183 lines
12 KiB
Plaintext
183 lines
12 KiB
Plaintext
File: IS THERE COMPUTER CRIME?
|
||
Read 25 times
|
||
|
||
IS THERE COMPUTER CRIME, AND WHAT ARE THE RESULTS?
|
||
|
||
{complete with obligatory Donn B. Parker quotes}
|
||
|
||
Have you ever received one of those computer generated letters with your name
|
||
and address in various parts? Well, in these times you should know that
|
||
computers are starting to mold our thinking to computers. It used to be "I
|
||
forgot to turn the TV off" , but instead now it's "I forgot to turn the
|
||
computer off". Homes are now being literally invaded by computers. But what
|
||
happens when people realize that you can use computers for things that are
|
||
illegal? The results are sometimes very unpredictable. The name is Computer
|
||
Crime.
|
||
|
||
Just what is meant by Computer Crime? Donn B. Parker of SRI in Menlo Park,
|
||
CA., as a Computer Security Expert,says that Computer Crime is a very broad
|
||
subject. When you think about it, there are many facets that people do not
|
||
think about. As a computer security expert his job is to make sure that
|
||
information does not go to people that don't deserve it, who are known as phone
|
||
or computer phreaks. This is something that he enjoys, and he tries to thwart
|
||
the efforts of the phreaks. Sometimes he thinks it's getting out of hand. In
|
||
conclusion Mr. Parker states that you can define a computer Criminal as any
|
||
person owning the equipment to be able to commit a computer crime, and the
|
||
crime being anything not due or normal to you gained by computer. Thomas
|
||
Whiteside, another authority on Computer Crime,comments that people tend to
|
||
generalize computer crime. Visions of "Master Control" programs written to
|
||
take over the world, or put millions into Swiss bank accounts, run through
|
||
their head. This is very wrong. It's mainly kids from 12 to 24 years old that
|
||
commit these "Crimes". Of course that is just a general group. There are some
|
||
that are as young as 10 and some as old as 80! Most of them aren't out to hurt
|
||
anyone. They just want to have some fun. Mr. Whiteside also says that a very
|
||
simple definition of computer crime is when you use a computer for either
|
||
personal or other gains while you are breaking the law. The public, when asked
|
||
generally, defines it as just using a computer to steal money or plans to
|
||
H-Bombs, or something like that. This is what the media generally leads them
|
||
to believe. Computer Crime is something that provides an intellectual
|
||
challenge. It is a form of breaking and entering where you don't even have to
|
||
leave your chair, and the penalties are very high. The legal definition is a
|
||
long one, but the main point of it is using a computer to get into information
|
||
that is not supposed to be seen by you. They also have some names that they
|
||
give certain offenses. Conversion is when you use someone elses password or
|
||
code.
|
||
|
||
In interviews with four well known computer criminals, you can see their
|
||
thoughts and their side to the story. Susan Thunder (Not her real name) is a
|
||
native Californian, and the first person I spoke to. She is 24, and talks just
|
||
like a regular "Valley Girl". Susan got into phreaking when she was dating a
|
||
guy who had a computer and was into it too. She learned so much that she
|
||
eventually passed the guy in the amount of knowledge. She met with 2 others
|
||
that had the same dream as all other phreaks. They were going to fool the
|
||
computers at Southern Pacific Telephone to stop working for 24 hours on a
|
||
specific date. The job was interrupted by the police. Susan said that, "What
|
||
I do is an art. Some people paint, I 'phreak'. It's fun and I like it. I
|
||
would never stop, even when I get caught...Again." As it seems, just as any age
|
||
group can do it, so can any IQ. "I have the same IQ as you, Tuc , Upper 2%.
|
||
Most of the phreaks are. We have the ability to join Mensa, but stuffed shirts
|
||
don't suit us. Right?", she stated. And it's true, alot of the good ones are
|
||
in the upper 2%, but then again, alot aren't. She, too, realizes that the
|
||
press always is harsh on us. "Tuc , you read that article on me, right? The
|
||
media blows us way out of proportion. They said I was a call girl and that I
|
||
'loved' the information out of people. You know that that isn't true." And I
|
||
know it isn't. Susan had one last thing to say and it was about the
|
||
government. "The government is so stupid. They make it so easy. A little
|
||
work and any computer is under your control. It's just totally awesome how
|
||
stupid they are".
|
||
|
||
The next person that I interviewed was Milo Phonbil (My Low Phone Bill. Of
|
||
course it's not a real name.) Milo is a New Yorker and is known to be going to
|
||
Pace University. He is a senior there. Milo states that he got into it for a
|
||
few reasons. The most important one is the fact that he is in college and that
|
||
the money situation is tight. Doing what he does allows him to save alot of
|
||
money. His parents like it too. Since he is popular and must talk to people
|
||
all over the country, like to Susan, a 45 minute call to her at night in
|
||
California is free! He just goes in and changes the computer to tell it that
|
||
the call never happened. And the phone company doesn't even figure it out.
|
||
They should know better than that! How can someone constantly be on the
|
||
telephone and only pay $25 a month! Milo argues that what he does is very
|
||
respectable. They are not really outlaws, and they do a service by pointing
|
||
out the weakness in computers to the owners. Milo concludes that the comradery
|
||
is fantastic. The 'ol saying, "Ask and you shall receive", is very true. Just
|
||
ask for information, and you get it!
|
||
|
||
Tom Tone is another New Yorker that I talked to. Tom is a little more
|
||
cautious about his cover, and therefore there is not that much information on
|
||
him. In fact, I was to call at a phone booth. Tom is out for revenge on the
|
||
phone company it seems. He especially hates "Ma Bell" because of the prices of
|
||
phone calls. "We try to do it so it becomes a little cheaper. I see nothing
|
||
wrong with that." Tom says that all the stuff with computers keeps him home.
|
||
He could be out stealing cars or smoking dope, but he stays home and uses the
|
||
computer. Tom is one of the few that is into all aspects of computers. I
|
||
later learned that he was talking to me through a voice mixer. It sounded like
|
||
a normal voice.
|
||
|
||
The last person I talked to was a fellow that goes by the name of J.D.
|
||
Jenero. When asked about his age , he replied "I'm older than 1, and younger
|
||
than G-d. (Not that much though)". J.D. said he didn't really start out to
|
||
do any of the computer phreaking. "I really didn't mean to get into it. It
|
||
was really forced on me. I owned a legal SPRINT account, but the bill was
|
||
still too high. Fortunately some of the bigger phreaks pushed me into it, and
|
||
I haven't stopped since!" J.D., too, admits that phreaks must stick together.
|
||
"There is a close bond between phreaks. The amazing thing is that there are
|
||
alot of female phreaks. The guys don't mind, and the girls usually have alot
|
||
of people wanting to talk to them. Some have even gotten married to other
|
||
phreaks". Lastly J.D. admits that everyone sooner or later comes down with
|
||
the "I'm God, and the best" theory. "It's amazing. Everyone has an ego, and
|
||
once it's shattered you might as well hang it up. Everyone thinks that they
|
||
are the best, but you've got to admit that to survive you gotta be good. Thats
|
||
why I survive." During my interviews I, too, learned alot about the people.
|
||
They are sometimes a wierd group, but they are smart. They really don't want
|
||
to hurt anyone, just have fun and be able to say ;"I can get into places others
|
||
can't."
|
||
|
||
The equipment used in Computer Crime is generally quite inexpensive. The
|
||
cheapest price that you can get started with is about $270 for a VIC-20 by
|
||
Commodore and a VICMODEM. The ATARI 800 can be bought for a little over
|
||
$500.00. Now they even make hand-held portable units for $450.00. That means
|
||
that no matter where you are you can use it and do what you need to. And how
|
||
available is this equipment? Well, as you can probably tell by the names of
|
||
the companies making it, almost anywhere! Child World or Toys 'R' Us is a good
|
||
place, and they do have the best prices. And the ease of learning is
|
||
incredible. Once a person calls a place that has the information, they usually
|
||
can learn to use it very quickly. One person I know bought his computer on a
|
||
Friday, and 2 weeks later he was into a NASA computer! The resources to get
|
||
the information are also varied. There are people that set up their computer
|
||
to let people call them 24 hours a day, 7 days a week. I tested one of these
|
||
systems and was able to get 35 Sprint codes, 10 MCI codes, eight 800 numbers
|
||
that let me dial anywhere TOTALLY free, and 2 computers that I could access.
|
||
All this information was seen in a 15 minute phone call! There are even
|
||
published books on phone numbers and places to call. One of the most famous is
|
||
TAP. It originates out of New York, and is published whenever someone is out
|
||
of jail and not hunted. There are even large clubs that show its members how
|
||
to use the computers illegally. They even hold forums to show anyone that
|
||
comes how to break into the latest computer, etc. The methods that are mainly
|
||
used are easy once a person thinks about them. One of the easiest methods to
|
||
use is the slicing method. This is where you take the odd cents off interest
|
||
accounts, and have it put into the last account. (Zywana was a sample given.)
|
||
Then you can take it out a little at a time by just writing checks, or getting
|
||
the computer to send checks. The internal method is a tricky one. The object
|
||
here is to be part of the company that has the information that you want. Then
|
||
you can get it easily. There are some people that all they do is try to get
|
||
jobs in those companies, find the information, and quit. The "Friendly" method
|
||
is so named where you get friendly with someone that has all the information
|
||
and get it from them. (Some of the females have been known to do this).
|
||
Lastly, the results of various computer crimes are varied. In a study made by
|
||
Donn B. Parker, our computer security expert at SRI, he states that the
|
||
average "take" was $430,000. Not bad for 1 day, huh? If one report is to be
|
||
believed, even a relentlessly optimistic an orginization as the Girl Scouts
|
||
aren't immune to resentment in the computer room. A disgruntled employee at
|
||
the Girl Scout Headquarters in NY expressed her feelings by erasing the
|
||
information on 7 reels of tape in the room. Betcha she felt good about it!
|
||
TRW is also one of the most tampered with services. Every day hundreds of
|
||
people break into the system. Some later start phony accounts and increase
|
||
their credit ratings. This can entitle them to things that regularly wouldn't
|
||
have been. In the department of getting caught, it is usually done in the
|
||
middle of the night. A knock on the front door by the FBI (Yes, alot of the
|
||
offenses can be considered federal crimes), is enough to scare anyone. Of the
|
||
people I interviewed, only Susan had such an experience. You always know there
|
||
is the risk, but it becomes ever so sharp when it happens to you. And when you
|
||
are caught, you don't just spend a night in jail. Most of the time it is quite
|
||
a few years in a State Penitentiary. Some friends of Susan's are doing 15-20
|
||
years and Milo knows a guy doing 5. The stakes are high when you get caught to
|
||
say the least.
|
||
|
||
So, as you can see, there are alot of good and bad points to computer Crime.
|
||
You have heard testimonies from both sides of the fence. I feel that computers
|
||
are not taking over the world. I think that they are making it a better place
|
||
to live. If it wasn't for some computers there wouldn't be alot of things we
|
||
take for granted. Even things we don't think are computers are. Pacemakers
|
||
can be considered computers. They must calculate heart beats and control them.
|
||
As for computer security, nothing is ever secure. If the government has
|
||
something to hide, then the entire population has something to fear. Now the
|
||
world will truly think that there is a problem with the new movie WAR GAMES,
|
||
where a student gets into a government computer and thinks he's playing a game.
|
||
But, unbeknown to him, he is in the actual defense computer. The results,
|
||
disasterous!
|
||
|
||
[Courtesy of Sherwood Forest ][ -- (914) 359-1517]
|
||
|
||
-----End of File
|
||
Call The Works BBS - 1600+ Textfiles! - [914]/238-8195 - 300/1200 - Always Open
|
||
|