mirror of
https://github.com/opsxcq/mirror-textfiles.com.git
synced 2025-08-14 05:14:00 +02:00
update
This commit is contained in:
111
textfiles.com/news/livermor.txt
Normal file
111
textfiles.com/news/livermor.txt
Normal file
@@ -0,0 +1,111 @@
|
||||
Hackers in the News
|
||||
HACKERS IN THE NEWS
|
||||
|
||||
ORLANDO SENTINEL-
|
||||
|
||||
ORIGINATED FROM THE LOS ANGELES TIMES.
|
||||
---------------------------------------------------------------------------
|
||||
|
||||
HACKERS USED WEAPONS LAB COMPUTER TO DISTRIBUTE PORN -TITLE
|
||||
|
||||
"-A NEWSPAPER'S PROBE OF IMPROPER INTERNET LED TO THE DISCOVERY OF
|
||||
HARD-CORE GRAPHIC IMAGES.
|
||||
|
||||
DRAMATICALLY ILLUSTRATING THE SECURITY PROBLEMS POSED BY THE RAPID GROWTH
|
||||
OF INTERNET COMPUTER NETWORK, ONE OF THE NATION'S THREE NUCLEAR WEAPONS
|
||||
LABS CONFIRMED MONDAY THAT COMPUTER HACKERS WERE USING ITS COMPUTERS TO
|
||||
STORE AND DISTRIBUTE HARD-CORE PORNOGRAPHY.
|
||||
|
||||
EMABARRASED OFFICIALS AT LAWRENCE LIVERMORE NATIONAL LABORATORY
|
||||
IN LIVERMORE, CALIF., WHICH CONDUCT A GREAT DEAL OF CLASSIFIED RESEARCH
|
||||
AND HIGHLY SOPHISTICATED SECURITY PROCEDURES, SAID THE INCIDENT WAS AMONG
|
||||
THE MOST SERIOUS BREACHES OF COMPUTER SECURITY EVER AT THE LAB EAST OF
|
||||
SAN FRANCISO.
|
||||
.
|
||||
Hackers in the News (24/25)
|
||||
THE OFFENDING COMPUTER, WHICH WAS SHUT DOWN AFTER A LOS ANGELES
|
||||
TIMES REPORTER INVESTIGATING INTERNET HACKING ALERTED LAB OFFICIALS,
|
||||
CONTAINED MORE THAN 1,000 PORNOGRAPHIC IMAGES. IT WAS BELIEVED TO BE THE
|
||||
LARGEST CACHE OF ILLEGAL HARD-CORE PORNOGRAPHY EVER FOUND ON A COMPUTER
|
||||
NETWORK.
|
||||
|
||||
WHILE HACKERS ONCE DEVOTED THEIR EFFORTS TO DISRUPTING COMPUTER
|
||||
SYSTEMS AT LARGE ORGANIZATIONS OR STEALING ELECTRONIC INFORMATION, THEY
|
||||
HAVE NOW DEVELOPED WAYS OF SEIZING CONTROL OF INTERNET-LINKED COMPUTERS
|
||||
AND USING THEM TO STORE AND DISTRIBUTE PORNOGRAPHY, STOLEN COMPUTER
|
||||
SOFTWARE AND OTHER ILLICIT INFORMATION.
|
||||
|
||||
THE INTERNET, A "NETWORK OF NETWORKS" ORIGINALLY DESIGNED
|
||||
TO CONNECT COMPUTERS AT UNIVERSITIES AND GOVERNMENT RESEARCH LABS, HAS
|
||||
GROWN DRAMATICALLY IN SIZE AND TECHNICAL SOPHISTICATION IN RECENT YEARS.
|
||||
IT IS NOW USED BY MANY BUSINESSES AND INDIVIDUAL COMPUTER USERS, AND IS
|
||||
OFTEN VIEWED AS THE PROTOTYPE FOR THE "INFORMATION SUPERHIGHWAY" OF THE
|
||||
FUTURE.
|
||||
|
||||
BUT THE INTERNET HAS AN UNDERSIDE, WHERE SO CALLED "PIRATES" WITH
|
||||
CODE NAMES LIKE "MR. SMUT," "ACIDFLUX," AND "THE COWBOY" TRAFFIC IN
|
||||
ILLEGAL OR ILLEGALLY OBTAINED ELECTRONIC INFORMATION. THE STRUCTURE OF
|
||||
.
|
||||
Hackers in the News (24/47)
|
||||
THE INTERNET MEANS THAT SUCH PIRATES CAN CARRY OUT THEIR CRIMES FROM
|
||||
ALMOST ANYWHERE IN THE WORLD, AND TRACING THEM IS NEARLY IMPOSSIBLE.
|
||||
|
||||
THE FBI LATE LAST WEEK CONFIRMED THAT IT WAS INVESTIGATING
|
||||
SOFTWARE PIRACY ON THE INTERNET. A TIMES REPORTER DISCOVERED A NUMBER OF
|
||||
SITES AT PRESTIGIOUS INSTITUTUIONS THAT WERE BEING USED TO DISTRIBUTE
|
||||
STOLEN SOFTWARE, INCLUDING ONE IN THE OFFICE OF THE UNIVERSITY OF
|
||||
CALIFORNIA, BERKELY.
|
||||
|
||||
PIRATES ALSO HAVE THEIR OWN "CHAT" LINES, A SERIES OF CHANNELS
|
||||
WITHIN A SERVICE CALLED THE INTERNET RELAY CHAT. AN ELABORATE PECKING
|
||||
ORDER DETERMINES WHO WILL BE ALLOWED TO TAKE PART IN THESE CONVERSATIONS
|
||||
- NEWCOMERS CAN OFTEN WANGLE THEIR WAY IN IF THEY HAVE A PARTICULARLY HOT
|
||||
PIECE OF SOFTWARE TO OFFER.
|
||||
|
||||
SANDY MEROLA, DEPUTY DIRECTOR OF INFORMATION AND COMPUTING AT THE
|
||||
BERKELY LAB, SIAD THAT THE PIRATE SITE WAS SHUT DOWN LAST WEEK AFTER THE
|
||||
TIMES INVESTIGATION REVEALED ITS EXISTENCE. MEROLA SAID THE DEPARTMENT
|
||||
OF ENERGY, WHICH OVERSEES LAB OPERATIONS, AS WELL AS THE FBI, HAD BEEN
|
||||
NOTIFIED OF THE INCIDENT.
|
||||
|
||||
AT LAWRENCE LIVERMORE, OFFICIALS SAID MONDAY THAT THEY BELIEVED
|
||||
.
