home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_1
/
CUD109E.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
12KB
|
260 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.09 (May 16, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
***************************************************************
*** Computer Underground Digest Issue #1.09 / File 5 of 6 ***
***************************************************************
These excerpts from media sources on operation Sun Devil were
sent by various contributors.
*************************************************************************
Probe Focuses on Entry, Theft by Computers
(From: CHICAGO TRIBUNE, May 10, 1990: p. I-6)
PHOENIX--An interstate probe of computer invasions has uncovered losses
that may reach millions of dollars and could be "just the tip of the
iceberg," federal law enforcement officials said Wednesday.
The investigation is focused on illegal entry into computer systems and
unauthorized use of credit-card numbers and long-distance codes, said Garry
Jenkins, assistant Secret Service director for investigations.
No arrests for computer crime resulted, however, when 27 search warrants
were served in 12 cities, including Chicago, by 150 Secret Service agents
and police on Tuesday, officials said.
In Chicago, federal agents seized computers and information disks at a
business and a private home, said Tim McCarthey, chief of the Secret
Service's criminal enforcement division in Chicago. Nationwide, some 40
computers and 23,000 disks of computer information were seized.
Secret Service officials declined to release an specifics, including the
number of people targeted, saying the two-year investigation, code-named
"Operation Sun Devil," is continuing.
"The losses that we estimate on this may run to the millions of dollars,"
said Stephen McNamee, U.S. Atty. for Arizona.
Much of the alleged loss stems from unpaid telephone and computer access
charges, officials said.
They said it was possible that computer hackers had obtained goods or cash
through use of unauthorized credit cards, but could not cite any instance
of it.
In addition to misuse of credit cards and phone lines the hackers are
believed to have gained access to computers that store medical and
financial histories, officials said.
Under new computer crime laws, the Secret Service has jurisdiction to
investigate allegations of electronic fraud through the use of access
devices such as credit-card numbers and long-distance codes.
Defendants convicted of unauthorized use of such devices can be sentenced
up to 10 years in prison if they commit fraud of more than $,100.
A similar investigation supervised by federal prosecutors in Chicago has
resulted in several indictments.
********************************************************************
AT&T NEWS BRIEFS via Consultant's Liason Program
Wednesday, May 9, 1990
HACKER WHACKER -- The Secret Service is conducting a coast-to-coast
investigation into the unauthorized use of credit-card numbers and
long-distance dialing as well as illegal entry into computer systems
by hackers, according to sources. ... AP ... Authorities fanned out
with search warrants in fourteen cities Tuesday in an investigation of
a large nationwide computer hacker operation. Officials of the Secret
Service, U.S. Attorney's Office and Arizona Attorney General's office
scheduled a news conference Wednesday to release details of the
operation.
UPI, 5/8 ... A Long Island [NY] teen, caught up in [the investigation],
dubbed Operation Sun Devil, has been charged ... with computer
tampering and computer trespass. State Police, who said [Daniel
Brennan, 17], was apparently trying to set up a surreptitious
messaging system using the [computer system of a Massachusetts firm]
and 800 numbers, raided his home Monday along with security officials
of AT&T. ... [A State Police official] said that in tracing phone
calls made by Brennan ... AT&T security people found that he was
regularly calling one of the prime targets of the Sun Devil probe, a
... hacker who goes by the handle "Acid Phreak." ... New York
Newsday, p. 31.
****************************************************************************
[from risks 9.90]
------------------------------
Date: Tue, 8 May 90 09:46:06 -0700
From: "David G. Novick" <novick@cse.ogi.edu>
Subject: %Hacker' alters phone services
The Spring, 1990, issue of Visions, the Oregon Graduate Institute's
quarterly magazine, has an interesting article on a man who broke into
telephone computers, creating the kinds of disruptions that have been
discussed lately on RISKS. The programmer, named Corey Lindsly, lives
in Portland, OR. He was eventually arrested and pled guilty to a
felony count of stealing long-distance phone service.
Here is an excerpt.
--David
**************************************************************************
Confessions of a Computer Hacker
by Michael Rose
Visions (Oregon Graduate Institute quarterly magazine)
Spring, 1990
...
Perhaps the most disturbing part of Lindsly's adventures was his
penetration of AT&T Switching Control Center Systems. These sensitive
computers support long distance telephone service. System
administrators for 17 of these computers spent over 520 hours mopping
up Lindsly's damages.
According to [AT&T New Jersey manager of corporate security Allen]
Thompson, Lindsly could have "severely disrupted" the nations's
telephone service.
Lindsly, however, bristles at the suggestion of his doing potentially
dangerous stunts. Anything beyond harmless pranks is "beneath the
hacker ethic and uncouth," he says.
He does admit to disconnecting phones, changing billing status, and
adding custom calling features. He also likes to convert residential
lines to coin class service, so when the unwitting homeowner picked up
his phone, a recorded voice would tell him to deposit 25 cents.
"Swapping people's phone numbers ... now that was great trick," he
recalls, with obvious amusement. "You would have your next door
neighbor's number and he would have yours, and people would call you
and and ask for your neighbor, and vice versa, and everyone's getting
totally confused."
--------------------------------------------------------------------------
RISKS-LIST: RISKS-FORUM Digest Sunday 13 May 1990 Volume 9 : Issue 91
FORUM ON RISKS TO THE PUBLIC IN COMPUTERS AND RELATED SYSTEMS
ACM Committee on Computers and Public Policy, Peter G. Neumann, moderator
Contents:
"Feds Pull Plug On Hackers" (James K. Huggins)
<...other articles removed...>
--rjc
------------------------------
Date: Fri, 11 May 90 12:26:08 -0400
From: James K. Huggins <huggins@dip.eecs.umich.edu>
Subject: "Feds Pull Plug On Hackers": Newspaper Article
>EXCERPTED From The Detroit News, Thursday, May 10, 1990, Section B, p.1:
FEDS PULL PLUG ON HACKERS
Computer-fraud raid hits two homes in Michigan
By Joel J. Smith, Detroit News Staff Writer
Secret Service agents got a big surprise when they raided a Jackson-area
home as part of an investigation of a nationwide computer credit card and
telephone fraud scheme. They found a manual that details how almost
anybody can use a computer to steal. It al