| ==Phrack Inc.== |
|
|
| Volume Four, Issue Thirty-Nine, File 10 of 13 |
|
|
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
| PWN PWN |
| PWN Phrack World News PWN |
| PWN PWN |
| PWN Issue XXXIX / Part One of Four PWN |
| PWN PWN |
| PWN Compiled by Datastream Cowboy PWN |
| PWN PWN |
| PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN |
|
|
|
|
| To Some Hackers, Right And Wrong Don't Compute May 11, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Bruce V. Bigelow (San Diego Union-Tribune) |
| Special Thanks to Ripper of HALE |
|
|
| The telephone call was anonymous, and the young, male voice was chatty and |
| nonchalant. He wanted to explain a few things about hacking, the black art of |
| tapping into private computers. |
|
|
| He was one of several hackers to call, both frightened and intrigued by a San |
| Diego police investigation into an informal network of computer criminals using |
| high-tech methods to make fraudulent credit-card purchases. Detectives have |
| seized a personal computer and other materials, and arrests are pending in San |
| Diego and other parts of the country. |
|
|
| "Half the time, it's feeding on people's stupidity," the anonymous hacker |
| said, boasting that most computers can be cracked as easily as popping a beer. |
|
|
| Hackers seem full of such bravado. In their electronic messages and in |
| interviews, they exaggerate and swagger. |
|
|
| One message traveling the clandestine network notes: "This text file contains |
| extremely damaging material about the American Express account making |
| algorithm. I do not commit credit card fraud. I just made up this scheme |
| because I was bored. |
|
|
| They form groups with names like "Legion of Doom" and "Masters of Deception," |
| and give themselves nicknames like Phiber Optik, Video Vindicator and Outlaw. |
| They view themselves as members of a computer underground, rife with cat-and- |
| mouse intrigue. |
|
|
| For the most part, they are bring teenagers who are coming of age in a |
| computer-crazy world. Perhaps a generation ago, they tested their anti- |
| authoritarian moxie by shoplifting or stripping cars. But, as it has with |
| just about everything else, the computer has made teenage rebellion easier. |
|
|
| Nowadays, a teenager tapping on a keyboard in the comfort of his bedroom can |
| trespass on faraway corporate computers, explore credit files and surf coast- |
| to-coast on long-distance telephone lines. |
|
|
| San Diego police say that gathering details from computerized files as credit- |
| reporting agencies, hackers around the country have racked up millions of |
| dollars in fraudulent charges -- a trick known as "carding." |
|
|
| Conventual notions of right and wrong seem to go fuzzy in the ethereal realm |
| that hackers call cyberspace, and authorities say the number of crimes |
| committed by computer is exploding nationwide. |
|
|
| Like many hackers, the callers says he's paranoid. He won't give his name and |
| refuses to meed in person. Now a college student in San Diego, he says, he |
| began hacking when he was 13, collecting data by computer like a pack rat. |
|
|
| "I wanted to know how to make a bomb," he said with a laugh. |
|
|
| Like other hackers, he believes their strange underground community is |
| misunderstood and maligned. Small wonder. |
|
|
| They speak a specialized jargon of colons, slashes and equal signs. They work |
| compulsively -- sometimes obsessively -- to decipher and decode, the hacker |
| equivalent of breaking and entering. They exploit loopholes and flaws so they |
| can flaunt their techno-prowess. |
|
|
| "The basis of worth is what you know," the hacker says. "You'll hear the term |
| 'lame' slung around a lot, especially if someone can't do too much." |
|
|
| They exchange credit-card numbers by electronic mail and on digital bulletin |
| boards set up on personal computers. They trade computer access codes, |
| passwords, hacking techniques and other information. |
|
|
| But it's not as if everyone is a criminal, the anonymous hacker says. What |
| most people don't realize, he say, is how much information is out there -- |
| "and some people want things for free, you know?" |
|
|
| The real question for a hacker, he says, is what you do with the information |
| once you've got it. For some, restraint is a foreign concept. |
|
|
| RICH IN LORE |
|
|
| Barely 20 years old, the history of hacking already is rich in lore. |
|
|
| For example, John Draper gained notoriety by accessing AT&T long distance |
