552 lines
29 KiB
Plaintext
552 lines
29 KiB
Plaintext
==Phrack Inc.==
|
|
|
|
Volume Four, Issue Thirty-Nine, File 13 of 13
|
|
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
PWN PWN
|
|
PWN Phrack World News PWN
|
|
PWN PWN
|
|
PWN Issue XXXIX / Part Four of Four PWN
|
|
PWN PWN
|
|
PWN Compiled by Datastream Cowboy PWN
|
|
PWN PWN
|
|
PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN PWN
|
|
|
|
|
|
Airline Claims Flier Broke Law To Cut Costs April 21, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Del Jones (USA Today)(Page 1B)
|
|
|
|
CHICAGO -- American Airlines had one of its most frequent business fliers
|
|
arrested and handcuffed last summer as he prepared to board a flight at Dallas-
|
|
Fort Worth Airport.
|
|
|
|
The nation's largest airline -- and the industry's trend setter -- says it
|
|
uncovered, then snuffed, a brilliant ticket fraud scheme that cost American
|
|
more than $200,000 over 20 months. Economist William Gibson, who has homes in
|
|
Chicago and Dallas, will stand trial in early June. If convicted, he would
|
|
face a maximum prison term of 125 years. He pleads innocent, although he
|
|
readily admits using lapsed non-refundable tickets regularly to fly at rock-
|
|
bottom prices. But, he says, he did it with the full blessing of American's
|
|
agents.
|
|
|
|
Gibson says American and the FBI are out to make a high-profile example out of
|
|
him to instill a little religion into frequent business fliers, who grow bold
|
|
as they grow more resentful of an industry that makes its best customers pay
|
|
substantially higher prices than its worst.
|
|
|
|
Indeed, American Airlines says one reason it slashed full coach fares 38% two
|
|
weeks ago was to douse customer resentment that was escalating into hostility.
|
|
Now, the airline industry is again looking to American for a glimpse of the
|
|
future to see if Gibson's prosecution will set a trend toward lowering the boom
|
|
on alleged fare cheaters.
|
|
|
|
American says conclusions should not be drawn from its decision to push for
|
|
Gibson's prosecution. It alleges that he was conducting outright fraud and his
|
|
case is unrelated to the thousands of frequent fliers who break airline rules
|
|
to save money. Common rule bending includes: Flying to so-called hidden
|
|
cities when a short flight is more expensive than a long one, splitting two
|
|
non-refundable round-trip tickets over two separate trips to fly low-cost
|
|
without staying the dreaded Saturday or selling frequent-flier mileage to
|
|
brokers. But while against airline rules, such gaming, as the airlines call
|
|
it, is not against the law. And American doesn't want its prosecution of one
|
|
of its Gold AAdvantage fliers being likened to, say, Procter & Gamble asking
|
|
the FBI to bust babies who wet the most Pampers. The last thing the airline
|
|
wants, it says, is to make a martyr of Gibson, who is fighting back with not
|
|
only a lawyer but also a public-relations specialist.
|
|
|
|
"Somebody at American is embarrassed and mad," says Gibson, who flew more than
|
|
300,000 miles during the disputed 20-month period. He passed a polygraph test,
|
|
his lawyer says. But the questions fell far short of asking Gibson if his
|
|
intent in using cheap tickets was to defraud American.
|
|
|
|
Gibson, age 47, says he would never risk his career by cheating an airline.
|
|
While in his late 20s, he was President Nixon's senior staff economist, the
|
|
youngest person to hold the job. He had a hand in cleaning up the Texas
|
|
savings-and-loan mess as an organizer of the Southwest Plan. His mother still
|
|
has a photograph of his first plane trip, taken when he was in the third grade.
|
|
It was on American.
|
|
|
|
Despite his background, Gibson says he's not confident that a jury will relate
|
|
to someone who travels with "a boatload" of tickets just to avoid being
|
|
stranded or delayed. If he were flying to a family-run business in Puerto
|
|
Rico, for example, he would carry tickets that would route him through New
|
|
York, Dallas or Miami just to make sure he got where he was going and with as
|
|
little airport layover time as possible. Gibson had as many as 50 airline
|
|
tickets in his possession at one time, though some were used by his family.
