⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 seisure warrent documents for ripco bbs.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
they are law enforcement, adults, or other undesirables).  This isparticularly true of BBS's whose members are involved in some form ofcriminal activity.  Many "underground" or criminal bulletin boardscontain subsections through which the users regularly exchange stolencustomer authorization codes, credit card numbers, and information ontechniques or methods for the commission of such crimes as computerfraud and abuse, access device fraud and wire fraud.     5.  System operator/system administrator (sysop): the person(s)charged with the responsibility for operating a particular computerbulletin board system (usually the owner of                                - 5 -the computer who lives in the residence where the BBS is operating).In order to perform their necessary supervisory and maintenancefunctions, sysops who run or own the BBS give themselves the highestlevel of access, or privileges, available on a system.  In the caseof a bulletin board sysop, these functions typically include decidingwhether or not to to give access or type of privileges to allow todifferent users, and the ability to read the entire content stored onthe BBS (including "private mail" -- see electronic mail, below.)Sysops control the BBS, can remove contents, add and delete users,change the programming, alter the communications parameters, andperform a number of administrative and maintenance tasks associatedwith operation of the BBS.     6.  Electronic mail (E-mail):  electronic mail is a means ofcommunication among computer users, and is one of the features normallyfound on a BBS.  Each user on a criminal BBS has a distinctidentifier, with a computer hacker's "username" or "login" oftenidentical to his hacker handle (handles tend toward the theatrical,I.e. Prophet of Doom, DungeonMaster, Ax Murderer, etc.) and a uniqueconfidential password; each user may also be assigned a user number bythe system.  Users may send "public" mail by leaving a message in asection of the system where all who call in may read the message andrespond.  They may also send "private mail" by sending a messagelimited to a particular individual or group.                                - 6 -In this instance, other users would not be able to read the privatemessage.  (Except, of course for the sysop, as explained above.)     7.  Chat:  unlike electronic mail, which consists of messages andresponses entered and stored for later review, the "chat" communication ona BBS consists of simultaneous interactive communication between the sysopand a user, or between two or more users -- the computer equivalent of aconference call.  A more sophisticated BBS may have more than onetelephone line connected to the system, so that two or more users can"talk" to each other though the BBS from their own computer systems at onetime.     8.  Voice Mail System (VMS):  a voice mail system is an electronicmessaging computer which acts as an answering service.  These systems aregenerally either (1) operated for hire to the public by commercialcommunications companies, often in combination with cellular telephone orpaging services, or (2) by corporations for the convenience of employeesand customers.  In either case, the subscriber or employee is assigned anindividual "mailbox" on the system which is capable of performing severalfunctions.  Among these functions are receiving and storing messages fromcallers, sending messages to other boxes on the system, and sendingmessages to a pre-selected group of boxes.  These functions are performedby pushing the appropriate numerical commands on a telephone keypad forthe desired function.                                - 7 -     9.  While voice mail systems vary among manufacturers, in general, acaller dials either a local area code and number, or an "800" number toaccess the system.  Generally, the caller hears a corporate greetingidentifying the system and listing instructions for leaving a message andother options.  To leave a message, the caller enters a "mailbox number,"a series of digits (often identical to the assigned owner's telephoneextension), on his own telephone keypad.  The caller then hears whatevergreeting the mailbox owner has chosen to leave.  Again, the caller canusually exercise several options, one of which is to dictate an oralmessage after a tone.    10.  In this respect, the voice mail system operates much like atelephone answering machine.  Rather than being recorded on audio tape,however, the message is stored in digitized form by the computer system.When the message is retrieved, the computer plays it back as soundunderstandable by the human ear.  The entire VMS is actually a computersystem accessible through telephone lines; the messages are stored onlarge-capacity computer disks.    11.  A caller needs to known only the extension or mailbox number inorder to leave a message for the employee or subscriber.  In order toretrieve the messages or delete them from the system, however, the personto whom the box is assigned must have both the box number and aconfidential password: the password ensures privacy of the communications,by acting as a "key" to "unlock" the box and reveal its contents. Anyone                                - 8 -calling the telephone number of the mailbox hears the owner's greeting --only the content of messages left for the owner is protected by thepassword or security code.  