"The likelihood of getting arrested for computer hacking has increased to an unprecedented level. No matter how precautionary or sage you are, you're bound to make mistakes. And the fact of the matter is if you have trusted anyone else with the knowledge of what you are involved in, you have made your first mistake." -@OsiriS@-
|
AT&T Finds 'There's Sharks in These Waters' |
by Fiber Optics News |
| AT&T officials have found that sharks have attacked their TAT-8 fiber optic test bed cable system in the Grand Canary Islands 3 times.
|
|
Amateur Hackers Tripped Up |
by Danna Dykstra Coy |
| San Luis Obispo police have cracked a case of computer hacking. Now they've
got to work out the bugs. Officers were still interviewing suspects late
Friday linked to a rare case of computer tampering that involved at least four
people, two of them computer science majors from Cal Poly. |
|
An Apple For The Captain |
by Stephen Wozniak |
| The best prank I've seen with the Apple was played by Cap'n Crunch. John Draper, one of Apple's first employees, was responsible for designing a telephone board for us. |
|
An Introduction to the Computer Undergound |
|
An introduction to the Computer Underground |
|
Article about the sentencing of 3 members of the L |
|
Article on Kevin Mitnick, the world's most wanted |
|
Bulletin Board User Says Her Privacy Was Violated |
by Brock N. Meeks |
| Linda Thompson alleges that BBS operator Bob Predaina violated her privacy rights as they relate to her electronic correspondence. The suit cites 10 counts under the federal Electronic Communications Privacy Act of 1986 and Indiana state law. |
|
Colorado Cops Go Online |
by Bulletin Board Systems |
| Larry Scheideman said the IBM PC was just sitting in a corner doing nothing when he suggested that the Lakewood, CO, Department of Public Safety sponsor a bulletin board. |
|
Congressional Testimony of Emmanuel Goldstein |
| Edward J. Markey (D-MA) and Jack Fields (R-TX) launched into a tirade against the evils of computer hackers and generally demonstrated their ignorance on the subject and their unwillingness to listen to anything that didn't match their predetermined conclusions. Those conclusions are basically that 2600 Magazine is a manual for criminals and that hackers are a blight on civilization. |
|
Crime and Puzzlement |
by John Perry Barlow |
| By this, I knew that the WELL had a new resident and that his corporeal
analog was supposedly called Acid Phreak. Typing !finger optik yielded
results of similar insufficiency, including the claim that someone, somewhere
in the real world, was walking around calling himself Phiber Optik. I doubted
it. |
|
Defeating Computer Forensics |
by protonigger (a.k.a Murder Mouse) |
| A quick guide to keeping your data out of the law's hands. |
|
Don't Throw Out The Computer With The Crime |
by Dick Adler |
| Chicago Tribune article on NIRVANAnet(tm) |
|
Electronic Crime Scene Investigation: A Guide for First Responder |
by NIJ |
| Computers and other electronic devices are present in every aspect of modern life. At one time, a single computer filled an entire room; today, a computer can fit in the palm of your hand. The same technological advances that have helped law enforcement are being exploited by criminals. |
|
Elementary school kids in Berkeley get brainwashed |
|
Everything a Hacker Needs to Know About Being Busted by the Feds |
by Agent Steal |
| The likelihood of getting arrested for computer hacking has increased to an
unprecedented level. No matter how precautionary or sage you are, you're
bound to make mistakes. And the fact of the matter is if you have trusted
anyone else with the knowledge of what you are involved in, you have made
your first mistake. |
|
Geraldo Rivera Browbeats Craig Neidorf |
| On Sept 30, Geraldo Rivera's show focused on "hackers." Not surprisingly, the commentary was closer to sensationalistic fiction than fact. Those who saw the original airing described Rivera's framing of the issue as reprehensible, and his comments about Craig Neidorf were described as potentially slanderous. |
|
Going Undercover In The Computer Underworld |
by Ralph Blumenthal |
| He patrols the back alleys of cyberspace at the edge of the electronic
frontier. Traveling on beams of electrons, he is invisible, formless --
