home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hackers Underworld 2: Forbidden Knowledge
/
Hackers Underworld 2: Forbidden Knowledge.iso
/
UNDERGRD
/
VOL_1
/
CUD111C.TXT
< prev
next >
Wrap
Text File
|
1994-11-01
|
14KB
|
260 lines
****************************************************************************
>C O M P U T E R U N D E R G R O U N D<
>D I G E S T<
*** Volume 1, Issue #1.11 (May 29, 1990) **
****************************************************************************
MODERATORS: Jim Thomas / Gordon Meyer
REPLY TO: TK0JUT2@NIU.bitnet
COMPUTER UNDERGROUND DIGEST is an open forum dedicated to sharing
information among computerists and to the presentation and debate of
diverse views.
--------------------------------------------------------------------
DISCLAIMER: The views represented herein do not necessarily represent the
views of the moderators. Contributors assume all responsibility
for assuring that articles submitted do not violate copyright
protections.
--------------------------------------------------------------------
***************************************************************
*** Computer Underground Digest Issue #1.11 / File 3 of 4 ***
***************************************************************
Date: Thu, 25 May 90 21:15:01 cdt
From: rampac@ecoville..edu(Rambo Pacifist)
To: tk0jut2%niu.bitnet@uicvm.uic.edu
Subject: Stings and such
BEWARE OF STINGS: Law enforcement may be using stings, so be suspicious of
new boards that seem too good to be true or that are run by sysops without
references or a history of participation elsewhere. Here's a couple of
things I thought readers might be interested in.
I've stuck a few comments in parentheses and following each article.
+*++*++*++*++*++*++*++*++*++*++*++*+
From: DEDICATED COMPUTER CRIME UNITS, by J. Thomas McEwen. Washington:
U.S. Department of Justice. Appendix A, pp. 101-103, "Sting Operations."
+*++*++*++*++*++*++*++*++*++*++*++*+
While most bulletin boards have been established for legitimate purposes,
there are also "pirate" or "elite" boards that contain illegal information
or have been established to advance an illegal activity. Security on these
boards is tightly controlled by the owners. With these bulletin boards,
users usually have to contact the owner directly to obtain a password for
access to different levels of the system. A degree of trust must therefore
be established before the owner will allow access to the board, and the
owners develop "power" over who can use the system.
(Comment: Gosh, never knew I was doing all this back when I was doing
sysop! If I could only remember what I did with all that power! Guess the
guy who wrote this hasn't been on a board since the original RBBS.)
Pirate boards have been found with a variety of illegal information on
them including the following:
*Stolen credit card account numbers
*Long distance telephone service codes
*Telephone numbers to mainframe computers, including passwords
and account numbers
*Procedures for making illegal drugs
*Procedures for making car bombs
*Hacking programs
*Tips on how to break into computer systems
*Schematics for electronic boxes (e.g., black box)
(Comment: What's with this shit about "pirate boards?" If these guys can't
tell the diff between our boards, what makes them think they can figure out
what goes on there? Who do they think they're kidding? Anybody ever seen
codez posted on an elite pirate board? You can also find illegal
information in letters in the post office, on short wave bands, and in
libraries. Does that mean that these places should be shut down too?)
These boards obviously are a threat to communities, and their existence has
gained the attention of some police departments.
STING OPERATIONS WITH BULLETIN BOARDS
The experiences of the Maricopa County, Arizona, Sheriff's department and
the Fremont, California, Police Department are very instructive on how
local departments can establish their own bulletin boards and become part
of the network with other boards. Members of the Maricopa County Sheriff's
Department were the first in the country to establish such a board. Their
board resulted in over 50 arrests with the usual charge being
telecommunications fraud.
(Comment: Would this be entrapment? Think about it: Setting up a board to
entice people to commit legal acts! And they call US unethical?)
In September, 1985, the Fremont Police Department established a bulletin
board for the primary purpose of gathering intelligence on hackers and
phreakers in the area. The operation was partially funded by VISA, Inc.,
with additional support from Wells Fargo Bank, Western Union, Sprint, MCI,
and ITT.
After establishing their bulletin board, they advertised it on other boards
as the newest "phreak board" in the area. Within the first four days, over
300 calls were received onthe board. During the next three months, the
board logged over 2,500 calls from 130 regular users. Through the bulletin
board, they persuaded these groups that they had stolen or hacked
long-distance telephone service codes and credit card account numbers. They
were readily accepted and were allowed access to pirate boards in the area.
The board was operated for a total of three months. During that period,
over 300 stolen credit card account numbers and long-distance telephone
service codes were recovered. Passwords to many government, educational,
and corporate computers were also discovered on other boards.
The operation resulted in the apprehension of eight teenage in the area who
were charged with trafficking in stolen credit card acconts, trafficking in
stolen long-distance telephone service codes, and possession of stolen
property. Within the next week, seven more teenagers in California and
other states were arrrested based on information from this operation.
It was estimated that this group had been illegally accessing between ten
and fifteen businesses and institutions in California. They were regularly
bypassing the security of these systems with stolen phone numbers and
access codes. One victim company estimated that it intended to spend
$10,000 to improve its security and data integrity procedures. Other
victimized businesses were proceeding along the same lines.
-->End of Article<--
********************************************************************
We can't let this stuff pass without comment. Consider this:
1. They guy who wrote it doesn't know the difference between a pirate board
and other kinds of boards. This is supposed to be an authoritative study?
By calling any board he doesn't like a PIRATE board means that he's just
assumed that pirates steal codez. Even the phedz ought to know better,
especially if they've been investigating. Even the lamest of BBSers know
that you hardly ever find codez on a real pirate board. This kind of
ignorance is scary!
2. The list of stuff found on p/h boards may include all the stuff McEwen
sees. But, except for carding, the rest of the stuff is rarely illegal.
Possession of information is still a right, and it's generally not illegal
to explain how to hack or run numbers. Even info on making drugs or bombs
is not illegal. It's only illegal if you *DO IT!*
3. Claiming that these boards are "obviously a threat to communities"
REALLY SUCK! How many hackers have bombed buildings? Have sold drugs made
from info of a BBS? By making this claims, the police can start coming down
on any board they don't like, just because some lamer said they're
"dangerous." Sounds like the beginning of a police state.
4. How nice that a bunch of banks funded some stings. Hey, don't they have
computers of their own they can set up? How much money does it take to set
up a board? Sounds like those cops had a scam of their own going!
5. Setting up stings may not be legal entrapment (but it could be in some
instances). In rare cases, a sting might be justified if something serious
is going on. But to set up a board and collect info on users is a dangerous
breach of privacy. Even on the best elite boards I've been on, only a
fraction of the total users ar