SUNDEVIL, Komputer, More Hacking
[ Pobierz całość w formacie PDF ]
{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{} {}{} ** PUSH BUTTON FELONIES ** {}{} {}{} KPFA-FM RADIO BROADCAST JULY 26, 1990 AT 12:00 NOON {}{} {}{} ELECTRONIC TEXT -- PUBLIC INFORMATION FILE {}{} {}{} ** SPECIAL EDITION ** {}{} from {}{} THE EPIC PROJECT {}{} a nonprofit public electronic publishing corporation {}{} {}{} {}{} P.O. Box 5080-341 Electronic Netmail Address {}{} Fairfield, Ca. 94533 jefrich@well.sf.ca.us {}{} Jeff Aldrich, Contact: Voice: (707)425-6813 {}{} Data: (707)429-1545 Fax: (707)425-9811 {}{} {}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}NOTICEThis text file contains copies of press releases by governmentagencies, citizen action organizations, and transcripts of events receivedby The EPIC Project. They example both the personal information power oftelecommunication technology and the current threat to our basic civilliberties -- our rights to privacy and to protection against unwarrantedsearches and seizures. Panelists on the KPFA-FM "Push Button Felonies"broadcast are responsible for some of these documents. This electronic textinformation is provided to KPFA listeners by The EPIC Project to increaseunderstanding of the issues discussed in this broadcast. The EPICProject makes no warranty as to document accuracy, expressed or implied.==========================================================================KPFA-FM Studio Panelists:Assistant Arizona Attorney General Gail Thackery.Marc Rotenberg of Computer Professionals for Social ResponsibilityA Telecommunication Industry Service Provider RepresentativeKPFA-FM Telephone Panelist:Jeff Aldrich, Founder of The EPIC Project Electronic Publishing Corp.===========================================================================CONTENTSLine 75: Operation Sun Devil: Press ReleaseLine 162: Operation Sun Devil: Secret Service StatementLine 230: News Excerpts about Operation Sun DevilSource: Computer Underground Digest Issue #1.09Line 393: Letter from the Director of the Secret Service to Rep. Don EdwardsLine 692: CPSR FOIA Request to the FBI Regarding BBS SurveillanceLine 804: CPSR letter to Congressman Don Edwards regarding FOIA requestLine 901: Chronology of eventsSource: Computer Professionals for Social Responsibility (CPSR)Line 1048: Sun Devil gives birth to the Electronic Frontier FoundationLine 1141: Electronic Frontier Foundation: Mission StatementLine 1190: Electronic Frontier Article by John Perry Barlow and Mitchell KaporLine 1374: CPSR Expands Civil Liberties ProgramLine 1464: EFF Supported Legal Case SummaryLine 1801: The Electronic Frontier and The Bill of RightsSource: Electronic Frontier Foundation (EFF)Line 2036: U.S. Attorney Visits The EPIC Project Online After July 5thKPFA Electronic Citizen Broadcast: A Sysop Chat with the FedsSource: The EPIC ProjectNOTE: Line numbers are approximate****************************************************************************************************************************************U.S. Department of JusticeUnited States AttorneyDistrict of Arizona4000 United States CourthousePhoenix, Arizona 82505602-379-3011 /FTS/261-3011PRESS RELEASEFOR IMMEDIATE RELEASE: CONTACT: Wendy HarnagelWednesday, May 9, 1990 United States Attorney's Office(602) 379-3011PHOENIX--Stephen M. McNamee, United States Attorney for the District ofArizona, Robert K. Corbin, Attorney General for the state of Arizona, andHenry R. Potosky, Acting Special Agent in Charge of the United StatesSecret Service Office in Phoenix, today announced that approximatelytwenty-seven search warrants were executed on Monday and Tuesday, May 7 and8, 1990, in various cities across the nation by 150 Secret Service agentsalong with state and local law enforcement officials. The warrants wereissued as a part of Operation Sundevil, which was a two year investigationinto alleged illegal computer hacking activities.The United States Secret Service, in cooperation with the United StatesAttorney's Office, and the Attorney General for the State of Arizona,established an operation utilizing sophisticated investigative techniques,targeting computer hackers who were alleged to have trafficked in and abusestolen credit card numbers, unauthorized long distance dialing codes, andwho conduct unauthorized access and damage to computers. While the totalamount of losses cannot be calculated at this time, it is(MORE)estimated that the losses may run into the millions of dollars. Forexample, the unauthorized accessing of long distance telephone cards haveresulted in uncollectible charges. The same is true of the use of stolencredit card numbers. Individuals are able to utilize the charge accounts topurchase items for which no payment is made.Federal search warrants were executed in the following cities:Chicago, ILCincinnati, OHDetroit, MILos Angeles, CAMiami, FLNewark, NJNew York, NYPhoenix, AZPittsburgh, PAPlano, TXRichmond, VASan Diego, CASan Jose, CAUnlawful computer hacking imperils the health and welfare of individuals,corporations and government agencies in the United States who rely oncomputers and telephones to communicate.Technical and expert assistance was provided to the United States SecretService by telecommunication companies including Pac Bel, AT&T, Bellcore,Bell South, MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S.West, and by the many corporate victims. All are to be commended for theirefforts in researching intrusions and documenting losses.McNamee and Corbin expressed concern that the improper and alleged illegaluse of computers may become the White Collar crime of the(MORE)1990's. McNamee and Corbin reiterated that the state and federal governmentwill vigorously pursue criminal violations of statutes under theirjurisdiction. Three individuals were arrested yesterday in otherjurisdictions on collateral or independent state charges. Theinvestigations surrounding the activities of Operation Sundevil arecontinuing.The investigations are being conducted by agents of the United StatesSecret Service and Assistant United States Attorney Tim Holtzen, Districtof Arizona, and **Assistant Arizona Attorney General Gail Thackery.END STORY**KPFA-FM Panelist**************************************************************Assistant Director Garry M. Jenkins' Prepared RemarksOperation Sun DevilToday, the Secret Service is sending a clear message to those computerhackers who have decided to violate the laws of this nation in the mistakenbelief that they can successfully avoid detection by hiding behind therelative anonymity of their computer terminals.In 1984, Congress enacted the Comprehensive Crime Control Act whichprohibits, among other things, credit card fraud and computer fraud. Since1984, the Secret Service has been aggressively enforcing these laws and hasmade over 9,000 arrests nationwide.Recently we have witnessed an alarming number of young people who, for avariety of sociological and psychological reasons, have become attached totheir computers and are exploiting thier potential in a criminal manner.Often, a progression of criminal activity occurs which involvestelecommunications fraud (free long distance phone calls), unauthorizedaccess to other computers (whether for profit, fascination, ego, or theintellectual challenge), credit card fraud (cash advances and unauthorizedpurchases of goods), and then move on to other destructive activities likecomputer viruses.Some computer abusers form close associations with other people havingsimilar interests. Underground groups have been formed for the purpose ofexchanging information relevant to their criminal activities. These groupsoften communicate with each other through message systems between computerscalled "bulletin boards."Operation Sun Devil was an investigation of potential computer fraudconducted over a two-year period with the use of sophisticatedinvestigative techniques.This investigation exemplifies the commitment and extensive cooperationbetween federal, state and local law enforcement agencies and privategovernmental industries which have been targeted by computer criminals.While state and local law enforcement agencies successf...
[ Pobierz całość w formacie PDF ]