|
||||
Hackers in the News (24/69)
|
||||
AT LEAST ONE MORE LAB EMPLOYEE WAS INVOLVED IN THE PORNOGRAPHY RING,
|
||||
ALONG WITH AN UNDETERMINED NUMBER OF OUTSIDE COLLABORATORS. CHUCK COLE,
|
||||
DEPUTY ASSOCIATE DIRECTOR OF COMPUTING AT THE LAB, SAID THAT NEARLY 2,000
|
||||
MEGABYTES OF UNAUTHORIZED GRAPHICAL IMAGES HAVE BEEN FOUND IN A LIVERMORE
|
||||
COMPUTER, AND HE CONFIRMED THAT THEY WERE PORNOGRAPHIC.
|
||||
|
||||
THE EMPLOYEE HAS BEEN PLACED ON "INVESTIGATORY LEAVE" AND HIS OR
|
||||
HER SECURITY BADGE CONFISCATED WHILE AN INVESTIGATION IS UNDERTAKEN, THE
|
||||
LAB SAID. IT IS UNCLEAR WHETHER THE PORNOGRAPHIC IMAGES WERE BEING SOLD
|
||||
OR HOW MANY PEOPLE HAD GAINED ACCESS TO THEM. THE PICTURES WERE
|
||||
SUFFICIENTLY GRAPHIC THAT THEY WOULD LIKELY BE CONSIDERED OBSCENE BY THE
|
||||
COURTS, AND THEREFORE TRANSMITTING THEM OVER THE INTERNET WOULD BE ILLEGAL.
|
||||
|
||||
THE MASSIVE AMOUNT OF STORAGE CAPACITY USED IN THE LIVERMORE
|
||||
SCHEME SHOWS HOW INTERNET HACKING COULD BE QUITE PROFITABLE.
|
||||
|
||||
THERE WERE INDICATIONS THAT THE PERSON OPERATING THE PORNOGRAPHY
|
||||
DATABASE HAD BECOME AWARE OF POSSIBLE SCRUTINY. ON JUNE 27, A MESSAGE
|
||||
LEFT IN A FILE LABELED READ ME!!! SAID, "IT APPEARS THAT NEWS ABOUT THIS
|
||||
SITE HAS ESCAPED, IN THE PAST TWO WEEKS, I HAVE HAD 27 UN-AUTHORIZED
|
||||
HOSTS ATTEMPT TO ACCESS MY SERVER. THIS DOES NOT GIVE ME A WARM-FUZZY
|
||||
FEELING. I WOULD HATE TO HAVE TO SHUT THIS DOWN, BUT I MAY HAVE NO CHOICE."
|
||||
.
|
||||
Hackers in the News (25/92)
|
||||
ONE COMPUTER EXPERT, WHO REQUESTED ANONYMITY, SIAD THAT THERE
|
||||
MIGHT BE MORE TO THE INCIDENT THAN MEETS THE EYE. THE EXPERT SUGGESTED
|
||||
THAT THE HARD-CORE PORNOGRAPHY MAY BE A COVER FOR AN ULTRA-SOPHISTICATED
|
||||
ESPIONAGE PROGRAM, IN WHICH A "SNIFFER" PROGRAM COMBS THROUGH OTHER
|
||||
LIVERMORE COMPUTERS, ENCODES THE PASSWORDS AND ACCOUNTS IT FINDS, AND
|
||||
THEN HIDES THEM WITHIN THE PORNOGRAPHIC IMAGES, PERHAPS LATER TO BE
|
||||
DOWNLOADED LATER BY FOREIGN AGENTS.
|
||||
|
||||
BUT COLE SAID THERE WAS NO POSSIBILITY OF A COMPUTER INTRUDER
|
||||
GAINING ACCESS TO CLASSIFIED DATA AT LIVERMORE LABS."
|
||||
|
||||
|
||||
___________________________________
|
||||
[Home[1]] [Main[2]] [Prev[3]] [Next[4]]
|
187
textfiles.com/news/lodhbust.nws
Normal file
187
textfiles.com/news/lodhbust.nws
Normal file
@@ -0,0 +1,187 @@
|
||||
|
||||
" U.S. computer investigation targets Austinites "
|
||||
------------------------------------------------------
|
||||
|
||||
|
||||
|
||||
[ The above caption high-lighted the Saturday March 17, 1990 edition
|
||||
of the Austin American-Statesman [ Austin, Texas ]. The article has
|
||||
been copied in its entirety, and the main point for typing this up
|
||||
was because of the involvement of the LOD/H throughout the article. ]
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
The U.S. Secret Service has seized computer equipment from two
|
||||
Austin homes and a local business in the past month as part of a federal
|
||||
investigation into electronic tampering with the nation's 911 emergency
|
||||
network.
|
||||
Armed Secret Service agents, accompanied by officers from the Austin
|
||||
Police Department, took the equipment in three March 1 raids that sources
|
||||
say are linked to a nationwide federal inquiry coordinated by the Secret
|
||||
Service and the U.S. attorney's office in Chicago.
|
||||
While federal officials have declined to comment on the investigation
|
||||
- which focuses on a bizarre mix of science fiction and allegations of
|
||||
high-tech thievery - the Austin American-Statesman has learned that the
|
||||
raids targeted Steve Jackson Games, a South Austin publisher of role-
|
||||
playing games, and the home of Loyd Blankenship, managing editor at the
|
||||
company.
|
||||
A second Austin home, whose resident was acquainted with Jackson
|
||||
officials, also was raided.
|
||||
Jackson said there is no reason for the company to be investigated
|
||||
. Steve Jackson Games is a book and game publisher of fiction, he said,
|
||||
and it is not involved in any computer-related thefts.
|
||||
The agents, executing search warrants now sealed by a judge from
|
||||
public view, took computer equipment, including modems, printers, and
|
||||
monitors, as well as manuals, instruction books and other documents. The
|
||||
equipment has been forwarded to federal officials in Chicago.
|
||||
The Secret Service, best-known for protecting the president, has
|
||||
jurisdiction in the case, government officials say, because damage to
|
||||
the nation's telephone system could harm the public's welfare. In
|
||||
addition, the system is run by American Telephone & Telegraph Co., a
|
||||
company involved in the nation's defense.
|
||||
The 911 investigation already has resulted in the indictment of
|
||||
two computer "hackers" in Illinois and sources say federal authorities
|
||||
now are focusing on Austin's ties to a shadowy underground computer
|
||||
user's group known as the Legion of Doom.
|
||||
The hackers, who live in Georgia and Missouri, where indicted in
|
||||
Chicago. they are believed to be members of the Legion of Doom and
|
||||
are charged with seven counts, including interstate transportation of
|
||||
stolen property, wire fraud, and violations of the Computer Fraud and
|
||||
Abuse Act of 1986.