| telephone lines for free by blowing a toy whistle from a bod of Cap'n Crunch |
| cereal into the telephone. |
|
|
| Draper, who adopted "Captain Crunch" as his hacker nickname, improved on the |
| whistle with an electronic device that duplicated the flute like, rapid-fire |
| pulses of telephone tones. |
|
|
| Another living legend among hackers is a New York youth known as "Phiber |
| Optik." |
|
|
| "The guy has got a photographic memory,' said Craig Neidorf of Washington, who |
| co-founded an underground hacker magazine called Phrack. "He knows everything. |
| He can get into anything." |
|
|
| Phiber Optik demonstrated his skills during a conference organized by Harper's |
| Magazine, which invited some of the nation's best hackers to "log on" and |
| discuss hacking in an electronic forum. Harper's published a transcript of the |
| 11-day discussion in it's March 1990 issue. |
|
|
| One of the participants, computer expert John Perry Barlow, insulted Phiber |
| Optik by saying some hackers are distinguished less by their intelligence than |
| by their alienation. |
|
|
| "Trade their modems for skateboards and only a slight conceptual shift would |
| occur," Barlow tapped out in his message. |
|
|
| Phiber Optik replied 13 minutes later by transmitting a copy of Barlow's |
| personal credit history, which Harper's editors noted apparently was obtained |
| by hacking into TRW's computer records. |
|
|
| For people like Emmanuel Goldstein, true hacking is like a high-tech game of |
| chess. The game is in the mind, but the moves are played out across a vast |
| electronic frontier. |
|
|
| "You're not going to stop hackers from trying to find out things," said |
| Goldstein, who publishes 2600 Magazine, the hacker quarterly, in Middle |
| Island, New York. |
|
|
| "We're going to be trying to read magnetic strips on cards," Goldstein said. |
| "We're going to try to figure out how password schemes work. That's not |
| going to change. What has to change is the security measures that companies |
| have to take." |
|
|
| ANGELHEADED HIPSTERS |
|
|
| True hackers see themselves, in the words of poet Allen Ginsberg, as |
| "Angelheaded hipsters burning for the ancient heavenly connection to the |
| starry dynamo in the machinery of night." These very words were used by Lee |
| Felsenstein, designer of the Osborne-1 computer and co-founder of the Homebrew |
| Computer Club. |
|
|
| But security consultants and law enforcement officials say malicious hackers |
| can visit havoc upon anyone with a credit card or driver's license. |
|
|
| "Almost none of it, I would say less than 10 percent, has anything to do with |
| intellectual exploration," said Gail Thackeray, a Phoenix prosecutor who has |
| specialized in computer crimes. "It has to do with defrauding people and |
| getting stuff you want without paying for it." |
|
|
| Such crimes have mushroomed as personal computers have become more affordable |
| and after the break up of AT&T made it more difficult to trace telephone calls, |
| Thackeray said. |
|
|
| Even those not motivated by financial gain show a ruthlessness to get what they |
| want, Thackeray said. |
|
|
| "They'll say the true hacker never damages the system he's messing with," |
| Thackeray said, "but he's willing to risk it." |
|
|
| Science-fiction writer Bruce Sterling said he began getting anonymous calls |
| from hackers after an article he wrote about the "CyberView 91" hacker |
| convention was published in Details Magazine in October. |
|
|
| The caller's were apparently displeased with Sterling's article, which noted, |
| among other things, that the bustling convention stopped dead for the season's |
| final episode of "Star Trek: The Next Generation." |
|
|
| "They were giving me some lip," Sterling said. They showered him with |
| invective and chortled about details from Sterling's personal credit history, |
| which they had gleaned by computer. |
|
|
| They also gained access to Sterling's long distance telephone records, and |
| made abusive calls to many people who has spoken to Sterling. |
|
|
| "Most of the news stories I read simplify the problem to the point of saying |
| that a hacker is a hacker is a hacker," said Donn Parker, a computer security |
| consultant with SRI International in Menlo Park. |
|
|
| "In real life, what we're dealing with is a very broad spectrum of |
| individuals," Parker says. "It goes all the way from 14-year olds playing |
| pranks on their friends to hardened juvenile delinquents, career criminals and |
| international terrorists." |
|
|