the ultimate undercover agent. He's "Phrakr Trakr" of the Hi-Tech Crime Network. But don't look for him in comic books or the video store. He's real. |
|
Guidelines for Evidence Collection and Archiving |
by Dominique Brezinski |
| A "security incident" as defined in [RFC2828] is a security-relevant system event in which the system's security policy is disobeyed or otherwise breached. The purpose of this document is to provide System Administrators with guidelines on the collection and archiving of evidence relevant to such a security incident. |
|
How RIPCO got busted (great read) |
|
How phone phreaks are caught |
|
How to talk to the press |
|
Info about the SJG trial |
|
Is Computer Hacking a Crime? |
| The image of the computer hacker drifted into public awareness in the
middle Seventies, when reports of Chinese-food-consuming geniuses working
compulsively at keyboards began to issue from MIT. Over time, several of
these impresarios entered commerce, and the public's impression of hackers
changed. |
|
Kevin's Story |
by Kevin Mitnick |
| The banned first chapter of Kevin Mitnick's new book, Defensive Thinking. It was removed without comment by his publisher at the last minute. |
|
Kollywabbles rant from Crypt #32 about the Contra |
|
Legion of Doom Sells out |
|
Millbrae Police Arrest Alleged Teen 'Hackers' |
by John Curry |
| A telephoned bomb threat to the White House early this summer led to the arrest Wednesday of two teen-age "computer hackers" in Millbrae. |
|
New Jersey Hacker Case Test of Sysops' Free Speech |
by Bulletin Board Systems |
| Prosecutors told reporters that the individuals exchanged information that would allow them to access commercial computers without authorization and that some of them had codes that could cause communications satellites to ''change position.'' |
|
Night Shift Backs Free Speech Issues |
| BBS explorers who want to express their support for unrestricted online
data communication might want to check out the Night Shift Bulletin Board in
New York. |
|
Nightline: FBI, Privacy, and wire- tapping |
|
On-line and Out-of-Bounds |
by Julian Dibbell |
| The U.S. Secret Service, and a couple of security guys from the telco, told her that they wanted to talk to her 20 year old son. They had reason to belive that Joey was a phone-systems hacker - a phone phreak - known in the computer underground as Acid Phreak. They had reason to believe he was a leader of the notorious hacker organization known as the LoD. They also suspected he was responsible for the multi-million dollar AT&T system crash on 1/5, wich disrupted long-distance service for 9 hours. Joey's mom was not thrilled.
|
|
Phone Hackers are Tapping PBXs (article) |
|
Phone Phreak Bugs FBI |
by Scanman |
| Old news article on Captain Crunch and the telco's auto-verify system. |
|
Phone company illegally blocks calls |
|
Police Set Up Bulletin Board Stings |
by Jim Forbes |
| Law enforcement officials here have joined a growing number of police agencies nationwide running "sting"operations to catch persons using bulletin boards for illegal purposes.
|
|
Response to Questions |
by US Secret Service |
| The process by which the Secret Service investigates computer related crimes is similar to the methods we use to investigate other types of criminal investigations. Most of the investigative techniques are the same; surveillances, record checks, witness and suspect interviews, etc. the primary difference is we had to develop resources to assist in the collection and review of computer evidence. |
|
Rights of Expression in CyberSpace |
|
Secret Service is Found Guilty in Steve Jackson Ca |
|
Seizure Warrant Documents for RipCo BBS |
|
Sentencing Guidelines too Harsh |
by Shari Steele |
| Sentencing Guidelines applicable to violations of the Computer Fraud and Abuse Act of 1988. |
|
Series of articles on police investigations into c |
|
Series of articles/interviews about hackers who ha |
|
Sky Tower BBS |
| The time is 20:38 and I've just got off the phone. It was Enzo, the sysop at Sky
Tower. He got busted today. The cops came to his place at around 7 am with
a warrant (a year old!) and took all his equipment, Amiga, monitors,
modems, his PC, dat, etc. and took him to the police station.