|
||||
The government alleges that the defendants stole a computerized
|
||||
copy of Bell South's system that controls 911 emergency calls in nine
|
||||
states. The information was then transferred to a computer bulletin
|
||||
board and published in a hacker publication known as Phrack!
|
||||
A trial in the case is scheduled to begin in June.
|
||||
U.S. agents also have seized the final drafts of a science
|
||||
fiction game written by the Austin-based game company. Sources say
|
||||
the agents are trying to determine whether the game - a dark, futur-
|
||||
istic account of a world where technology has gone awry - is being
|
||||
used as a handbook for computer crime. Steve Jackson, the owner of
|
||||
the local company and a well-known figure in the role-playing game
|
||||
industry, said neither he nor his company has been involved in
|
||||
tampering with the 911 system.
|
||||
No one in Austin has been indicted or arrested as a result of
|
||||
the investigation. "It is an on-going investigation. That is all
|
||||
I can say," said Steve Beauchamp, special agent-in-charge of the
|
||||
Secret Service Austin field office. "Until we can put it all
|
||||
together, we just do not comment," he said.
|
||||
Bob Rogers, Jackson's Dallas attorney, said federal officials
|
||||
have assured him that neither Jackson nor Jackson Games is the tar-
|
||||
get of the probe. The authorities would not tell Rogers whether the
|
||||
inquiry focused on other company employees. As for the science fiction
|
||||
game, called Cyberpunk, Jackson said federal authorities have mistaken
|
||||
a fictional work for a technical manual [E.N. Why does this sound all
|
||||
too familiar?] .
|
||||
"It's not a manual for computer crime any more than a Reader's
|
||||
Digest story on how to burglar-proof your house is a manual for
|
||||
burglars," said Jackson, 36. "It's kind of like the hints you get
|
||||
on safe-cracking from a James Bond movie."
|
||||
Blankenship, the author of the book, said his attorney has advised
|
||||
him not to comment on the book or the Secret Service investigation.
|
||||
Jackson said he guesses his company was linked to the 911 probe
|
||||
by its use of a computer bulletin board system, called Usenet. The
|
||||
board, one of hundreds throughout the country, is a sort of electronic
|
||||
Town Square, where personal computer users from throughout the world
|
||||
can tap into the system via phone lines and a modem.
|
||||
The network, free and relatively unregulated, is an information
|
||||
exchange where users can post information, exchange electronic messages
|
||||
and debate with keyboards everything from poetry and politics to nuclear
|
||||
war.
|
||||
One of the world's largest networks - boasting more than 600,000
|
||||
users - Usenet was tapped by Chinese students in North America to
|
||||
organize support for students during the pro-democracy demonstrations
|
||||
last year. The network also was infected in 1988 by a now-famous
|
||||
computer "virus" unleashed by college student Robert Morris.
|
||||
Jackson said his company has maintained a bulletin board on
|
||||
the Usenet network on which it posts advanced copies of its role-
|
||||
playing games. The firm posts the games and requests that the users
|
||||
of the network comment on the text and propose improvements.
|
||||
The Jackson bulletin board, called Illuminati, greets users with
|
||||
the company's logo and a message that states: "Welcome to the World's
|
||||
Oldest and Largest Secret Conspiracy."
|
||||
Over the past several months, the company has been posting drafts
|
||||
of Cyberpunk for review.
|
||||
The resident of the second Austin home raided by the Secret Service
|
||||
was acquainted with Jackson and had made comments about the game on
|
||||
Usenet. He asked to remain anonymous.
|
||||
Typical of Cyberpunk literature, the game is set in a bleak future,
|
||||
much like the world portrayed in Max Headroom, formerly a network
|
||||
television program. Computers and technology control people's thoughts
|
||||
and actions and are viewed both as a means of oppression and as a method
|
||||
of escape. Portions of Jackson's Cyberpunk viewed by the Austin American
|
||||
Statesman include a detailed discussion on penetrating government computer
|
||||
networks and a list of fictitious programs used to break into closed
|
||||
networks. Bruce Sterling, an Austin science fiction writer and one of
|
||||
the world's best-known Cyberpunk writers, said Jackson's game and its
|
||||
computer-related discussions are hardly unusual for the genre.
|
||||
"Cyberpunk is thriller fiction." Sterling said. "It deals to a
|
||||
great extent with the romance of crime in the same way that mysteries
|
||||
or techno-thrillers do." He said the detailed technical discussions
|
||||
in the Jackson games are what draws people to them. "That's the
|
||||
charm of simulating something that's supposed to be accurate. If
|
||||
it's cooked up out of thin air, the people who play these games are
|
||||
going to lose interest."
|
||||
Jackson, though, said he has been told by Secret Service agents
|
||||
that they view the game as a user's guide to computer mischief. He
|
||||
said they made the comments where he went to the agency's Austin
|
||||
office in an unsuccessful attempt to reclaim some of his seized
|
||||
equipment. "As they were reading over it, they kept making outraged
|
||||
comments," Jackson said. "When they read it, they became very, very
|
||||
upset. "I said, 'This is science fiction.' They said, 'No. This
|
||||
is real.'"
|
||||
The text of the Cyberpunk games, as well as other computer
|
||||
equipment taken from Jackson's office, still has not been returned.
|
||||
The company now is working to rewrite portions of the book and is
|
||||
hoping to have it printed next month. In addition to reviewing
|
||||
Cyberpunk, sources say federal authorities currently are investigating
|
||||
any links between local computer hackers and the Legion of Doom. The
|
||||
sources say some of the 911 information that is the subject of Chicago
|
||||
indictments has been traced to Austin computers.
|
||||
Jackson's attorney said federal officials have told him that
|
||||
the 911 information pilfered from Bell South has surfaced on a computer
|
||||
bulletin board used at Steve Jackson games. But the information
|
||||
apparently has not been traced to a user. Jackson said that neither
|
||||
he nor any of his employees is a member of the Legion of Doom.
|
||||
Blankenship, however, did consult with the group in the
|
||||
course of researching the writing the Cyberpunk game, Jackson said.
|
||||
Further, the group is listed in the game's acknowledgments for its
|
||||
aid in providing technical information used in Cyberpunk. For these
|
||||
reasons he believes Blankenship is a local target of the federal probe,
|
||||
though none of the investigators has yet confirmed his suspicion.
|
||||
"My opinion is that he is (being investigated)," Jackson said,
|
||||
"If that's the case, that's gross.
|
||||
"he had been doing research for what he hoped would be a mass-
|
||||
market book on the computer underground," Jackson said.
|
||||
The other Austin resident raided by the authorities, who asked
|
||||
to remain anonymous, acknowledged that he is the founding member of
|
||||
the Legion of Doom and that copies of the 911 system had surfaced on
|
||||
the group's local bulletin board. The 20-year-old college student
|
||||
said the information hardly posed any threat to the 911 system.
