserve.com
|
||
|
||
|
||
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
|
||
+ END THIS FILE +
|
||
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=
|
||
|
||
|