| Yet true hackers have their own code of honor, Goldstein says. Computer |
| trespassing is OK, for example, but altering or damaging the system is wrong. |
|
|
| Posing as a technician to flim-flam access codes and passwords out of |
| unsuspecting computers users is also OK. That's called "social engineering." |
|
|
| "They're simply exploring with what they've got, weather it's exploring a |
| haunted house or tapping into a mainframe," Goldstein said. |
|
|
| "Once we figure things out, we share the information, and of course there are |
| going to be those people that abuse that information," Goldstein added. |
|
|
| It is extremely easy to break into credit bureau computers, Goldstein says. |
| But the privacy being violated belongs to individual Americans -- not credit |
| bureaus. |
|
|
| If anything, credit bureaus should be held accountable for not providing |
| better computer security, Goldstein argues. |
| _______________________________________________________________________________ |
|
|
| Companies Fall Victim To Massive PBX Fraud April 20, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Barbara E. McMullen & John F. McMullen (Newsbytes) |
|
|
| NEW YORK CITY -- Appearing on the WBAI radio show "Off The Hook," New York |
| State Police senior investigator Donald Delaney discussed the movement of |
| organized crime groups into telecommunications fraud and warned the public |
| of the dangers of such practices as "shoulder surfing." |
|
|
| Delaney said that corporations are being victimized to the tune of millions of |
| dollars by unauthorized persons "outdialing" through their private branch |
| exchanges (PBXs). He traced the case of Data Products, a computer peripheral |
| firm, that did not even seem aware that calls could be routed from the outside |
| through their switchboard to foreign countries. It was only, according to |
| Delaney, when it received a monthly telephone bill of over $35,000 that it |
| perceived a problem. |
|
|
| "It was at 5:10 PM on a certain date that Liriano finally, after weeks of |
| trying, was able to obtain an outside dial tone on Data Products 800 number. |
| Subsequent investigation showed that thousands of calls using a 9600 baud modem |
| as well as manually placed calls had been made to the 800 number. At 7:30 the |
| same evening, a call using the Data Products number was placed to the Dominican |
| Republic from a telephone booth near Liriano's house. Within a few hours, |
| calls were placed from phones all around the neighborhood -- and, within a |
| week, calls began being placed from booths all around Manhattan," Delaney |
| related. |
|
|
| Phiber Optik, another studio guest and a convicted computer intruder previously |
| arrested by Delaney, commented, "I'm glad that Mr. Delaney didn't refer to |
| these people as hackers, but identified them for what they are: Sleezy common |
| criminals. What these people are doing requires no super computer knowledge |
| nor desire to learn. They are simply using computers and telephones to steal." |
|
|
| Delaney agreed, saying, "The people actually selling the calls, on the street |
| corner, in their apartments, or, in the case of cellular phones, in parked |
| cars, don't have to know anything about the technology. They are given the |
| necessary PBX numbers and codes by people higher up in the group and they just |
| dial the numbers and collect the money. In the case of the re-chipped or clone |
| cellular phones, they don't even have to dial the numbers." |
|
|
| Delaney added, "These operations have become very organized very rapidly. I |
| have arrested people that have printed revenue goals for the current month, |
| next six months, and entire year -- just like any other franchise operation. |
| I'm also currently investigating a murder of a call-seller that I arrested last |
| October. He was an independent trying to operate in a highly organized and |
| controlled section of Queens. His pursuit of an independent career may well |
| have been responsible for his death." |
|
|
| Off The Hook host Emmanuel Goldstein asked Delaney what responsibility that the |
| PBX companies bear for what seems to be rather easy use of their systems for |
| such activity. Delaney responded that he thought that the companies bear at |
| least an ethical and moral responsibility to their clients to insure that they |
| are aware of their exposure and the means that they must take to reduce the |
| exposure. "As far as criminal and civil responsibility for the security of the |