|
||||
"It was nothing," he said. "It was garbage, and it was boring."
|
||||
In the Chicago indictment accuses the group of a litany of
|
||||
electronic abuses, including: disrupting telephone service by
|
||||
changing the routing of telephone calls; stealing and modifying
|
||||
individual credit histories; stealing money and property from
|
||||
companies by altering computer information; and disseminating
|
||||
information about attacking computers to other computer hackers.
|
||||
The Austin Legion of Doom member said his group's worst
|
||||
crime is snooping through other people's computers. "For the
|
||||
most part, that's all we do," he said. "No one's out ripping
|
||||
off people's credit cards. No one's out to make any money.
|
||||
"We're just out to have fun."
|
||||
The group member said the fact that the legion is shrouded
|
||||
in mystery adds to its mystique - and to the interest law
|
||||
enforcement agents have in cracking the ring. "It's an entirely
|
||||
different world," the student said. "It's a very strange little
|
||||
counter-culture. "Everybody who exists in that world is familiar
|
||||
with the Legion of Doom," he said. "Most people are in awe or are
|
||||
intimidated by it."
|
||||
|
||||
|
||||
|
||||
(C)opied by Pizzia Man
|
||||
03/18/9
|
||||
|
52
textfiles.com/news/marsface.txt
Normal file
52
textfiles.com/news/marsface.txt
Normal file
@@ -0,0 +1,52 @@
|
||||
|
||||
July 8, 1988
|
||||
SOME SEE GLIMPSE OF LIFE IN 'FACE' OF MARS
|
||||
AP and UPI
|
||||
|
||||
WASHINGTON - Unusual formations on the surface of Mars - including a
|
||||
mile-long rock shaped like a human face - may have been carved by a lost
|
||||
civilization, four scientists said yesterday.
|
||||
The scientists, including a former astronaut, said at a news conference
|
||||
that the chances are better than 50-50 that the structures were made by
|
||||
intelligent beings.
|
||||
The scientists said that a photograph taken of the Martian surface in
|
||||
1976 by NASA's Viking spacecraft clearly shows a face that could have been
|
||||
carved out of a Martian mountain a half-million years ago.
|
||||
The sphinx-like image that stares outward from the planet may be part of
|
||||
a complex of buildings, as evidenced by other unusual formations nearby, the
|
||||
scientists said.
|
||||
|
||||
Brian T. O'Leary, a former astronaut and an expert on Mars, said there
|
||||
is sufficient uncertainty about the origin of the rock face that it should
|
||||
be a major target for future spacecraft sent to Mars.
|
||||
O'Leary said last January he asked Soviet space scientists who were
|
||||
preparing to send probes to Mars to examine the area where the face appears.
|
||||
He said the Soviets were interested, but replied that their spacecraft was
|
||||
not technically designed to study the Cydonia region of Mars, where the
|
||||
sight is located.
|
||||
The Soviets launched a probe toward Mars yesterday and plan to launch a
|
||||
second one later this month.
|
||||
The news conference yesterday was prompted by a recent study of the
|
||||
Viking photographs conducted by Mark Carlotto, an optical engineering
|
||||
expert.
|
||||
|
||||
In an article published in Applied Optics, Carlotto said that a computer
|
||||
enhancement of the Viking photographs shows that the face and various other
|
||||
nearby features appear to have been carved by "intelligent design."
|
||||
Yesterday, Carlotto told reporters that a sophisticated statistical study of
|
||||
the shapes clearly shows that "the face is not natural."
|
||||
Richard Hoagland, founder of a private organization of scientists called
|
||||
"The Mars Project," said that in addition to the face there is "a complex of
|
||||
unusual objects" at the Cydonia site. The complex includes a five-sided
|
||||
mountain that resembles a pyramid and a massif he believes could have been
|
||||
part of an astronomical marker.
|
||||
|
||||
Hoagland said that a line drawn from the center of the city, across the
|
||||
face to the massif, or cliff, would line up exactly with the Sun at the
|
||||
moment of Mars' summer solstice, as it would have occured 500,000 years ago
|
||||
- an alignment it is extremely unlikely could occur naturally.
|
||||
|
||||
|
||||
(Source: The San Diego Union - July 8, 1988)
|
||||
|
||||
|
60
textfiles.com/news/marsmani.txt
Normal file
60
textfiles.com/news/marsmani.txt
Normal file
@@ -0,0 +1,60 @@
|
||||
13-Feb-88 01:53 MST
|
||||
Sb: APn 02/03 1227 Mars Mania
|
||||
Copyright, 1988. The Associated Press. All rights reserved.
|
||||
|
||||
By RICHARD COLE Associated Press Writer
|
||||
MIAMI (AP) -- This year, Mars makes its closest approach to Earth in a
|
||||
generation, and astronomers say the red planet's appearance in the night sky
|
||||
may be the astronomical event of 1988.
|
||||
As if to demonstrate the heavens have a sense of humor, the height of the
|
||||
show comes in September, just shy of the 50th anniversary of Orson Welles' 1938
|
||||
"War of the Worlds" broadcast that panicked the nation with fictional reports
|
||||
of invaders from Mars.
|
||||
"I see 1988 as a great Martian adventure," said Jack Horkheimer, the aptly
|
||||
named "Star Hustler" of the Public Broadcasting System and executive director
|
||||
of Miami's Space Transit Planetarium. "I'm like a kid in a candy store."
|
||||
When Mars is at its closest on Sept. 21 -- just over 36 million miles away
|
||||
-- it will rival Jupiter as the brightest object in the sky after the Moon and
|
||||
Venus.
|
||||
"It won't be this close again until 2003," says Horkheimer. "And there are a
|
||||
lot of kids out there who have never seen it this bright."
|
||||
Unlike the comets Halley and Kohoutek, Mars will not disappoint viewers,
|
||||
because its brightness is more predictable and the planet will be easily
|
||||
visible from almost everywhere.
|
||||
He expects a spate of UFO sightings to accompany Mars' visit as people
|
||||
unaccustomed to the unblinking reddish-orange light in the night sky mistake it
|
||||
for more exotic extraterrestrial visitors.
|
||||
Like planetarium directors around the nation, Horkheimer is preparing a
|
||||
series of Mars shows he promises will "knock your socks off."
|
||||
One involves a snazzy computerized simulation of a flight through the
|
||||
planet's gigantic 2,500-mile-long version of the Grand Canyon. Another centers
|
||||
around an 18-mile-high mountain -- three times higher than Mount Everest --
|
||||
capped by a crater the size of Georgia.
|
||||
He also is bringing to the planetarium a new telescope nicknamed "Awesome
|
||||
Orson" in honor of the late Welles' broadcast and girth.
|
||||
Although Earth passes Mars every two years, it is only every 15 to 17 years
|
||||
that the orbits of the third and fourth planets bring them as close together as
|
||||
in 1988. The year began with Earth and Mars separated by 200 million miles.
|
||||
The close encounter comes four years before a scheduled Mars probe by the
|
||||
Soviet Union.
|
||||
The Soviet plan to have the probes bring back Martian soil, and perhaps,
|
||||
Horkheimer said, settle the most intriguing question about Earth's neighbor --
|
||||
whether life once existed on the now cold and arid desert planet.
|
||||
U.S. Mars landers in the 1970s tried to answer that question, but the
|
||||
chemical soil test results beamed back to Earth were inconclusive.
|
||||
"I really hope that they find fossilized signs of life," he said. "We know
|
||||
that there was water on Mars."
|
||||
Horkheimer said he also hopes the Soviet probes will spur the United States
|
||||
to revive its own space program, with a manned landing on Mars.
|
||||
"We could be on Mars easily within a decade or so," he said. "The technology
|
||||
already exisits. What is missing is the money." And the funds will be available
|
||||
only when the public once again supports spending the billions of dollars in
|
||||
funding a Martian landing would require.
|
||||
If the political situation allows it, a joint U.S.-Soviet mission to Mars
|
||||
could ease the financial burden on both countries, he said.
|
||||
It also could promote peace between the two rivals -- an ironic benefit from
|
||||
a planet named after the Roman god of war.
|
||||
|
||||
|
||||
|
||||
|
117
textfiles.com/news/menace.txt
Normal file
117
textfiles.com/news/menace.txt
Normal file
@@ -0,0 +1,117 @@
|
||||
Phile 1.6 of 1.14
|
||||
|
||||
THE HACKER MENACE AND ELECTRONIC BULLETIN BOARDS
|
||||
------------------------------------------------
|
||||
Typed by: {ode {racker
|
||||
|
||||
This was taken out of the Network Security Magazine published by Datapro
|
||||
Research. I found this article to be quite funny along with antinque
|
||||
news. So I thought I share it with you for a laugh or whatever.
|
||||
|
||||
Also this article was written by a EX-HACKER! How does one become a
|
||||
EX-HACKER, please tell me!!!!
|
||||
|
||||
|
||||
|
||||
HACKER GANGS
|
||||
------------>
|
||||
|
||||
Early computer hackers tended to be college students. With the advent
|
||||
of home computers, and the teaching of computer basics at the grade
|
||||
school level, the average age of the begininning (youth) hacker has
|
||||
dropped to only 14!! The overwhelming majority of BBS owners and users
|
||||
are teenagers. Teens tend to form cliques and peer groups, so the
|
||||
formation of phone phreak and hacker gangs was inevitable. The parents
|
||||
of these bright teens usually do not, themselves, understand the power
|
||||
of the computer. This means that the teens are not subject to the same
|
||||
parental restrictions that would govern their using the family car.
|
||||
|
||||
Many parents veiw the home computer as an excellent baby-sitting device.
|
||||
If their child spends an evening quietly in his/her room with the computer
|
||||
the parents feel that thier offspring is not getting into any trouble.
|
||||
In reality, these teens may be engaging in electronic gang activites
|
||||
that have very serious implications. Losses to the software industry
|
||||
alone are staggering!!!
|
||||
|
||||
Unfortunately, many of the gang leaders are older, more experienced
|
||||
teens, perhaps college students. These people are interested in hacking
|
||||
not for its intellectual challenge, for for its financial rewards. A
|
||||
few gang leaders are adults who are politically or firal adults who are major figures behind the cracking and
|
||||
distribution of pirated software for resale to the public. One
|
||||
adult gang leader openly solicited credit card numbers from the
|
||||
juvenile members in exchange for fraudulently obtained hard disk drives
|
||||
and other equipment. Some of the teenage leaders seek notoriety and
|
||||
acclaim from their peers. They strive to be the biggest phreaker or
|
||||
to have broken into the greatest number of computer systems.
|
||||
|
||||
The gangs may be local in nature such as the infamous "Milwaukee 414
|
||||
gang"; they may be national in nature, like the "Inner Circle"; or
|
||||
even international. One such international group is "NYSHII" or
|
||||
"CHAOS" both cracking and pirating clubs with headquaters in both
|
||||
West Germany and the United States. All of these groups had a BBS
|
||||
that was their main base of operations and served supposedly as a
|
||||
sercure communications center. The 414s had a private BBS that was
|
||||
so sercet it didn't even have a namme. The Inner Circle had a
|
||||
Securityland BBS and Illegitimate accounts on GTE'S Telemail network.
|
||||
Chaos operates on a variety of BBS's in both the U.S. and West Germany.
|
||||
NYSHII (New York Safehouse II) to this date has baffled local and
|
||||
international law enforcement agencys as to it's true whereabouts.
|
||||
The Sysop "The Line Breaker" has found a way of changing the BBS's
|
||||
location on a weekly basis without moving the master computer.
|
||||
|
||||
ORGANIZED CRIME AND THE BBS
|
||||
--------------------------->
|
||||
|
||||
Naturally, an underground BBS could be used by organized crime in
|
||||
much the same manner as the teen hacker gangs use them. The author
|
||||
has good reason to believe thgat organized crime is controlling a
|
||||
number of BBS systems in the Midwest, the New York City area, and
|
||||
in Florida. One informant claims there is a bbs that is located
|
||||
in an off-track betting parlor. Teenagers are easily recruited to
|
||||
act as information gathers for organized crime. The young people
|
||||
work for little or nothing and, in most cases, do not even know
|
||||
that they are being used. The author and other adult hackers have
|
||||
been approached and offered large sums of money tamper with
|
||||
banking and credit data computer systems. Organized crime is
|
||||
moving into this new area of crime. There is a real and present
|
||||
danger if BBSs continue to be alloowed to operate unchecked.
|
||||
|
||||
Underground BBSs may be creating a whole new generation of
|
||||
criminals. As the youthful hackers mature, their interest in hacking
|
||||
as an intellectual challenge and rebellion against authority
|
||||
may be replaced by profit motive. College students always seem
|
||||
to need money and the teens who do not go to college may find it
|
||||
difficult to obtain a job. It is only natural that these individuals
|
||||
would graviate into hacking for personal gain. For example, many
|
||||
bulletin boards cater to those who are involved in credit card fraud.
|
||||
There is also evidence that drug dealers use BBSs to arrange swaps
|
||||
of stolen property for drugs. Hackers who have learned how to access
|
||||
credit bureau systems, such as TRWs, have discovered that making
|
||||
unauthorized credit checks foe
|
||||
business.
