home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Secret Subjects
/
Secret Subjects.iso
/
undergrd
/
vol_1
/
cud109d.txt
< prev
next >
Wrap
Text File
|
1994-11-01
|
5KB
|
96 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.09 (May 16, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
***************************************************************
*** Computer Underground Digest Issue #1.09 / File 4 of 6 ***
***************************************************************
Assistant Director Garry M. Jenkins' Prepared Remarks
Operation Sun Devil
Today, the Secret Service is sending a clear message to those computer
hackers who have decided to violate the laws of this nation in the mistaken
belief that they can successfully avoid detection by hiding behind the
relative anonymity of their computer terminals.
In 1984, Congress enacted the Comprehensive Crime Control Act which
prohibits, among other things, credit card fraud and computer fraud. Since
1984, the Secret Service has been aggressively enforcing these laws and has
made over 9,000 arrests nationwide.
Recently we have witnessed an alarming number of young people who, for a
variety of sociological and psychological reasons, have become attached to
their computers and are exploiting thier potential in a criminal manner.
Often, a progression of criminal activity occurs which involves
telecommunications fraud (free long distance phone calls), unauthorized
access to other computers (whether for profit, fascination, ego, or the
intellectual challenge), credit card fraud (cash advances and unauthorized
purchases of goods), and then move on to other destructive activities like
computer viruses.
Some computer abusers form close associations with other people having
similar interests. Underground groups have been formed for the purpose of
exchanging information relevant to their criminal activities. These groups
often communicate with each other through message systems between computers
called "bulletin boards."
Operation Sun Devil was an investigation of potential computer fraud
conducted over a two-year period with the use of sophisticated
investigative techniques.
This investigation exemplifies the commitment and extensive cooperation
between federal, state and local law enforcement agencies and private
governmental industries which have been targeted by computer criminals.
While state and local law enforcement agencies successfully investigate and
prosecute technological crimes in specific geographical locations, federal
intervention is clearly called for when the nature of these crimes becomes
interstate and international.
(PAGE 1)
On May 8, 1990, over 150 Special Agents of the United States Secret
Service, teamed with numerous local and state law enforcement agencies,
served over two dozen search warrants in approximately fifteen (15) cities
across this nation.
Several arrests and searches were made during the investigation to protect
the public from impending dangers. In one situation, computer equipment
was seized after unauthorized invasion into a hospital computer.
Our experience shows that many computer hacker suspects are no longer
misguide teenagers mischievously playing games with their computers in
their bedrooms. Some are now high tech computer operators using computers
to engage in unlawful conduct.
The losses to the american public in this case are expected to be
significant. The Secret Service takes computer crime very seriously, and
we will continue to investigate aggressively those crimes which threaten
our nation's businesses and government services.
=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+
+ END THIS FILE +
+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+===+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=+=