| system, there are no criminal statues that I am aware of that would hold the |
| PBX companies criminally liable for failure to insure proper security. On the |
| civil side, I think that the decision in the AT&T suit about this very topic |
| will shed some light of legal responsibility." |
|
|
| Goldstein also brought up the difficulties that some independent "customer- |
| owned coin-operated" telephones (COCOTs) cause for customers. "The charges are |
| often exorbitant, access to AT&T via 10288 is sometimes blocked, there is not |
| even the proper access to 911 on some systems, and some either block 800 calls |
| or actually try to charge for the connection to the 800 numbers. |
|
|
| "We've even found COCOTs that, on collect calls, put the charges through when |
| an answering machine picks up and the caller hangs up after realizing that no |
| one is home. They are set up to start billing if a human voice is heard and the |
| caller doesn't hang up within 5 or 10 seconds." |
|
|
| Delaney agreed that the COCOTS that behave in this fashion are an ongoing |
| problem for unsuspecting users, but said that he has received no complaints |
| about illegal behavior. He said, however, that he had received complaints |
| about fraudulent operation of 540 numbers -- the local New York equivalent of a |
| 900 number. He said "most people don't realize that a 540 number is a |
| chargeable number and these people fall victim to these scams. We had one case |
| in which a person had his computer calling 8,000 phone numbers in the beeper |
| blocks each night. The computer would send a 540 number to the beepers. |
| People calling the number would receive some innocuous information and, at the |
| end of the month a $55 charge on her/his telephone bill." |
|
|
| Delaney continued, "The public has much to be worried about related to |
| telephone fraud, particularly in New York City which can be called "Fraud |
| Central, USA." If you go into the Port Authority Bus Terminal and look up in |
| the balcony, you will see rows of people "shoulder surfing" with binoculars. |
| They have binoculars or telescopes trained on the public telephones. When they |
| see a person making a credit card call, they repeat the numbers into a tape |
| recorder. The number is then sold and, within a few days, it is in use all |
| around the city. People should always be aware of the possibility of shoulder |
| surfers in the area." |
|
|
| Goldstein returned to the 540 subject, pointing out that "because so many |
| people don't realize that it is a billable number, they get caught by ads and |
| wind up paying for scam calls. We published a picture in 2600 Magazine of a |
| poster seen around New York, advertising apartment rental help by calling a |
| 540 number. In very tiny print, almost unreadable, it mentions a charge. |
| People have to be very careful about things like this." |
|
|
| Delaney agreed, saying, "The 540 service must say within the first 10 seconds |
| that there is a charge, how much it is, and that the person can hang up now |
| without being charged -- the guy with the beeper scam didn't do that and that |
| was one of the reasons for his arrest. Many of the services give the charge so |
| fast and mix it in with instructions to stay on for a free camera or another |
| number to find out about the vacation that they have won that they miss the |
| charges and wind up paying. The 540 person has, although he may be trying to |
| defraud, complied with the letter of the law and it might be difficult to |
| prosecute him. The average citizen must therefore be more aware of these scams |
| and protect themselves." |
|
|
| Goldstein, Phiber Optik, and Delaney spent the remainder of the show answering |
| listener questions. Off The Hook is heard every Wednesday evening on New York |
| City's WBAI (99.5 FM). Recent guests have included Mike Godwin, in-house |
| counsel of the Electronic Frontier Foundation; and Steve Jackson, CEO of Steve |
| Jackson Games. |
| _______________________________________________________________________________ |
|
|
| Changing Aspects Of Computer Crime Discussed At NYACC May 15, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Barbara E. McMullen (Newbytes) |
|
|
| New York City -- Donald Delaney, New York State Police senior investigator, and |
| Mike Godwin, in-house counsel, Electronic Frontier Foundation (EFF), speaking |
| to the May meeting of the New York Amateur Computer Club (NYACC), agreed that |
| the entrance of organized crime into telecommunications fraud has made the |