|
||||
|
||||
Credit bureau computer penetrations are routine in the hacker under-
|
||||
ground. The typical hacker gang obtains credit card numbers from
|
||||
discarded charge slip carbons. As an alternative, one or more
|
||||
hackers who work in retail establishments may supply card numbers.
|
||||
Other gang members can then check the cards for credit limits and
|
||||
expiuration dates by using the telephone or illegally accessing
|
||||
credit bureau computers. Others in the gang set up mail drops
|
||||
and safe houses for the deliverly of the merchandise ordered by mail
|
||||
and charged to the credit card numbers. Since the gangs know no
|
||||
geographic boundaries, it is difficult to investigate these frauds.
|
||||
|
||||
Some commerical time-sharing services, such as Comp-u-serve, allow
|
||||
merchandise to be ordered via computer and shipped to the user's
|
||||
address. ime-sharing accounts are easily obtained with a stolen
|
||||
credit card. This allows the thief to order merchandise with little
|
||||
fear of being traced. These new high tech thieves are replacing
|
||||
more traditional criminals.
|
||||
|
||||
The hackers and phone phreaks have knowledge and skill to completly
|
||||
disrupt major communication and computer networks. All that is lacking
|
||||
is organization, planning and financing. If enemy power should
|
||||
infiltrate and organize this underground, the consequences could
|
||||
be disastrous.
|
||||
|
||||
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
|
1
textfiles.com/news/mism34.hac
Normal file
1
textfiles.com/news/mism34.hac
Normal file
File diff suppressed because one or more lines are too long
BIN
textfiles.com/news/mism6.txt
Normal file
BIN
textfiles.com/news/mism6.txt
Normal file
Binary file not shown.
176
textfiles.com/news/mitnick.txt
Normal file
176
textfiles.com/news/mitnick.txt
Normal file
@@ -0,0 +1,176 @@
|
||||
Slippery cybervandal caught in his own electronic web
|
||||
-----------------------------------------------------
|
||||
|
||||
(c) Copyright the News & Observer Publishing Co.
|
||||
How a computer sleuth traced a digital trail
|
||||
|
||||
New York Times
|
||||
|
||||
RALEIGH, N.C. (9:05 p.m.) -- After a search of more than two years, a team
|
||||
of FBI agents early Wednesday morning captured a 31-year-old computer
|
||||
expert accused of a long crime spree that includes the theft of thousands
|
||||
of data files and at least 20,000 credit card numbers from computer
|
||||
systems around the nation.
|
||||
|
||||
The arrest of Kevin D. Mitnick, one of the most wanted computer criminals,
|
||||
followed a 24-hour stakeout of a Raleigh apartment building here.
|
||||
|
||||
A convicted computer felon on the run from federal law enforcement
|
||||
officials since November 1992, Mitnick has used his sophisticated skills
|
||||
over the years to worm his way into many of the nation's telephone and
|
||||
cellular telephone networks and vandalize government, corporate and
|
||||
university computer systems. Most recently, he had become a suspect in a
|
||||
rash of break-ins on the global Internet computer network.
|
||||
|
||||
"He was clearly the most wanted computer hacker in the world," said Kent
|
||||
Walker, an assistant U.S. attorney in San Francisco who helped coordinate
|
||||
the investigation. "He allegedly had access to corporate trade secrets
|
||||
worth billions of dollars. He was a very big threat."
|
||||
|
||||
But federal officials say Mitnick's confidence in his hacking skills may
|
||||
have been his undoing. On Christmas Day, he broke into the home computer
|
||||
of a computer security expert, Tsutomu Shimomura, a researcher at the
|
||||
federally financed San Diego Supercomputer Center.
|
||||
|
||||
Shimomura then made a crusade of tracking down the intruder, an obsession
|
||||
that led to Wednesday's arrest.
|
||||
|
||||
It was Shimomura, working from a monitoring post in San Jose, Calif., who
|
||||
determined last Saturday that Mitnick was operating through a computer
|
||||
modem connected to a cellular telephone somewhere near Raleigh, N.C.
|
||||
|
||||
Sunday morning, Shimomura flew to Raleigh, where he helped telephone
|
||||
company technicians and federal investigators use cellular-frequency
|
||||
scanners to home in on Mitnick.
|
||||
|
||||
Mitnick was arrested at 2 o'clock Wednesday morning in his apartment in
|
||||
the Duraleigh Hills neighborhood of northwest Raleigh, after FBI agents used
|
||||
their scanners to determine that Mitnick, in keeping with his nocturnal
|
||||
habits, had connected once again to the Internet.
|
||||
|
||||
Shimomura was present Wednesday at Mitnick's pre-arraignment hearing at
|
||||
the
|
||||
federal courthouse in Raleigh. At the end of the hearing, Mitnick, who now
|
||||
has shoulder-length brown hair and was wearing a black sweat suit and
|
||||
handcuffs, turned to Shimomura, whom he had never met face to face.
|
||||
|
||||
"Hello, Tsutomu," Mitnick said. "I respect your skills."
|
||||
|
||||
Shimomura, who is 30 and also has shoulder-length hair, nodded solemnly.
|
||||
|
||||
|
||||
Mitnick, already wanted in California for a federal parole violation, was
|
||||
charged Wednesday with two federal crimes. The first, illegal use of a
|
||||
telephone access device, is punishable by up to 15 years in prison and a
|
||||
$250,000 fine.
|
||||
|
||||
The second charge, computer fraud, carries potential penalties of 20 years
|
||||
in prison and a $250,000 fine. Federal prosecutors said they were
|
||||
considering additional charges related to Mitnick's reported Internet
|
||||
spree.
|
||||
|
||||
Federal officials say Mitnick's motives have always been murky. He was
|
||||
recently found to have stashed thousands of credit card numbers on
|
||||
computers in the San Francisco Bay area -- including the card numbers of
|
||||
some of the best-known millionaires in Silicon Valley. But there is no
|
||||
evidence yet that Mitnick had attempted to use those credit card accounts.
|
||||
|
||||
Indeed, frequently ignoring the possibility of straightforward financial
|
||||
gain from the information he has stolen, Mitnick has often seemed more
|
||||
concerned with proving that his technical skills are better than those
|
||||
whose job it is to protect the computer networks he has attacked.
|
||||
|
||||
Federal officials say the arrest of Mitnick does not necessarily solve all
|
||||
the recent Internet crimes, because his trail of electronic mail has
|
||||
indicated that he may have accomplices. One of them is an unknown computer
|
||||
operator, thought to be in Israel, with whom Mitnick has corresponded
|
||||
electronically and boasted of his Internet exploits, investigators said.
|
||||
|
||||
Still, the capture of Mitnick gives the FBI custody of a notoriously
|
||||
persistent and elusive computer break-in expert. Raised in the San
|
||||
Fernando Valley near Los Angeles by his mother, Mitnick has been in and out of
|
||||
trouble with the law since 1981.
|
||||
|
||||
It was then, as a 17-year-old, that he was placed on probation for
|
||||
stealing computer manuals from a Pacific Bell telephone switching center in Los
|
||||
Angeles.
|
||||
<EFBFBD> <20>' 0*0*0*<2A> <20> <20> Those who know Mitnick paint a picture of a man obsessed with the power
|
||||
inherent in controlling the nation's computer and telephone networks.
|
||||
|
||||
The recent break-ins he is accused of conducting include forays into
|
||||
computer systems at Apple Computer Inc. and Motorola Inc. and attacks on
|
||||
commercial services that provide computer users with access to the
|
||||
Internet, including the Well in Sausalito, Calif., Netcom in San Jose,
|
||||
Calif., and the Colorado Supernet, in Boulder, Colo.
|
||||
|
||||
To make it difficult for investigators to determine where the attacks were
|
||||
coming from, Mitnick is said to have used his computer and modem to
|
||||
manipulate a local telephone company switch in Raleigh to disguise his
|
||||
whereabouts.
|
||||
|
||||
In recent weeks, as an elite team of computer security experts tightened
|
||||
an invisible electronic net around the fugitive, Mitnick continued to taunt
|
||||
his pursuers, apparently unaware of how close they were to capturing him.
|
||||
|
||||
About 10 days ago, for example, someone whom investigators believe to have
|
||||
been Mitnick left a voice-mail message for Shimomura, a Japanese citizen.
|
||||
The message reprimanded Shimomura for converting the intruder's earlier
|
||||
voice-mail messages into computer audio files and making them available on
|
||||
the Internet.
|
||||
|
||||
"Ah Tsutomu, my learned disciple," the taunting voice said. "I see that
|
||||
you put my voice on the Net. I'm very disappointed, my son."
|
||||
|
||||
But the continued attempts at one-upmanship simply gave the pursuers more
|
||||
electronic evidence.
|
||||
|
||||
"He was a challenge for law enforcement, but in the end he was caught by
|
||||
his own obsession," said Kathleen Cunningham, a deputy marshal for the
|
||||
U.S. Marshals Service who has pursued Mitnick for several years.
|
||||
|
||||
Mitnick first came to national attention in 1982 when, as a teen-age
|
||||
prank, he used a computer and a modem to break into a North American Air Defense
|
||||
Command computer.
|
||||
|
||||
He subsequently gained temporary control of three central offices of
|
||||
telephone companies in New York City and all the phone switching centers
|
||||
in California.
|
||||
|
||||
This gave him the ability to listen in on calls and pull pranks like
|
||||
reprogramming the home phone of someone he did not like so that each time
|
||||
the phone was picked up, a recording asked for a deposit of a coin.
|
||||
|
||||
But the break-ins escalated beyond sophomoric pranks. For months in 1988,
|
||||
Mitnick secretly read the electronic mail of computer security officials
|
||||
at MCI Communications and Digital Equipment Corp., learning how their
|
||||
computers and phone equipment were protected.
|
||||
Officials at Digital later accused him of causing $4 million in damage to
|
||||
computer operations at the company and stealing $1 million of software. He
|
||||
was convicted in July 1989 and sentenced to a year in a low-security
|
||||
federal prison in Lompoc, Calif.
|
||||
|
||||
One of his lawyers convinced the court that Mitnick had an addiction to
|
||||
computers. In July 1989, after his release from prison, he was placed in a
|
||||
treatment program for compulsive disorders, the Beit T'Shuvah center in
|
||||
Los Angeles. During his six months there, he was prohibited from touching a
|
||||
computer or modem.
|
||||
|
||||
That restriction was a condition of his probation when he was released in
|
||||
mid-1990, and it was for reportedly violating this condition that federal
|
||||
officials were pursuing him when he dropped out of sight in November 1992.
|
||||
|
||||
In September 1993, the California Department of Motor Vehicles also issued
|
||||
a warrant for his arrest. The warrant stated that Mitnick had wiretapped
|
||||
calls from FBI agents. He then used law-enforcement access codes obtained
|
||||
by eavesdropping on the agents to illegally gain access the drivers'
|
||||
license data base in California.
|
||||
|
||||
Federal law enforcement officials believe that Mitnick has conducted a
|
||||
long string of computer and phone telephone network break-ins during more than
|
||||
two years on the run.
|
||||
|
||||
And they say his ability to remain at large until now illustrates the new
|
||||
challenges that law enforcement officials face in apprehending criminals
|
||||
who can cloak themselves behind a curtain of forged electronic data.
|
||||
|
||||
|
176
textfiles.com/news/mob.hac
Normal file
176
textfiles.com/news/mob.hac
Normal file
@@ -0,0 +1,176 @@
|
||||
|
||||
|
||||
<-> Hackers in the MOB <->
|
||||
|
||||
|
||||
*****************************************************************
|
||||
According to Schmidt, the dollar amounts are only part of
|
||||
the story, GTE Telemail, an electronic mail system, was broken
|
||||
into by at least four gangs of hackers, he says. "They were
|
||||
raising hell. The system got shut down one time for a day. None
|
||||
of these people have been charged, nor have any of the 414s been
|
||||
charged yet.
|
||||
|
||||
"We have a major problem with hackers, phreaks and thieves,"
|
||||
says Schmidt, who estimates that 75% of criminal hackers are
|
||||
teenagers and the other 25% are adults using teenagers to do
|
||||
their dirty work for them.
|
||||
|
||||
"Adults are masterminding some of this activity. There are
|
||||
industrial spies, people playing the stock market with the
|
||||
information- just about any theft or fraud you can do with a
|
||||
computer. There are no foreign agents or organized crime yet,
|
||||
but it's inevitable," he says. "I believe there are some people
|
||||
out there now with possible organized-crime connections.
|
||||
|
||||
"It's an epidemic. In practically every upper-middle class
|
||||
high school this is going on. I know of a high-school computer
|
||||
class in a school in the north Dallas suburbs where the kids are
|
||||
trying everything they can think of to get into the CIA
|
||||
computers."
|
||||
|
||||
"It's a strange culture," says SRI's Parker, "a rite of
|
||||
passage among technology-oriented youth. The inner circle of
|
||||
hackers say they do it primarily for educational purposes and for
|
||||
curiosity. They want to find out what all those computers are
|
||||
being used for. There's a meritocracy in the culture, each one
|
||||
trying to out do the other. The one who provides the most phone
|
||||
numbers and passwords to computer systems rises to the top of the
|
||||
hackers.
|
||||
|
||||
"For the most part it's malicious mischief," Parker says.
|
||||
"They rationalize that they're not really breaking any laws, just
|
||||
'visiting' computers. But that's hard to believe when they also
|
||||
say they've got to do their hacking before they turn 18 so they
|
||||
don't come under adult jurisdiction. After 18, they have to do
|
||||
it vicariously through surrogates. They are some grand old men
|
||||
of hacking who egg on the younger ones... There have been some
|
||||
cases of a Fagin complex- a gang of kids led by one or more
|
||||
adults- in Los Angeles."
|
||||
|
||||
Who are the hackers and what secret knowledge do they have?
|
||||
|
||||
A 17-year-old youth in Beverly Hills, California, announced
|
||||
himself to other hackers on a bulletin board in this way:
|
||||
"Interests include exotic weapons, chemicals, nerve gases,
|
||||
proprietary information from Pacific Telephone..."
|
||||
|
||||
Prized secret knowledge includes the two area codes in North
|
||||
America that have not yet installed electronic switching system
|
||||
central-office equipment. Using this information you can call
|
||||
those areas and use a blue box to blow the central office
|
||||
equipment, and then call anywhere in the world without charge.
|
||||
Other secret information lets you avoid being traced when you do
|
||||
this.
|
||||
|
||||
A knowledge of the phone systems lets hackers share one of
|
||||
the technological privileges usually available only to large
|
||||
corporate customers: long-distance conference calls connecting up
|
||||
to 59 hackers. Schmidt estimates there are three or four
|
||||
conference calls made every night. The hackers swap more inside
|
||||
information during the phone calls.
|
||||
|
||||
Thanks to packet-switching networks and the fact that they
|
||||
don't have to pay long-distance charfus, time and distance mean
|
||||
almost nothing to hackers. Desktop microcompters hook into phone
|
||||
lines via modems make it easy to obtain copyrighted software
|
||||
without human intervention.
|
||||
|
||||
"Software piracy exists only because they can do it over the
|
||||
phone long distance without paying for it," Schmidt says. "some
|
||||
stuff gets sent through the mail, but very little. There are
|
||||
bulletin boards that exist solely for the purpose of pirating
|
||||
software. A program called ASCII Express Professional (AE Pro)
|
||||
for the Apple was designed specifically for modem-to-modem
|
||||
transfers. You can make a copy of anything on that computer. It
|
||||
can be copyrighted stuff- WordStar, anything. There are probably
|
||||
about three dozen boards like that. Some boards exchange
|
||||
information on breaking onto mainframes.
|
||||
|
||||
"In 1982 the FBI really didn't know what to do with all this
|
||||
information," Schmidt says. "There isn't a national computer-
|
||||
crime statue. And unless there's $20,000 involved, federal
|
||||
prosecutors won't touch it."
|
||||
|
||||
Since then, the public and federal prosecutors' interest has
|
||||
picked up. The film War Games and the arrest of 414 group in
|
||||
Milwaukee "created a lot of interest on Congress and with other
|
||||
people," FBI instructor Lewis says. "But, for ourselves it didn't
|
||||
really have any impact."
|
||||
|
||||
"We'd been providing the training already," says Jim Barko,
|
||||
FBI unit chief of the EFCTU (economic and financial crimes
|
||||
training unit). He says public interest may make it easier to
|
||||
fight computer crime. "There are more people interested in this
|
||||
particular area now as a problem. War Games identified the
|
||||
problem. But I think it was just circumstantial that the movie
|
||||
came out when it did."
|
||||
|
||||
Despite the help of knowledgeable informants like Schmidt,
|
||||
tracking down hackers can be frustrating business for the FBI.
|
||||
SRI's Parker explains some of the pitfalls of going after
|
||||
hackers: "Some FBI agents are very discouraged about doing
|
||||
something about the hacking thing. The cost of investigation
|
||||
relative to the seriousness of each case is just too high," he
|
||||
says. "Also, federal regulations from the Department of Justice
|
||||
make it almost impossible for the FBI to deal with a juvenile."
|
||||
|
||||
An FBI agent cannot question a juvenile without his parents
|
||||
or a guardian being present. The FBI approach has been mostly
|
||||
to support lhe local police because local police are the only
|
||||
ones who can deal with juveniles. Another difficulty the agency
|
||||
faces is the regulations about its jurisdiction.
|
||||
|
||||
"There has to be an attack on a government agency, a
|
||||
government contractor or a government-insured institution for the
|
||||
FBI to have clear-cut jurisdiction," Parker says.
|
||||
|
||||
The FBI gets called into a case only after a crime has been
|
||||
detected by the complaining party. The FBI has done a generally
|
||||
competent job of investigating those crimes it was called in to
|
||||
investigate, in Parker's view. But the federal agency's job is
|
||||
not to help government or financial institutions attempt to
|
||||
prevent crimes, nor is its function to detect the crimes in the
|
||||
first place.
|
||||
|
||||
"We're not out detecting any type of crime," says Lewis.
|
||||
"We like to think we can prevent them. We can make
|
||||
recommendations. But do we detect bank robberies or are they
|
||||
reported to us? Or kidnapping- do we detect those? Or
|
||||
skyjacking? There must be some evidence of crime, a crime over
|
||||
which the FBI has jurisdiction. Then we open a case." And
|
||||
despite the spate of arrests and crackdowns last summer, it looks
|
||||
like the FBI will have its hands full in the future: The hackers
|
||||
have not gone away. Like mice running through the utility
|
||||
passages of a large office building, they create damage and
|
||||
inconvenience, but are tolerated as long as their nuisance
|
||||
remains bearable.
|
||||
|
||||
That status could change at any time, however.
|
||||
|
||||
Meanwhile, little electronic "sting" operations similar to
|
||||
Abscam keep the element of danger on the hacker's game. An Air
|
||||
Force telephone network called AUTOVON (a private telephone
|
||||
system connecting computers on every Air Force installation in
|
||||
the world), was reportedly cracked by a hacker last last year.
|
||||
The hacker published lists of AUTOVON dialups on a bulletin
|
||||
board.
|
||||
|
||||
The breach came to the attention `oo the Department of
|
||||
Defense on late 1983, but apparently nothing was done to stop the
|
||||
hackers. Then, in January, the AUTOVON number was answered in a
|
||||
sultry female voice. We wish to thank one and all for allowing
|
||||
us to make a record of all calls for the past few months. You
|
||||
will be hearing from us real soon. Have a happy New Year."
|
||||
|
||||
That's a New Year's message calculated to give any hacker a
|
||||
chill.
|
||||
|
||||
-End of file-
|
||||
|
||||
.
|
||||
|
||||
|
||||
|
||||
DOWNLOADED FROM P-80 SYSTEMS.......
|
||||
|