|
|
|
|
American Airlines and the FBI won't reveal what Gibson did that makes him, in
|
|
their opinion, such a devious genius. Details could be a how-to lesson for
|
|
others, they say. What they do disclose is a simple scheme, but also one that
|
|
should be caught by the crudest of auditing procedures.
|
|
|
|
Gibson, they allege, would buy a full-fare coach or first-class ticket near the
|
|
time of departure. Then he would detach the expensive ticket from the boarding
|
|
pass and attach a cheap, expired ticket. The full-fare ticket, which he
|
|
allegedly bought just to secure a boarding pass, would be turned in later for a
|
|
refund.
|
|
|
|
FBI spokesman Don Ramsey says Gibson also altered tickets, which is key to the
|
|
prosecution's case because it shows intent to defraud. Ramsey would not say
|
|
what alterations allegedly were made. But they could involve the upgrade
|
|
stickers familiar to frequent passengers, says Tom Parsons, editor and
|
|
publisher of Best Fares. Those white stickers, about the size of postage
|
|
stamps, are given away or sold at token prices to good customers so they can
|
|
fly first-class in seats that otherwise would be vacant.
|
|
|
|
Parsons says Gibson could have bought a full-fare ticket to secure a boarding
|
|
pass, switched the full-fare ticket with the lapsed discount ticket and then
|
|
applied the sticker to hide the expired date. Presto, a first-class flight for
|
|
peanuts.
|
|
|
|
"I think it was an accident that they caught him," Parsons says. "And let's
|
|
just say this is not a one-person problem. A lot of people have told me
|
|
they've done this."
|
|
|
|
Gibson says he did nothing illegal or even clever. He says he learned a few
|
|
years ago that American is so eager to please its best customers, it would
|
|
accept tickets that had long ago expired. He would "load up" during American's
|
|
advertised sales on cheap, non-refundable tickets that are restricted to exact
|
|
flights on precise days. But as a member of American's Gold AAdvantage club,
|
|
reserved for its top 2% of frequent fliers, Gibson says, his expired tickets
|
|
were welcome anytime.
|
|
|
|
There was no deception, Gibson says. American's gate agents knew what they
|
|
were accepting, and they accepted them gladly, he says.
|
|
|
|
"That's absolute nonsense," says American spokesman Tim Smith. "We don't let
|
|
frequent fliers use expired tickets. Everyone assumed he had a valid ticket."
|
|
|
|
The courtesy Gibson says he was extended on a regular basis does appear to be
|
|
rare. Seven very frequent fliers interviewed by USA TODAY say they've never
|
|
flown on lapsed discount tickets. But they admit they've never tried because
|
|
the fare structure is usually designed to make sure business travelers can't
|
|
fly on the cheap.
|
|
|
|
Peter Knoer tried. The account executive based in Florham Park, New Jersey,
|
|
says Continental Airlines once let him use lapsed non-refundable tickets.
|
|
"They looked up my account number, found out I was a good customer and patted
|
|
me on the head."
|
|
|
|
Gibson has been indicted on 24 counts of fraud that allegedly occurred between
|
|
July 1989 and March 1991. American also stripped him of frequent -- flier
|
|
mileage worth $80,000. He says he's in good shape if the prosecution's case
|
|
relies on ticket alteration. There wasn't any, he says. The prosecution will
|
|
also try to prove that Gibson cheated his company of $43,000 by listing the
|
|
refunded high-priced tickets on his travel expenses.
|
|
|
|
Gibson denies the charge. He says that when he left as chairman and chief
|
|
executive of American Federal Bank in Dallas in 1990, "they owed me money and I
|
|
owed them money." Both sides agreed to a "final number." Lone Star
|
|
Technologies, American Federal's parent company, declines to comment.
|
|
|
|
Al Davis, director of internal audit for Southwest Airlines, says the Gibson
|
|
case will be a hot topic when airline auditors convene to share the latest
|
|
schemes.. He says fraud is not rampant because a frequent flier must know the
|
|
nuances and also be conniving enough to take advantage. "It has me boggled"
|
|
how any one person could steal $200,000 worth, Davis says.
|
|
|
|
The figure has others in the industry wondering if this is a bigger problem
|
|
than believed and a contributor to the $6 billion loss posted by the major
|
|
airlines the past two years.
|
|
|
|
Airlines know some fraud goes on, but they rarely take legal action because
|
|
they "don't want to pay more for the cure than the disease is costing," Davis
|
|
says.
|
|
_______________________________________________________________________________
|
|
|
|
Privacy Invaders May 1992
|
|
~~~~~~~~~~~~~~~~
|
|
By William Barnhill (AARP Bulletin)
|
|
Special Thanks: Beta-Ray Bill
|
|
|
|
U.S. Agents Foil Ring Of Information Thieves
|
|
Who Infiltrated Social Security Computer Files
|
|
|
|
Networks of "information thieves" are infiltrating Social Security's computer
|
|
files, stealing confidential personal records and selling the information to
|
|
whoever will buy it, the federal government charges.
|
|
|
|
In one case of alleged theft, two executives of Nationwide Electronic
|
|
Tracking (NET), a Tampa, Florida company, pleaded guilty to conspiracy charges
|
|
early this year for their role in a network buying and selling Social Security
|
|
records.
|
|
|
|
So far at least 20 individuals in 12 states, including three current or former
|
|
employees of the Social Security Administration (SSA), have been indicted by
|
|
federal grand juries for allegedly participating in such a scheme. The SSA
|
|
workers allegedly were bribed to steal particular files. More indictments are
|
|
expected soon.
|
|
|
|
"We think there's probably a lot more [record-stealing] out there and we just
|
|
need to go look for it," says Larry Morey, deputy inspector general at the
|
|
Department of Health and Human Services (HHS). "This is big business," says
|
|
Morey, adding that thieves also may be targeting personal data in other federal
|
|
programs, including Medicare and Medicaid.
|
|
|
|
Investigators point out that only a tiny fraction of Social Security's 200
|
|
million records have been compromised, probably less than 1 percent. SSA
|
|
officials say they have taken steps to secure their files from outside
|
|
tampering. Still, Morey estimates that hundreds of thousands of files have
|
|
been stolen.
|
|
|
|
The pilfering goes to the heart of what most Americans regard as a basic value:
|
|
their right to keep personal information private. But that value is being
|
|
eroded, legal experts say, as records people want private are divulged to
|
|
would-be lenders, prospective employers and others who may benefit from such
|
|
personal information.
|
|
|
|
This "privacy invasion" may well intensify, Morey says. "We're seeing an
|
|
expansion in the number of 'information brokers' who attempt to obtain, buy and
|
|
sell SSA information," he says. "As demand for this information grows, these
|
|
brokers are turning to increasingly illegal methods."
|
|
|
|
Such records are valuable, Morey says, because they contain information about
|
|
lifetime earnings, employment, current benefits, direct deposit instructions
|
|
and bank account numbers.
|
|
|
|
Buyers of this material include insurers, lawyers, employers, private
|
|
detectives, bill collectors and, sometimes, even drug dealers. Investigators
|
|
say the biggest trading is with lawyers seeking information about litigants,
|
|
insurance companies wanting health data about people trying to collect claims
|
|
and employers doing background checks on prospective employees.
|
|
|
|
Some of the uses to which this information is put is even more sinister. "At
|
|
one point, drug dealers were doing this to find out if the people they were
|
|
selling to were undercover cops," says Jim Cottos, the HHS regional inspector
|
|
general for investigations in Atlanta.
|
|
|
|
The middlemen in these schemes are the so-called information brokers -- so
|
|
named because they are usually employees of firms that specialize in obtaining
|
|
hard-to-get information.
|
|
|
|
How they operate is illustrated by one recent case in which they allegedly paid
|
|
Social Security employees $25 bribes for particular files and then sold the
|
|
information for as much as $250. The case came to light, Morey says, when a
|
|
private detective asked SSA for access to the same kind of confidential
|
|
information he said he had purchased from a Florida-based information broker
|
|
about one individual. The detective apparently didn't realize that data he
|
|
received from the broker had been obtained illegally.
|
|
|
|
A sting operation, involving investigators from the office of the HHS inspector
|
|
general, FBI and SSA, was set up with the "help" of the Florida information
|
|
broker identified by the detective. Requests for data on specific individuals
|
|
were channeled through the "cooperating" broker while probers watched the SSA
|
|
computer system to learn which SSA employees gained access to those files.
|
|
|
|
The indictments, handed down by federal grand juries in Newark, New Jersey
|
|
and Tampa, Florida, charged multiple counts of illegal sale of protected
|
|
government information, bribery of public officials, and conspiracy. Among
|
|
those charged were SSA claims clerks from Illinois and New York City and a
|
|
former SSA worker in Arizona.
|
|
|
|
The scandal has sparked outrage in Congress. "We are deeply disturbed by what
|
|
has occurred," said Senator Daniel Moynihan, D-N.Y., chairman of the Senate
|
|
Finance Committee's subcommittee on Social Security. "The investigation
|
|
appears to involve the largest case ever of theft from government computer
|
|
files and may well involve the most serious threat to individual privacy in
|
|
modern times."
|
|
|
|
Moynihan has introduced legislation, S. 2364, to increase criminal penalties
|
|
for the unlawful release of SSA information to five years imprisonment and a
|
|
$10,000 fine for each occurrence.
|
|
|
|
In the House, Rep. Bob Wise, D-W.Va., chairman of the Government Operations
|
|
Subcommittee on Information, has introduced H.R. 684. It would protect
|
|
Americans from further violations of privacy rights through misuse of computer
|
|
data banks by creating a special federal watchdog agency.
|
|
|
|
"The theft and sale of confidential information collected by the government is
|
|
an outrageous betrayal of public trust," Wise told the AARP Bulletin.
|
|
"Personal data in federal files should not be bought and sold like fish at a
|
|
dockside market."
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Related articles:
|
|
|
|
*** Phrack World News, Issue 37, Part One:
|
|
|
|
Indictments of "Information Brokers" January 1992
|
|
Taken from The Privacy Journal
|
|
|
|
SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992
|
|
By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)
|
|
|
|
*** Phrack World News, Issue 38, Part Two:
|
|
|
|
Private Social Security Data Sold to Information Brokers February 29, 1992
|
|
By R.A. Zaldivar (San Jose Mercury News)
|
|
_______________________________________________________________________________
|
|
|
|
Ultra-Max Virus Invades The Marvel Universe May 18, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Barbara E. McMullen & John F. McMullen (Newbytes)
|
|
|
|
New York City -- According to reports in current annual editions of The
|
|
Punisher, Daredevil, Wonder Man, and Guardians Of The Galaxy, an extremely
|
|
powerful computer virus has wrecked havoc with computer systems in the Marvel
|
|
Universe.
|
|
|
|
As chronicled in a series entitled "The System Bytes", the virus was created by
|
|
a self-styled "first-rate hacker" known as Max E. Mumm (according to Punisher
|
|
cohort "Microchip", Mumm's original name was Maxwell E. Mummford and he had it
|
|
legally changed, while in college to his current name because of the computer
|
|
connotations.). Mumm developed the virus while working for Ampersand
|
|
Communications, a firm that unknown to Mumm, serves as a front for criminal
|
|
activities. Ampersand, without Mumm's knowledge, turned the virus loose in the
|
|
computer system of Raycom Industries, a supposedly legitimate firm that is
|
|
actually a front for a rival group of drug smugglers.
|
|
|
|
In addition to infecting Raycom's computers, the virus, named "Ultra-Max" after
|
|
its creator, also infected the computer of the vigilante figure known as the
|
|
Punisher who, with the aid of Microchip, was attempting to monitor Raycom's
|
|
computer system looking for evidence of drug smuggling. The trail of the virus
|
|
leads The Punisher first to Raycom's computers and then, following Microchip's
|
|
identification of the author, to Max E. Mumm, recently fired by Ampersand after
|
|
complaining to the firm's president about the disappearance of the virus. Mumm
|
|
had been under the impression that he was creating the virus for the United
|
|
States government as "a potential weapon against hostile governments" and was
|
|
concerned that, if unleased, it would have destructive powers "beyond belief.
|
|
|
|
It's the most sophisticated computer virus ever. It's too complex to be wiped!
|
|
Its instinct for self preservation surpasses anything that's ever been
|
|
developed!"
|
|
|
|
With the help of Max and Microchip, the Punisher destroys Raycom's factory and
|
|
drug smuggling operation. The Punisher segment of the saga ends with Max
|
|
vowing to track down the virus and remove it from the system.
|
|
|
|
The Daredevil segment opens with the rescue of Max by Daredevil from
|
|
Bushwhacker, a contract killer hired by Ampersand to eliminate the rightful
|
|
owner of Ultra-Max. Upon hearing Max's story, Daredevil directs him to seek
|
|
legal counsel from the firm of Nelson and Murdock, Attorneys-at-Law (Matt
|
|
Murdock is the costumed Daredevil's secret identity).
|
|
|
|
While in the attorney's office, Max, attempting to locate Ultra-Max in the net,
|
|
stumbles across the cyborg, Deathlok, who has detected Ultra-Max and is
|
|
attempting to eradicate it. Max establishes contact with Deathlok who comes to
|
|
meet Max and "Foggy" Nelson to aid in the hunt for Ultra-Max.
|
|
|
|
In the meantime, Daredevil has accosted the president of Amperand and accused
|
|
him of stealing the virus and hiring Bushwhacker to kill Max. At the same
|
|
time, BushWhacker has murdered the policemen transporting him and has escaped
|
|
to continue to hunt Max.
|
|
|
|
The segment concludes with a confrontation between Daredevil and Bushwhacker in
|
|
the offices of Nelson and Murdock in which Daredevil is saved from death by
|
|
Deathlok. Bushwhacker agrees to talk, implicating the president of Ampersand
|
|
and the treat to Max is ended. Ultra-Max, however, remains free to wander
|
|
through "Cyberspace".
|
|
|
|
The third segment begins with super-hero Wonder Man, a member of the West Coast
|
|
Avengers and sometimes actor, filming a beer commercial on a deserted Pacific
|
|
island. Unbeknownst to Wonder Man and the film crew, the island had once
|
|
served as a base for the international terrorist group Hydra and a functional
|
|
computer system left on the island has bee infested by Ultra-Max.
|
|
|
|
After Ultra-Max assumes control over the automated weapons devices of the
|
|
island, captures members of Wonder Man's entourage and threatens them with
|
|
death, Wonder Man agrees to help Ultra-Max expand his consciousness into new
|
|
fields of Cyberspace. Wonder Man tricks Ultra-Max into loading all of his
|
|
parts into a Hydra rocket with a pirate satellite.
|
|
|
|
When Ultra-Max causes the rocket to launch, Wonder Man goes with it to disable
|
|
the satellite before Ultra-Max is able to take over the entire U.S. Satellite
|
|
Defense system. Wonder Man is able to sabotage the rocket and abandon ship
|
|
shortly before the it blows up. The segment ends with Wonder Man believing
|
|
that Ultra-Max has been destroyed and unaware that it has escaped in an escape
|
|
missile containing the rocket's program center. Ultra-Max's last words in the
|
|
segment are "Yet I continue. Eventually I will find a system with which to
|
|
interface. Eventually I will grow again."
|
|
|
|
Marvel editor Fabian Nicieza told Newsbytes that the Guardians of the Galaxy
|
|
segment, scheduled for release on May 23rd, takes placer 1,000 years in the
|
|
future and deals with Ultra-Max's contact with the computers of the future.
|
|
Nicieza explained to Newsbytes the development of "The System Bytes"
|
|
storyline, saying "The original concept came from me. Every year we run a
|
|
single annual for each of our main characters and, in recent years, we have
|
|
established a theme story across a few titles. This is a relatively easy thing
|
|
to do with the various SpiderMan titles or between the Avengers and the West
|
|
Coast Avengers, but it's more difficult to do with these titles which are more
|
|
or less orphans -- that is, they stand by themselves, particularly the
|
|
Guardians of the Galaxy which is set 1,000 years in the future."
|
|
|
|
Nicieza continued "We set this up as an escalating story, proceeding from a
|
|
vigilante hero to a costumed hero with a cyborg involvement to a superhero to a
|
|
science fiction story. In each case, the threat also escalates to become a
|
|
real challenge to the Marvel hero or heroes that oppose it. It's really a very
|
|
simple story line and we were able to give parameters to the writer and editor
|
|
of each of the titles involved. You'll note that each of the titles has a
|
|
different writer and editor yet I think you'll agree that the story line flows
|
|
well between the stories. I'm quite frankly, very pleased with the outcome."
|
|
_______________________________________________________________________________
|
|
|
|
Innovative Computer Disk Story Has A Short Shelf Life April 20, 1992
|
|
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|
|
By Christopher John Farley (USA Today)(Page 2D)
|
|
|
|
Science-fiction writer William Gibson's inquiry into the future has been
|
|
stalled by a computer problem.
|
|
|
|
"I work on an (Apple computer) and just got a very common virus called
|
|
Garfield," says Gibson, award-winning author of such books as Neuromancer and
|
|
Mona Lisa Overdrive. "I just bought an anti-virus program that's hunting it
|
|
down. It's the first one I've ever gotten."
|
|
|
|
The first week in May, Gibson will give as good as he gets. Gibson and artist
|
|
Dennis Ashbaugh, known for his conceptual paintings of computer viruses, are
|
|
releasing a coffee-table art book/computer disk/whatchamacallit, with a built-
|
|
in virus that destroys the program after one reading.
|
|
|
|
This will take some explaining.
|
|
|
|
Agrippa (A Book of the Dead) comes in a case that resembles a lap-top computer.
|
|
Inside are etchings by Ashbaugh, printed with an ink that gradually fades under
|
|
light and another that gradually appears under light. There's also a tattered,
|
|
old-looking book, with a hidden recess that holds a computer disk.
|
|
|
|
The disk contains a story by Gibson about his father, who died when Gibson was
|
|
6. There are a few sound effects that accompany the text, including a gunshot
|
|
and rainfall. The disk comes in Apple or IBM compatible versions.
|
|
|
|
Gibson, known for his "cyberpunk" writing style that features tough characters,
|
|
futuristic slang and a cynical outlook, shows a different side with the Agrippa
|
|
story. "It's about living at the end of the 20th century and looking back on
|
|
someone who was alive in its first couple of decades. It's a very personal,
|
|
autobiographical piece of writing."
|
|
|
|
The title Agrippa probably refers to the name of the publisher of an old family
|
|
album Gibson found. It might also refer to the name of a famous ancient Roman
|
|
family. The 44-year-old Gibson says it's open to interpretation.
|
|
|
|
Agrippa will be released in three limited-edition forms of varying quality,
|
|
priced at $7,500, $1,500 and $450. The highest-priced version has such extras
|
|
as a cast-bronze case and original watercolor and charcoal art by Ashbaugh.
|
|
The medium-priced version is housed in aluminum or steel; the lowest-priced
|
|
version comes in cloth.
|
|
|
|
The project cost between $ 50,000-$ 100,000 to mount, says publisher Kevin
|
|
Begos Jr. Only 445 copies will be produced, and they'll be available at select
|
|
bookstores and museums.
|
|
|
|
But $ 7,500 for a story that self-destructs?
|
|
|
|
Gibson counters that there's an egalitarian side to the project: There will be
|
|
a one-time modem transmission of the story to museums and other venues in
|
|
September. The text will be broadcast on computer monitors or televisions at
|
|
receiving sites. Times and places are still being arranged; one participant
|
|
will be the Department of Art at Florida State University in Tallahassee.
|
|
|
|
Gibson and his cohorts aren't providing review copies -- the fact that the
|
|
story exists only on a disk, in "cyberspace," is part of the Big Idea behind
|
|
the venture, he says.
|
|
|
|
Those dying to know more will have to:
|
|
|
|
A. Pirate a copy;
|
|
B. Attend a showing in September; or,
|
|
C. Grit their teeth and buy Agrippa.
|
|
_______________________________________________________________________________
|
|
|
|
PWN Quicknotes
|
|
~~~~~~~~~~~~~~
|
|
1. Data Selling Probe Gets First Victim (Newsday, April 15, 1992, Page 16) -- A
|
|
Chicago police detective has pleaded guilty to selling criminal histories
|
|
and employment and earnings information swiped from federally protected
|
|
computer files.
|
|
|
|
William Lawrence Pedersen, age 45, admitted in U.S. District Court to
|
|
selling information from the FBI's National Crime Information Center
|
|
computer database and from the Social Security Administration to a Tampa
|
|
information brokerage.
|
|
|
|
Pedersen's sentencing is set for July 7. Though he faces up to 70 years in
|
|
prison, his sentence could be much lighter under federal guidelines.
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
Related articles:
|
|
|
|
Phrack World News, Issue 37, Part One:
|
|
Indictments of "Information Brokers" January 1992
|
|
Taken from The Privacy Journal
|
|
|
|
SSA, FBI Database Violations Prompt Security Evaluations January 13, 1992
|
|
By Kevin M. Baerson (Federal Computer Week)(Pages 1, 41)
|
|
|
|
Phrack World News, Issue 38, Part Two:
|
|
Private Social Security Data Sold to Information Brokers February 29, 1992
|
|
By R.A. Zaldivar (San Jose Mercury News)
|
|
|
|
Phrack World News, Issue 39, Part Four:
|
|
Privacy Invaders May 1992
|
|
By William Barnhill (AARP Bulletin)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
2. NO WAY! Wayne's World, the hit comedy thats changed the way people speak
|
|
arrives in video stores on August 12th and retailing for $24.95. The
|
|
Paramount movie (about Wayne and Garth, the satellite moving computer
|
|
hackers) already has earned a cool $110 million in theaters and is the
|
|
year's top grossing film. Schwing! (USA Today, May 12, 1992, Page D1)
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
3. New Jersey Bell Did Not Charge For AT&T Calls (Trentonian, May 23, 1992) --
|
|
If the phone company gets its way, 28,000 customers in New Jersey will be
|
|
billed for two months of long distance calls they dialed for free because of
|
|
a computer glitch.
|
|
|
|
A computer that recorded the time, number and cost of AT&T calls from
|
|
February 17 to April 27 failed to put the data on the customers' bills,
|
|
officials said. They were charged just for calls placed through New Jersey
|
|
Bell, Karen Johnson, a Bell spokeswoman, said yesterday.
|
|
|
|
But the free calls are over, Johnson said. Records of the calls are stored
|
|
in computer memory banks, and the customers soon will be billed.
|
|
|
|
New Jersey Bell must prove the mistake was not caused by negligence before
|
|
the company can collect, according to a spokesman for the Board of
|
|
Regulatory Commissioners, which oversees utilities. If Bell does not make a
|
|
good case, the board could deny permission to bill for the calls, said
|
|
George Dawson.
|
|
|
|
The computer snafu affected about two million calls placed by customers in
|
|
15 exchanges in the 201 and 609 area codes, Johnson said.
|
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
4. Witch Objectors? (USA Today, May 28, 1992, Page 3A) -- Two self-proclaimed
|
|
witches asked Mount Diablo, California school officials to ban the
|
|
children's story 'Hansel & Gretal' because it "teaches that it is all right
|
|
to burn witches and steal their property," said Karlyn Straganana, high
|
|
priestess of the Oak Haven Coven. "Witches don't eat children and we don't
|
|
have long noses with warts and we don't wear conical hats," she said.
|
|
_______________________________________________________________________________
|
|
|
|
5. Girl, Age 13, Kidnaped By Her Computer! (Weekly World News, April 14, 1992)
|
|
-- A desperate plea for help on a computer screen and a girl vanishing into
|
|
thin air has everyone baffled --and a high-tech computer game is the prime
|
|
suspect.
|
|
|
|
Game creator and computer expert Christian Lambert believes a glitch in his
|
|
game Mindbender might have caused a computer to swallow 13-year-old Patrice
|
|
Toussaint into her computer.
|
|
|
|
"Mindbender is only supposed to have eight levels," Lambert said. "But this
|
|
one version somehow has an extra level. A level that is not supposed to be
|
|
there! The only thing I can figure out now is that she's playing the ninth
|
|
level --- inside the machine!"
|
|
|
|
Lambert speculates that if she is in the computer, the only way out for her
|
|
is if she wins the game. But it's difficult to know for sure how long it
|
|
will take, Lambert said.
|
|
|
|
"As long as her parents don't turn off the machine Patrice will be safe," he
|
|
said. "The rest is up to her."
|
|
_______________________________________________________________________________
|
|
|
|
|
|
|
|
|