?? sundevil.txt
字號:
{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{} {}{} ** PUSH BUTTON FELONIES ** {}{} {}{} KPFA-FM RADIO BROADCAST JULY 26, 1990 AT 12:00 NOON {}{} {}{} ELECTRONIC TEXT -- PUBLIC INFORMATION FILE {}{} {}{} ** SPECIAL EDITION ** {}{} from {}{} THE EPIC PROJECT {}{} a nonprofit public electronic publishing corporation {}{} {}{} {}{} P.O. Box 5080-341 Electronic Netmail Address {}{} Fairfield, Ca. 94533 jefrich@well.sf.ca.us {}{} Jeff Aldrich, Contact: Voice: (707)425-6813 {}{} Data: (707)429-1545 Fax: (707)425-9811 {}{} {}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{}{} NOTICE This text file contains copies of press releases by governmentagencies, citizen action organizations, and transcripts of events receivedby The EPIC Project. They example both the personal information power oftelecommunication technology and the current threat to our basic civilliberties -- our rights to privacy and to protection against unwarrantedsearches and seizures. Panelists on the KPFA-FM "Push Button Felonies"broadcast are responsible for some of these documents. This electronic textinformation is provided to KPFA listeners by The EPIC Project to increaseunderstanding of the issues discussed in this broadcast. The EPICProject makes no warranty as to document accuracy, expressed or implied.==========================================================================KPFA-FM Studio Panelists:Assistant Arizona Attorney General Gail Thackery.Marc Rotenberg of Computer Professionals for Social ResponsibilityA Telecommunication Industry Service Provider RepresentativeKPFA-FM Telephone Panelist:Jeff Aldrich, Founder of The EPIC Project Electronic Publishing Corp.=========================================================================== CONTENTSLine 75: Operation Sun Devil: Press ReleaseLine 162: Operation Sun Devil: Secret Service StatementLine 230: News Excerpts about Operation Sun Devil Source: Computer Underground Digest Issue #1.09Line 393: Letter from the Director of the Secret Service to Rep. Don EdwardsLine 692: CPSR FOIA Request to the FBI Regarding BBS SurveillanceLine 804: CPSR letter to Congressman Don Edwards regarding FOIA requestLine 901: Chronology of events Source: Computer Professionals for Social Responsibility (CPSR)Line 1048: Sun Devil gives birth to the Electronic Frontier FoundationLine 1141: Electronic Frontier Foundation: Mission StatementLine 1190: Electronic Frontier Article by John Perry Barlow and Mitchell KaporLine 1374: CPSR Expands Civil Liberties ProgramLine 1464: EFF Supported Legal Case SummaryLine 1801: The Electronic Frontier and The Bill of Rights Source: Electronic Frontier Foundation (EFF)Line 2036: U.S. Attorney Visits The EPIC Project Online After July 5th KPFA Electronic Citizen Broadcast: A Sysop Chat with the Feds Source: The EPIC ProjectNOTE: Line numbers are approximate**************************************************************************************************************************************** U.S. Department of Justice United States Attorney District of Arizona 4000 United States Courthouse Phoenix, Arizona 82505 602-379-3011 /FTS/261-3011 PRESS RELEASEFOR IMMEDIATE RELEASE: CONTACT: Wendy HarnagelWednesday, May 9, 1990 United States Attorney's Office (602) 379-3011PHOENIX--Stephen M. McNamee, United States Attorney for the District ofArizona, Robert K. Corbin, Attorney General for the state of Arizona, andHenry R. Potosky, Acting Special Agent in Charge of the United StatesSecret Service Office in Phoenix, today announced that approximatelytwenty-seven search warrants were executed on Monday and Tuesday, May 7 and8, 1990, in various cities across the nation by 150 Secret Service agentsalong with state and local law enforcement officials. The warrants wereissued as a part of Operation Sundevil, which was a two year investigationinto alleged illegal computer hacking activities.The United States Secret Service, in cooperation with the United StatesAttorney's Office, and the Attorney General for the State of Arizona,established an operation utilizing sophisticated investigative techniques,targeting computer hackers who were alleged to have trafficked in and abusestolen credit card numbers, unauthorized long distance dialing codes, andwho conduct unauthorized access and damage to computers. While the totalamount of losses cannot be calculated at this time, it is (MORE)estimated that the losses may run into the millions of dollars. Forexample, the unauthorized accessing of long distance telephone cards haveresulted in uncollectible charges. The same is true of the use of stolencredit card numbers. Individuals are able to utilize the charge accounts topurchase items for which no payment is made.Federal search warrants were executed in the following cities: Chicago, IL Cincinnati, OH Detroit, MI Los Angeles, CA Miami, FL Newark, NJ New York, NY Phoenix, AZ Pittsburgh, PA Plano, TX Richmond, VA San Diego, CA San Jose, CAUnlawful computer hacking imperils the health and welfare of individuals,corporations and government agencies in the United States who rely oncomputers and telephones to communicate.Technical and expert assistance was provided to the United States SecretService by telecommunication companies including Pac Bel, AT&T, Bellcore,Bell South, MCI, U.S. Sprint, Mid-American, Southwestern Bell, NYNEX, U.S.West, and by the many corporate victims. All are to be commended for theirefforts in researching intrusions and documenting losses.McNamee and Corbin expressed concern that the improper and alleged illegaluse of computers may become the White Collar crime of the (MORE)1990's. McNamee and Corbin reiterated that the state and federal governmentwill vigorously pursue criminal violations of statutes under theirjurisdiction. Three individuals were arrested yesterday in otherjurisdictions on collateral or independent state charges. Theinvestigations surrounding the activities of Operation Sundevil arecontinuing.The investigations are being conducted by agents of the United StatesSecret Service and Assistant United States Attorney Tim Holtzen, Districtof Arizona, and **Assistant Arizona Attorney General Gail Thackery. END STORY**KPFA-FM Panelist ************************************************************** Assistant Director Garry M. Jenkins' Prepared Remarks Operation Sun DevilToday, the Secret Service is sending a clear message to those computerhackers who have decided to violate the laws of this nation in the mistakenbelief that they can successfully avoid detection by hiding behind therelative anonymity of their computer terminals.In 1984, Congress enacted the Comprehensive Crime Control Act whichprohibits, among other things, credit card fraud and computer fraud. Since1984, the Secret Service has been aggressively enforcing these laws and hasmade over 9,000 arrests nationwide.Recently we have witnessed an alarming number of young people who, for avariety of sociological and psychological reasons, have become attached totheir computers and are exploiting thier potential in a criminal manner.Often, a progression of criminal activity occurs which involvestelecommunications fraud (free long distance phone calls), unauthorizedaccess to other computers (whether for profit, fascination, ego, or theintellectual challenge), credit card fraud (cash advances and unauthorizedpurchases of goods), and then move on to other destructive activities likecomputer viruses.Some computer abusers form close associations with other people havingsimilar interests. Underground groups have been formed for the purpose ofexchanging information relevant to their criminal activities. These groupsoften communicate with each other through message systems between computerscalled "bulletin boards."Operation Sun Devil was an investigation of potential computer fraudconducted over a two-year period with the use of sophisticatedinvestigative techniques.This investigation exemplifies the commitment and extensive cooperationbetween federal, state and local law enforcement agencies and privategovernmental industries which have been targeted by computer criminals.While state and local law enforcement agencies successfully investigate andprosecute technological crimes in specific geographical locations, federalintervention is clearly called for when the nature of these crimes becomesinterstate and international. (PAGE 1)On May 8, 1990, over 150 Special Agents of the United States SecretService, teamed with numerous local and state law enforcement agencies,served over two dozen search warrants in approximately fifteen (15) citiesacross this nation.Several arrests and searches were made during the investigation to protectthe public from impending dangers. In one situation, computer equipmentwas seized after unauthorized invasion into a hospital computer.Our experience shows that many computer hacker suspects are no longermisguide teenagers mischievously playing games with their computers intheir bedrooms. Some are now high tech computer operators using computersto engage in unlawful conduct.The losses to the american public in this case are expected to besignificant. The Secret Service takes computer crime very seriously, andwe will continue to investigate aggressively those crimes which threatenour nation's businesses and government services. END *************************************************************** OPERATION SUN DEVIL NEWS ARTICLES Probe Focuses on Entry, Theft by Computers (From: CHICAGO TRIBUNE, May 10, 1990: p. I-6)PHOENIX--An interstate probe of computer invasions has uncovered lossesthat may reach millions of dollars and could be "just the tip of theiceberg," federal law enforcement officials said Wednesday.The investigation is focused on illegal entry into computer systems andunauthorized use of credit-card numbers and long-distance codes, said GarryJenkins, assistant Secret Service director for investigations.No arrests for computer crime resulted, however, when 27 search warrantswere served in 12 cities, including Chicago, by 150 Secret Service agentsand police on Tuesday, officials said.In Chicago, federal agents seized computers and information disks at abusiness and a private home, said Tim McCarthey, chief of the SecretService's criminal enforcement division in Chicago. Nationwide, some 40computers and 23,000 disks of computer information were seized.Secret Service officials declined to release an specifics, including thenumber of people targeted, saying the two-year investigation, code-named"Operation Sun Devil," is continuing."The losses that we estimate on this may run to the millions of dollars,"said Stephen McNamee, U.S. Atty. for Arizona.Much of the alleged loss stems from unpaid telephone and computer accesscharges, officials said.They said it was possible that computer hackers had obtained goods or cashthrough use of unauthorized credit cards, but could not cite any instanceof it.In addition to misuse of credit cards and phone lines the hackers arebelieved to have gained access to computers that store medical andfinancial histories, officials said.Under new computer crime laws, the Secret Service has jurisdiction toinvestigate allegations of electronic fraud through the use of accessdevices such as credit-card numbers and long-distance codes.Defendants convicted of unauthorized use of such devices can be sentencedup to 10 years in prison if they commit fraud of more than $,100.A similar investigation supervised by federal prosecutors in Chicago hasresulted in several indictments.********************************************************************AT&T NEWS BRIEFS via Consultant's Liason ProgramWednesday, May 9, 1990
?? 快捷鍵說明
復制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號
Ctrl + =
減小字號
Ctrl + -