|
|
Steve Jackson Games case decision |
|
Steve Jackson Games response to motion to dismiss |
|
Steve Jackson Games sues the government! |
|
Story about the Treasury Department's AIS BBS, whi |
|
Striking Back at the Hackers |
by John Carey |
| Stung and embarrased by youthful hackers who have repeatedly broken into its central computer system, TRW information services has launched a major counter attack on underground computer based "bulletin boards". |
|
Sysop Jailed in Georgia |
by Lance Rose |
| Adult BBS' continue to spread across the country. Many of them openly carry
industrial-strength hardcore materials, without much apparent concern for
legal reprisals. |
|
The Constitution in CyberSpace |
|
The Contra Costa Times vs. NIRVANAnet(tm) |
by Michael Liedtke |
| THE CONTRA COSTA TIMES VS. NIRVANAnet(tm) by Michael Liedtke with follow-ups from Demented Pimento, Sam Uzi, Poindexter Fortran, Quaker State Tapioca Rupture, Suzanne d'Fault, and Your Kindly Parole Officer. |
|
The Ethics of Computer Network Attack |
by William J. Bayles |
| Current joint military doctrine includes computer network attack and several more traditional military disciplines in the term "information operations". Defined as "actions taken to affect adversary information and information systems while defending one's own information and information systems," IO encompasses operations security, psychological operations, military deception, electronic warfare, physical attack, and computer network attack. |
|
The Fear & Loathing BBS Was Busted! |
by Empedocles |
| At 8 am. - The FBI from Birmingham, Alabama came in and presented a Search
Warrant dated 7/29/93 and proceded to swipe every piece of Electronics
from The Doctor - SYSOP of the Fear & Loathing BBS.
|
|
The Forbidden Zone BBS |
| Messages from Users on the Fall of the Forbidden Zone BBS. |
|
The Great Satellite Caper |
by Phillip Elmer-DeWitt |
| It started innocuously enough: a
credit card customer in Connecticut
opened his monthly statement and
noticed a charge for a piece of
electronic equipment that he had never
purchased. By last week that apparent
billing error had blossomed into a
full-fledged hacker scandal and led to
the arrest of seven New Jersey
teenagers who were charged with
conspiracy and using their home
computers and telephone hookups to
commit computer theft. |
|
The Hacker Menace and Electronic Bulletin Boards |
| With the advent of home computers, and the teaching of computer basics at the grade school level, the average age of the begininning (youth) hacker has dropped to only 14!! The overwhelming majority of BBS owners and users are teenagers. Teens tend to form cliques and peer groups, so the formation of phone phreak and hacker gangs was inevitable. |
|
The IBM Bust of 612 |
by Professor Falken |
| Magnus gave him access and Vector looked at the utilties. Well
it so happens that Vector was a software writer for ONTRACK SYSTEMS or
something. Well it so happens that Magnus had DISK MANAGER that was written
by ONTRACK SYSTEMS. Well Vector told Magnus to take that ware down! Becuz it
was his companies ware. Well as any decent sysop would he told Vector to suck
wally. |
|
The Night of the Hackers |
by Richard Sandza |
| PHBI and scores of other computer bulletin boards are hangouts of a new generation of vandals. These precocious teenagers use their electronic skills to play hide-and-seek with computer and telephone security forces. |
|
The Night of the Hackers |
by Richard Sandza |
| Punch in another number and your modem zips off the touch tones. Here
we come across the inevitably tedious side of all this... Bulletin boards are
popular. No vacancy in Bates Motel (named for Anthony Perkin's creepy motel
in the movie "Psycho"); the line is busy. |
|
This is a partial xscript of Neidorf's hearing |
|
USA v. RaiseTheFist.com |
by John Pi, FBI Special Agent |
| A copy of the text of the FBI's search warrant issued against RaiseTheFist.com. |
|
Your Rights as a Phone Phreak |
by Fred Steinbeck |
| "Oh, I'm not worried. They can't tap my line without a court order." Ever
catch yourself saying that? If so, I'll wager you don't know too much about
the laws that can prove to be the downfall of many a phone phreak. But you are
wagering your freedom and money that you do know. Odds are you don't. At
least, I didn't, and I had a very painful experience finding out. |