Copy Link
Add to Bookmark
Report

Tolmes News Service 32

eZine's profile picture
Published in 
Tolmes News Service
 · 5 years ago

  




#######################################
# #
# #
# ======== =\ = ====== #
# == = \ = = #
# == = \ = ====== #
# == = \ = = #
# == = \= ====== #
# #
# #
# <Tolmes News Service> #
# ''''''''''''''''''''' #
# #
# #
# > Written by Dr. Hugo P. Tolmes < #
# #
# #
#######################################


Issue Number: 32
Release Date: March 20, 1988




$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

Here's an interesting little article that I recently picked up. It is on a
topic that has been going around for quite some time: computer viruses.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$


COMPUTER TERROR!



Some strange things have been happening in the computer community. In
recent months there have been a number of strange deletions of certain computer
programs from around the country. What is causing this: computer viruses.
Viruses for computers act in much the same way as other viruses. They are
spread by people who trade software and the program containing the viruse is
copied. From there come multiple copies of the virus which spread to other
programs and infect whole collections of software.
After a certain period of time, the viruses start their work. Programs
disappear from disks. Software starts to malfunction. Many of these viruses
are called "Trojan Horses," due to the fact that they are not apparent upon
observation of the program.
The cause of these viruses is usually a so-called "hacker" who writes
the virus to wreak havoc in the computer community. These hackers are the same
people who invade computer systems and delete software from the outside.

PROTECTION:

The only protection from these viruses is to stop trading software with
people you don't know. There are a number of "antidote" programs that are
designed to get rid of viruses in case you are already infected.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

THREE YOUTHS SUSPECTED IN PHONE FRAUD


by Robert McMillan


Three California youths have been arrested for allegedly using their
computers to steal thousands of hours of long-distance service from Sprint,
MCI, AT&T, and other common carriers. The youths reportedly used their
computers to dial MCI computers and enter random codes in an attempt to use
MCI services without paying.
Other long-distance identification codes were received from computer
"bulletin boards" where other illegal information was obtained. Upon examing
several of the bulletin boards, police officials found plans for making bombs,
credit-card account numbers, long-distance identification codes, pornography,
and messages dealing with drugs and terrorism. Most of the bulletin boards
had "phreak" sections where telecommunications fraud was discussed.
The youths used names such as Dr. Phreak, PhalToxic Waste to hide their real identities.
The three youths frequently called these bulletin boards to exchange
information with others who were defrauding common carriers. The youths
reportedly stole an estimated $150,000 from Sprint, MCI, AT&T and other common
carriers. All of their computer equipment was seized after their arrest.

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$



TELEPHONE FRAUD INVESTIGATION CALLED THE LARGEST IN US HISTORY


. (April 27) Authorities have released more names of those arrested this week
in what now is being called the largest investigation of telephone access fraud
in history. As reported here earlier (GO OLT-476), arrest warrants started
coming down yesterday in Honolulu, where an eight-month undercover operation by
the US Secret Service was based. The suspects are accused of acquiring
unauthorized long-distance credit card numbers and access codes, then using and
selling the codes to defraud the phone companies. As part of the sweep, search
warrants have been executed in New York City, Rome, N.Y., Newark, N.J.,
Chicago, Seattle, Ashland, Ore., Mountain View, Calif., Los Angeles, Murray,
Utah, Sierra Vista, Ariz., Albuquerque, N.M., Dennison, Texas, Gulf Breeze,
Fla., Vero Beach, Fla., Jensen Beach, Fla., Provo, Utah and Little Rock, Ark.
Speaking with Ron Todt of United Press International, federal authorities in
Honolulu said that in most cases, computer crackers broke into phone company
systems and stole the access codes. The numbers then were sold to distributors
who operated through a nationwide network, and eventually to individuals or
small businesses who bought the codes after they are promised unlimited long
distance service. US Attorney Dan Bent told Todt that usually the unauthorized
use was detected within an average'oo three days, and the user would then get a
new code. Bent added that the suppliers had a variety of "ingenious"
explanations for the need to change codes so often. Steve Ramsay of the Secret
Service added, "Hundreds of people throughout the country bought these stolen
access codes belonging to several long-distance carriers for $100 to $150 per
month for unlimited long-distance service." UPI says the Secret Service
infiltrated the suppliers' networks last August, putting out the story that
they would be interested in buying codes. By October, they were in contact with
some suppliers and, as noted yesterday, they received more than 600 such codes.
Says the wire service, "They eventually began selling codes, provided by the
long-
distance companies who cooperated in the investigation, to cement the
relationship and track the use of the codes. Authorities said the proliferation
of the codes was 'staggering.' One number was released Dec. 9 and then shut
down four days later on Dec. 12. ... In just four days, $73,592 worth of
illicit charges were made on the number." Bent characterized phone fraud as "a
crime of the future," because "it used sophisticated computer technology to get
off the grountainly used computer technology to investigate the
crime." He added that the defendants, if convicted, face five years and a
$250,000 fine on each of the 33 counts. UPI identified those arrested so far
as: -:- Billie Alexander of Los Angeles. -:- Steven Hayes of Syracuse, N.Y. -:-
Christopher Lowe of Seattle. -:- Alan Inga of Newark, N.J. -:- Renee Bounds of
Portland, Ore. -:- Robert Danek of Albuquerque, N.M. -:- John Fechser of Salt
Lake City. -:- John Doe, also known as Alex, of New York. -:- Eileen Avanzino
of Little Rock, Ark. -:- Clayton Parker of Dallas. -:- Bert Zimmerman of
Tucson, Ariz. -:- Ann Thompson of Tallahassee, Fla. -:- Jeff Lewis of Chicago.
-:- Richard Denning of Salt Lake City. -:- Howard Golub, Bill Rosemeyer, Scott
Mosman and Dieter Thate, all of West Palm Beach, Fla. Authorities also told UPI
that two others were investigated in searches yesterday on 24 warrants.


$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$



TNS Quick/\/otes
----------------


- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

A bulletin board known as the Black Hole was taken down by authorities in
Boston. Credit-card numbers and codes were frequently posted on the bulletin
board.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Jack the Ripper was busted a while ago. There was an article printed about how
he was busted which I am trying to get. It is unknown if this is the same Jack
the Ripper who is an old-time phreak/hacker from long ago.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

There was an article in USA Today about John Maxfield and BoardScan. If I am
able to get it, it will be in a future issue somewhere.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

A new group has been formed in the hack/phreak community. It goes by the name
of:

The CIA

The initials CIA are said to stand for: The Computer Invasion Association.
This group, $CIA$, is said to be a group of some of the TOP hackers and some
of the top phreaks around. It is very militant and seems to be similar to
LOD/H. The group is private. No member list is availiable since all of the
members are being very discreet about the whole thing to avoid any attempt
by the Secret Service or federal officials to undermine the organization.

They have their own bbs which is only for the group, which is made up of only
8-12 members. They are very elite and little information is availiable on the
group. Not even the name of the bbs on which they meet is known. All of these
precautions are to protect the members.

It is also said that many of the members are not well known or not members
of other groups. They are, however, extremely ELITE and their actions are
very confidential. Their main targets seem to be military computers and
educational computers. They are also targetting systems on Telenet.

We'll be looking for more information on the $CIA$.

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos App from Google Play
install Neperos as PWA

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT