+-------------------------------+ | * Computer Crime * | | (a short bibliography) | | newspaper articles | | | | 12/20/92 | | [MOLE02.TXT] | +-------------------------------+ Search request: FI TW COMPUTER CRIME Search result: 18 citations in the Newspaper Articles database 1. Two hackers plead guilty to computer crime charges. (John Lee, Julio Fernandez) (New York Pages) New York Times v142 (Fri, Dec 4, 1992):B12(N), col 1, 4 col in. 2. O'Reilly, Richard. Crime panel debates consequences of seizing bulletin boards. (investigators using computer bulletin boards as evidence) (Column) Washington Post v115 (Mon, Dec 9, 1991):WB17, col 1, 16 col in. Pub Type: Column. 3. Mitgang, Herbert. Thriller writers are quick to find new orders of evil; missing the cold war, authors turn to things like computer crime and terrorism. New York Times v141, sec4 (Sun, Dec 1, 1991):E6(N), E6(L), col 1, 19 col in. 4. Zamora, Jim Herron. Tax cheaters entering the computer age: Crime: Con artists are filing phony returns electronically and trying to collect refunds. Officials say the scam is most prevalent in Southern California. Los Angeles Times v110 (Sun, August 25, 1991):B1, col 2, 28 col in. Abstract: Tax criminals in Southern California have developed a new form of tax fraud using electronically filed returns. Recent investigations by the Department of Justice have led to several indictments including a tax preparer who is charged with cheating the government out of $500,000. One 'scam' involves setting up a phony company which lists homeless or unemployed people as employees. These 'employees' then file income tax returns. They do this via an electronic system, collecting a tax return check. Federal officers are unwilling to say exactly how sham companies are detected, but it is revealed that any electronic return with a Social Security number that does not match against a name will be reviewed. 5. Keller, John J. Dialing for free: thanks to hackers, cellular phone firms now face crime wave; an altered computer chip is permitting easy access to networks nationwide: Mr. Sutton's key omission. (Robert Dewayne Sutton, hacker) Wall Street Journal (Fri, June 14, 1991):A1(W), A1(E), col 1, 33 col in. Abstract: Robert Dewayne Sutton, a 'computer hacker,' sold illegal computer chips that allow a user to place fraudulent calls on cellular telephone systems. Federal agents arrested Sutton in Feb 1989, but by that time, the wave of crime that Sutton allegedly started was too big to stop. Experts say that free calls now add up to about $200 million a year, and the US Secret Service, which investigates telephone crimes, fears that cellular fraud could amount to $600 million by 1992. Sutton, who taught himself to 'burn' or reprogram computer chips, apparently borrowed a program written by another hacker named Kenneth Steven Bailey. The original program that Bailey wrote included a security feature that prevented the program from being copied, but Sutton's version, which he sold for hundreds of dollars per copy, did not include that feature. Thus, there was now no control over the program's spread; it was sold to some who sell time to other. The illegal telephones were found to be widely used for drug trafficking and other criminal activities. 6. Becklund, Laurie; Rohrlich, Ted. Crime computer is a help, but can't do it all. (automated fingerprint identification system) Los Angeles Times v110 (Sat, Jan 5, 1991):A31, col 1, 23 col in. Abstract: The Los Angeles Police Department is using an automated fingerprint identification system to track down suspects. Police departments using the laser system are linked to the California-ID computer run by the state Department of Justice. The state's computer can look for a matching fingerprint in 15 minutes. Fingerprints taken from suspects are enlarged for removal of temporary defects and are sent to the computer in a series of geometrical equations that correspond to an individual's fingerprint configuration. Computerized fingerprint matching is also used for state license and police position applications. 7. Wilke, John R. Protecting privacy in computer media. (Massachusetts legislators considering computer crime bill that protects civil liberties) (column) Wall Street Journal (Fri, Nov 9, 1990):B1(W), B1(E), col 1, 6 col in. Pub Type: Column. 