The person to whom the box is assigned mayalso have the ability to change his password, thereby preventing access tothe box contents by anyone who may have learned his password.    12.  Private Branch Exchange (PBX): a private branch exchange is adevice which operates as a telephone switching system to provide internalcommunications between telephone facilities located on the owner'spremises as well as communications between the company and other privateor public networks.  By dialing the specific telephone number of a PBXequipped with a remote access feature and entering a numeric password orcode on a telephone keypad or by means of a computer modem, the caller canobtain a dial tone, enabling the caller to place long distance calls atthe expense of the company operating the PBX.    13.  Phone phreak:  phone phreaks, like computer hackers, arepersons involved in the theft of long-distance services and otherforms of abuse of communications technology, but they often do nothave computer systems.  Rather than communicating with each otherthrough BBS's, they communicate with each other and, exchange stolencarrier customer authorization codes and credit cards, either directlyor by means of stolen or "hacked" corporate voice mailboxes.  Phonephreaks may also set up fraudulent conference calls for the                                - 9 -exchange of information.  A phone phreak may operate a "codeline" (amethod of disseminating unauthorized access devices) on a fraudulentlyobtained voice mailbox, receiving messages containing stolen creditcard numbers from his co-conspirators, and in turn "broadcasting" themto those he shares this information with during the greeting (boxowner's message to callers), which can be heard by anyone dialing themailbox number.  Phone phreaks and computer hackers sometimes shareinformation by means of the conference calls and codelines.  Likecomputer hackers, phone phreaks also identify themselves by "handles"or aliases.                        BACKGROUND OF THE INVESTIGATION    14.  Over the past several years, the U.S. Secret Service has receivedand increasing  number of complaints from long distance carriers, creditcard companies, credit reporting bureaus, and other victims of crimescommitted by computer hackers, phone phreaks, and computer bulletin boardusers and operators (see Definitions section),  which have resulted insubstantial financial losses and business disruption to the victims.Because the persons committing these crimes use aliases or "handles", maildrops under false names, and other means to disguise themselves, they havebeen extremely difficult to catch.  They also conspire with many others toexchange information such as stolen long distance carrier authorizationcodes, credit card numbers, and technical information relating to theunauthorized invasion of computer systems and voice mail                                - 10 -messaging computers, often across state or national borders, makingthe investigation of a typical conspiracy extremely complex.  Many ofthese persons are juveniles or young adults, associate electronicallyonly with others they trust or who have "proven" themselves bycommitting crimes in order to gain the trust of the group, and usecharacteristic "hacker jargon."  By storing and trading informationthrough a network of BBS's, the hackers increase the number ofindividuals attacking or defrauding a particular victim, and thereforeincrease the financial loss suffered by the victim.    15.  For all of the above reasons, the U.S. Secret Service establisheda computer crime investigation project in the Phoenix field office,utilizing an undercover computer bulletin board.  The purpose of theundercover BBS was to provide a medium of communication for personsengaged in criminal offenses to exchange information with each other andwith the sysop (CI 404-235) about their criminal activities.  The bulletinboard began operating on September 1, 1988 at 11:11 p.p., MountainStandard Time, was located at 11459 No. 28th Drive, Apt. 2131, Phoenix,Arizona, and was accessed through telephone number (602) 789-9269.  It wasoriginally installed on a Commodore personal computer, but on January 13,1989 was reconfigured to operate on an Amiga 2000 personal computer.    16.  The system was operated by CI 404-235, a volunteer paidconfidential informant to the U.S. Secret Service.  CI 404-235 wasfacing no criminal charges.  Over the past eighteen                                - 11 -months, information by CI 404-235 (see paragraph 16) has consistentlyproved to be accurate and reliable.  The Arizona Attorney General'soffice executed six search warrants related to affiant's investigationin 1989 and 1990 (affiant participated in three of these).  Evidenceobtained in those searches corroborated information previously givento affiant or to George Mehnert, Special Agent of the Arizona AttorneyGeneral's office by CI 404-235.  In over a dozen instances, CI404-235's information was verified through other independent sources,or in interviews with suspects, or by means of a dialed numberrecorder (pen register).  One arrest in New York has been made as aresult of CI 404-235's warning of planned burglary which did occur ata NYNEX (New York regional Bell operating company) office.  Throughoutthis investigation, CI 404-235 has documented the information providedto the affiant by means of computer printouts obtained from theundercover BBS and from suspect systems, and consensual taperecordings of voice conversations or voice-mail messages.    