| subject of computer crime far different than that discussed just a year ago at |
| a similar meeting. |
|
|
| Newsbytes New York bureau chief John McMullen, moderating the discussion, |
| recalled that Delaney in last year's appearance had called for greater |
| education of law enforcement officers in technological areas, the establishment |
| of a New York State computer crime lab, outreach by law enforcement agencies to |
| the public to heighten awareness of computer crime and the penalties attached |
| -- items that have all come to pass in the ensuing 12 months. He also |
| mentioned that issues involving PBX & cellular phone fraud, privacy concerns |
| and ongoing debate over law enforcement wiretapping & decryption capabilities |
| have replaced the issues that received most of the attention at last year's |
| meeting. |
|
|
| Delaney agreed with McMullen, saying that there has been major strides made in |
| the education of law enforcement personnel and in the acquisition of important |
| tools to fight computer crime. He said that the practice of "carding" -- the |
| purchasing of goods, particularly computer equipment, has become a much more |
| major problem than it was a year ago and that many more complaints of such |
| activities are now received. |
|
|
| He added that "call-selling" operations, the making of international telephone |
| calls to foreign countries for a fee, through the fraudulent use of either a |
| company's private branch exchange (PBX) or an innocent party's cellular phone |
| account, has become so lucrative that arrested suspects have told him that |
| "they are moving from drug sales to this type of crime because it is less |
| dangerous and more rewarding." |
|
|
| Delaney pointed out, however, that one of his 1991 arrests had recently been |
| murdered, perhaps for trying to operate as an independent in an area that now |
| seems to be under the control of a Columbian mob "so maybe it's not going to |
| continue to be less dangerous." |
|
|
| Delaney also said that PBX fraud will continue to be a problem until the |
| companies using PBX systems fully understand the system capabilities and take |
| all possible steps to insure security. "Many firms don't even know that their |
| systems have out-dialing capabilities until they get it with additional monthly |
| phone charges of upwards of $35,000. They don't realize that the system has |
| default passwords that are supposed to be changed," he said, "It finally hits |
| some small businesses when they are bankrupted by the fraudulent long-distance |
| charges." |
|
|
| Godwin, in his remarks, expressed concern that there is not sufficient |
| recognition of the uniqueness of BBS and conferencing systems and that, |
| therefore, legislators possibly will make decisions based on misunderstandings. |
| He said "Telephone conversations, with the exception of crude conference call |
| systems are 'one-to-one' communications. Newspapers and radio & telephone are |
| "one-to-many" systems but BBS" are "many-to-many" and this is different. EFF |
| is interested in seeing that First Amendment protection is understood as |
| applying to BBSs." |
|
|
| He continued "We also have a concern that law enforcement agencies will respond |
| to the challenges of new technology in inappropriate ways. The FBI and Justice |
| Department, through the 'Digital Telephony Initiative' have requested that the |
| phone companies such at AT&T and Sprint be required to provide law enforcement |
| with the a method of wire-tapping in spite of technological developments that |
| make present methods less effective. |
|
|
| "Such a procedure would, in effect, make the companies part of the surveillance |
| system and we don't think that that is their job. We think that it is up to |
| law enforcement to develop their own crime-fighting tools. When the telephone |
| was first developed it made it more difficult to catch crooks. They no longer |
| had to stand around together to plan foul deeds; they could do it by telephone. |
| Then the government discovered wiretapping and was able to respond. |
|
|
| "This ingenuity was shown again recently when law enforcement officials, |
| realizing that John Gotti knew that his phones were tapped and discussed |
| wrongdoings outdoors in front of his house, arranged to have the lampposts |
| under which Gotti stood tapped. That, in my judgement, is a reasonable |
| approach by law enforcement." |
|
|
| Godwin also spoke briefly concerning the on-going debate over encryption. "The |
| government, through varies agencies such as NSA, keeps attempting to restrict |
| citizens from cloaking their computer files or messages in seemingly |
| unbreakable coding. We think that people have rights to privacy and, should |
| they wish to protect it by encoding computer messages, have a perfect right to |
| do so." |
|
|
| Bruce Fancher, sysop and owner of the new New York commercial BBS service, |
| MindVox, and the last speaker in the program, recounted some of his experiences |
| as a "hacker" and asked the audience to understand that these individuals, even |
| if found attached to a computer system to which they should not legitimately |
| access, are not malicious terrorists but rather explorers. Fancher was a last |
| minute replaced for well-known NY hacker Phiber Optik who did not speak, on the |
| advice of his attorney, because he is presently the subject of a Justice |
| Department investigation. |
|
|
| During the question and answer period, Delaney suggested that a method of |
| resolving the encryption debate would be for third parties, such as banks and |
| insurance companies, to maintain the personal encryption key for those using |
| encryption. A law enforcement official would then have to obtain a judge's |
| ruling to examine or "tap" the key for future use to decipher the contents of |
| the file or message. |
|
|
| Godwin disagreed, saying that the third party would then become a symbol for |
| "crackers" and that he did not think it in the country's best interests to just |
| add another level of complexity to the problem. |
|
|
| The question and answer period lasted for about 45 minutes with the majority of |
| questions concerning encryption and the FBI wiretap proposal. |
| _______________________________________________________________________________ |
|
|
| Couple Of Bumbling Kids April 24, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~ |
| By Alfred Lubrano (Newsday) |
|
|
| Two young Queens computer hackers, arrested for the electronic equivalent of |
| pickpocketing credit cards and going on a computer shopping spree, will be |
| facing relatively minor charges. |
|
|
| Rudolph Loil, age 17, of Woodside, charged with attempted grand larceny, was |
| released from police custody on a desk appearance ticket, a spokesman for the |
| Queens district attorney's office said. |
|
|
| A 15-year-old friend from Elmhurst who was also arrested was referred to Queens |
| Family Court, whose proceedings are closed, the spokesman said. He was not |
| identified because of his age. |
|
|
| Law-enforcement sources said they are investigating whether the two were |
| "gofers" for adults who may have engaged them in computer crime, or whether |
| they acted on their own. |
|
|
| But Secret Service officials, called into the matter, characterized the case as |
| "just a couple of bumbling kids" playing with their computer. |
|
|
| The youths were caught after allegedly ordering $1,043 in computer equipment |
| with a credit card number they had filched electronically from bank records, |
| officials said. |
|
|
| - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
|
|
| Hackers April 27, 1992 |
| ~~~~~~~ |
| Taken from InformationWeek (Page 8) |
|
|
| Two teenagers were arrested last week in New York for using computers to steal |
| credit card and telephone account numbers and then charging thousands of |
| dollars worth of goods and phone calls to the burgled accounts. |
|
|
| The two were caught only after some equipment they had ordered was sent to the |
| home of the credit card holder whose account number had been pilfered. Their |
| arrests closely follow the discovery by the FBI of a nationwide ring of 1,000 |
| computer criminals, who charge purchases and telephone calls to credit card and |
| phone account numbers stolen from the Equifax credit bureau and other sources. |
|
|
| The discovery has already led to the arrest of two Ohio hackers and the seizure |
| of computer equipment in three cities. |
| _______________________________________________________________________________ |
|
|
| DOD Gets Fax Evesdroppers April 14, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By Joseph Albright (Atlanta Journal and Constitution)(Page A12) |
|
|
| Washington -- The Air Force is buying a new weapon to battle leaks: A $30,000 |
| portable fax-tapper. |
|
|
| Whenever someone transmits a fax, the fax-tapping device attached to the phone |
| line will sneak an electronic copy and store it in a laptop computer's memory. |
| Each of the new devices will enable an Air Force intelligence officer to |
| monitor four telephones for "communications security" violations. |
|
|
| Susan Hansen, a Defense Department spokeswoman, said last week that "there is |
| no plan right at the moment" to install the devices in the Pentagon, whose |
| top leaders have been outraged in recent weeks by leaks of classified policy |
| documents to reporters. |
|
|
| But she left open the possibility that some of them will be attached to |
| sensitive military fax lines when the tapping devices are delivered to the Air |
| Force six months to a year from now. |
|
|
| "There are a lot of things that are under review here," she said after |
| consulting with the Pentagon's telecommunications office. |
|
|
| Plans to buy 40 of the devices were disclosed a few weeks ago in a contract |
| notice from a procurement officer at Wright-Patterson Air Force Base near |
| Dayton, Ohio. When contacted, a spokesman referred inquiries to the Air |
| Force Intelligence Command at Kelly Air Force Base, Texas, which authorized the |
| purchase. |
|
|
| The Air Force Intelligence Command insisted that the devices will never be used |
| for law enforcement purposes or even "investigations." |
|
|
| "The equipment is to be used for monitoring purposes only, to evaluate the |
| security of Air Force official telecommunications," said spokesman Dominick |
| Cardonita. "The Air Force intelligence command does not investigate." |
|
|
| Mr. Cardonita said that, for decades, Air Force personnel in sensitive |
| installations have been on notice that their voice traffic on official lines is |
| subject to "communications security" monitoring. The fax-tapper simply |
| "enhances" the Air Force's ability to prevent "operational security" |
| violations, he said. |
|
|
| He estimated that the Air Force will pay $1.2 million under the contract, due |
| to be let this June. That averages out to $ 30,000 for each fax-tapper, but |
| Mr. Cardonita said the price includes maintenance and training. |
|
|
| Douglas Lang, president of Washington's High Technology Store and an authority |
| on security devices, said that, so far as he knows, the Air Force is the first |
| government agency to issue an order for fax-tapping machines. |
|
|
| Mr. Lang said he has heard from industry sources that 15 contractors have |
| offered to sell such devices to Wright-Patterson. |
|
|
| "It is one more invasion of privacy by Big Brother," declared Mr. Lang, who |
| predicted that the Air Force will use the devices mainly to catch anyone trying |
| to leak commercially valuable information to contractors. |
|
|
| Judging from the specifications, the Air Force wants a machine that can trace |
| leaks wherever they might occur. |
|
|
| Mr. Cardonita said the Air Force Intelligence Command will use the devices |
| only when invited onto an Air Force base by a top commander. |
| _______________________________________________________________________________ |
|
|
| 900-Number Fraud Case Expected to Set a Trend April 2, 1992 |
| ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| By David Thompson (Omaha <Nebraska> World-Herald) |
|
|
| Civil court cases against abuses of 900-toll telephone number "will be slam |
| dunks" as the result of the successful prosecution of a criminal case in Omaha |
| over 900 numbers, a federal postal inspector said. |
|
|
| Postal inspector Michael Jones said numerous civil actions involving 900 |
| numbers have been filed, including three recently in Iowa. At least one civil |
| case is pending in Nebraska, he said, and there may be others. |
|
|
| Jones said the mail fraud conviction of Bedford Direct Mail Service Inc. of |
| Omaha and its president, Ellis B. Goodman, 52, of 1111 South 113th. Court, may |
| have been the first criminal conviction involving 900 numbers. |
|
|
| The conviction also figures in Nebraska Attorney General Don Stenberg's |
| consumer protection program, which calls attention to abuses of 900 numbers, a |
| staff member said. |
|
|
| Among consumer complaints set to Stenberg's office, those about 900 numbers |
| rank in the top five categories, said Daniel L. Parsons, senior consumer |
| protection specialist. |
|
|
| People are often lured by an offer of a gift or prize to dial a toll-free 800 |
| number, then steered to a series of 900 numbers and charged for each one, |
| Parsons said. |
|
|
| He said that during the last two years, state attorneys general have taken |
| action against 150 organizations for allegedly abusing 900 numbers. |
| _______________________________________________________________________________ |
|
|