8. Markoff, John. Drive to counter computer crime aims at invaders; legitimate users voice worries over rights. New York Times v139, sec1 (Sun, June 3, 1990):1(N), 1(L), col 1, 36 col in. Abstract: Government crackdown on computer crime is increasing in response to lawmakers and corporations but some civil liberties are being threatened by the investigations. Secret Service officials, who are the primary federal enforcers of computer crimes laws since 1984, suspect that a large number of bright young computer enthusiasts are responsible for many computer crimes including telecommunication fraud, credit card fraud, unauthorized access to other computers and computer viruses. The lack of legal precedents for search and seizure and freedom of speech as it pertains to the computer world raises some questions as to how the government can prosecute and investigate computer crimes. 9. Dreier, David; Herger, Wally. No harmless hacker he. (computer hacking is dangerous and there needs to be legislation allowing for prosecution for this crime) (letter to the editor) Washington Post v113 (Sat, May 19, 1990):A23, col 2, 9 col in. Pub Type: Letter to the editor. 10. Schrage, Michael. Virus vandalism is a prelude to future computer crime. (column) Los Angeles Times v108 (Thu, Oct 12, 1989):D1, col 2, 20 col in. Pub Type: Column. 11. Jackson, Robert L. Computer-crime sleuths go undercover. (to investigate child molesting cases appearing on 'bulletin boards') Los Angeles Times v108, secI (Sun, Oct 1, 1989):20, col 1, 33 col in. 12. FBI rejects computer use on suspects; plan would have allowed tracking those not charged with a crime. (Federal Bureau of Investigations) Washington Post v112 (Fri, March 3, 1989):A7, col 1, 7 col in. 13. Richards, Evelyn. Proposed FBI crime computer system raises questions on accuracy, privacy; report warns of potential risk data bank poses to civil liberties. Washington Post v112 (Mon, Feb 13, 1989):A6, col 1, 28 col in. 14. Parrish, Edward A. Breaking into computers is a crime - pure and simple. (computer hacking) (column) Los Angeles Times v107, secV (Sun, Dec 4, 1988):5, col 1, 15 col in. Pub Type: Column. 15. Feldman, Paul. Computer crime: hard to prove, prosecute. Los Angeles Times v107, secI (Wed, Nov 23, 1988):3, col 1, 41 col in. 16. Markoff, John. Briton said to penetrate U.S. computers. (Edward Austin Singh) (computer crime) New York Times v138, n47,668 (Oct 24, 1988):25 (2 pages). Abstract: London police found and questioned Edward Austin Singh, who allegedly used computer networks to break into more than 200 military, corporate and university computer systems. The break-ins took place in both Europe and the United States during the past five years. Police say that Singh, who is described as a 'hacker', simply wanted to break into the systems. They say there is insufficient evidence to support a blackmail charge, which had been considered in connection with Singh's activities. An American security expert downplays the seriousness of the incident, saying that although Singh penetrated American networks, he did not penetrate into classified information. Singh has been released. 17. White, George. Battles against computer crime out of the trenches. (businesses installing security systems, working with consultants; includes related article on security systems) Los Angeles Times v107, secIV (Sun, Aug 7, 1988):1, col 4, 44 col in. 18. Miller, James P. Computer shoot-out helps train police. (crime simulators) (column) Wall Street Journal (Thu, March 17, 1988):23(W), 27(E), col 2, 5 col in. Pub Type: Column. X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X Another file downloaded from: NIRVANAnet(tm) &TOTSE 510/935-5845 Walnut Creek, CA Taipan Enigma Burn This Flag 408/363-9766 San Jose, CA Zardoz realitycheck 415/666-0339 San Francisco, CA Poindexter Fortran Governed Anarchy 510/226-6656 Fremont, CA Eightball New Dork Sublime 805/823-1346 Tehachapi, CA Biffnix Lies Unlimited 801/278-2699 Salt Lake City, UT Mick Freen Atomic Books 410/669-4179 Baltimore, MD Baywolf Sea of Noise 203/886-1441 Norwich, CT Mr. Noise The Dojo 713/997-6351 Pearland, TX Yojimbo Frayed Ends of Sanity 503/965-6747 Cloverdale, OR Flatline The Ether Room 510/228-1146 Martinez, CA Tiny Little Super Guy Hacker Heaven 860/456-9266 Lebanon, CT The Visionary The Shaven Yak 510/672-6570 Clayton, CA Magic Man El Observador 408/372-9054 Salinas, CA El Observador Cool Beans! 415/648-7865 San Francisco, CA G.A. Ellsworth DUSK Til Dawn 604/746-5383 Cowichan Bay, BC Cyber Trollis The Great Abyss 510/482-5813 Oakland, CA Keymaster "Raw Data for Raw Nerves" X-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-X