17.  Because many of the criminal bulletin board systems require thata new person seeking access to the telephone code or credit card sectionscontribute stolen card information to demonstrate "good faith," when askedto do so, CI 404-235 has "posted," (left on the system in a message)Sprint, MidAmerican or ComSystems authorization codes given to affiant byinvestigators at these companies for that purpose.                                - 12 -                       EVIDENCE IN HACKER CASES    18.  Computer hackers and persons operating or using computer bulletinboard systems commonly keep records of their criminal activities on paper,in handwritten or printout form, and magnetically stored, on computer harddrives, diskettes, or backup tapes.  They also commonly tape recordcommunications such as voice mail messages containing telephoneauthorization codes and credit cards.  On several occasions, affianthas interviewed George Mehnert, Special Agent, Arizona AttorneyGeneral's office and R.E. "Sandy" Sandquist, Security Manager, U.S.Sprint, about the types of evidence normally found in connection withcomputer/ communications crimes.  Both have assisted more than 20search teams in the execution of search warrants in such cases.  BothMehnert and Sandquist stated that because of the sheer volume ofcredit card numbers, telephone numbers and authorization codes, andcomputer passwords, and other information necessary to conduct thistype of criminal activity, in almost every case, they have found alarge volume of paper records and magnetically-stored evidence atscenes being searched.  Because of the ease of storing large amountsof information on computer storage media such as diskettes, in a verysmall space, computer hackers and bulletin board users or operatorskeep the information they have collected for years, rather thandiscarding it.  Mehnert stated that in virtually everycommunications/computer crime case he has investigated, the suspect wasfound to have records in his possession dating                                - 13 -back for years -- Mehnert stated that it is common in such cases tofind records dating from 1985 and sometimes, even earlier.    19.  Sandquist confirmed Mehnert's experience, stating that hackersand phone phreaks typically also keep a notebook listing the location ofinformation especially important to them, for easy access.  Mehnert hasseized several of these "hacker notebooks" in computer/communicationscrime cases; they were usually found quite close to the computer system,or in the hacker's possession.  Both Mehnert and Sandquist stated that itis common for a person involved in the theft of communications services(long distance voice or data calls, voice mail boxes, etc.) also to beinvolved in the distribution or use of stolen credit cards and/or numbers;hackers and phone phreaks often trade codes for credit cards, or thereverse.  Both Mehnert and Sandquist stated that it is common to findcredit card carbons at locations being searched for stolen telephoneauthorization codes.    20.  Both Mehnert and Sandquist also stated other evidence commonlyfound in connection with these cases includes telephone lineman tools andhandsets (used for invading telephone company pedestal or cross-boxes andnetworks, or for illegal interception of others' communications), tonegenerators (for placing fraudulent calls by electronically "fooling"the telephone network into interpreting the tones and legitimateelectronic switching signals), computer systems (including centralprocessing unit, monitor or screen, keyboard, modem for                                - 14 -computer communications, and printer), software programs andinstruction manuals.  Sysops of bulletin boards also commonly keephistorical backup copies of the bulletin board contents or messagetraffic, in order to be able to restore the system in the event of asystem crash, a power interruption or other accident.  An importantpiece of evidence typically found in connection with a criminalbulletin board is the "user list" -- sysops normally keep such a liston the BBS, containing the real names and telephone numbers of userswho communicate with each other only by "handles."  The user list is avery substantial piece of evidence linking the co-conspirators to thedistribution of telephone codes and credit cards through the BBSmessages or electronic mail.    21.  Mehnert and Sandquist stated that it is also common to find listsof voice mailboxes used by the suspect or his co-conspirators, along withtelephone numbers and passwords to the voice mailboxes.  Many suspectsalso carry pagers to alert them to incoming messages.                              CRIMINAL VIOLATIONS    22.  Criminal violations may include, but are not limited to, thefollowing crimes:    23.  Wire fraud:  18 U.S.C. ~ 1343 prohibits the use of interstatewire communications as part of a scheme to defraud, which includesobtaining money or property (tangible or intangible) by a criminal orthe loss of something of value by the victim.  Investigation by youraffiant has determined that                                - 15 -the actions of the computer hackers, phone phreaks and bulletin boardoperators detected in this investigation defrauded telephone companieswhose customer authorization codes were exchanged through the BBS's)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -