⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 seisure warrent documents for ripco bbs.txt

📁 1000 HOWTOs for various needs [WINDOWS]
💻 TXT
📖 第 1 页 / 共 5 页
字号:
gained valuable property because their fraud scheme provided them withtelephone customer authorization codes and other access devices whichin turn could be used by them to obtain telephone services andproperty which would be charged to the victim companies.  Their schemealso provided them with access to private branch exchange (PBX)numbers and codes which could be used to obtain telephone servicewhich was charged to the victim companies.    24.  Computer fraud and abuse:  18 U.S.C. ~ 1030 prohibitsunauthorized access to a federal interest computer with intent to defraud.Intent to defraud has the same meaning as in the wire fraud statute above.A federal interest computer is defined as "one of two or more computersused in committing the offense, not all of which are located in the samestate," as well as computers exclusively for the use of a financialinstitution or the United States Government, among others defined in thestatute.  This section also prohibits unauthorized access to financialrecords and information contained in consumer reporting agency files.    25.  Access device fraud:  18 U.S.C. ~ 1029 prohibits theunauthorized possession of 15 or more unauthorized or counterfeit"access devices" with intent to defraud, and                                - 16 -trafficking in authorized access devices with an intent to defraud andan accompanying $1,000 profit to the violator or loss to the victim.These prohibitions also apply to members of a conspiracy to committhese offenses.  Intent to defraud has the same meaning as in the wirefraud statute above.  "Access devices" includes credit cards, longdistance telephone authorization codes and calling card numbers, voicemail or computer passwords, and PINS (personal identificationnumbers).  An "unauthorized access device" is any access deviceobtained with the intent to defraud, or is lost, stolen, expired,revoked, or cancelled.    26.  Other offenses:  other federal statutes violated in this case mayinclude 18 U.S.C. ~ 1962 and 1963 which prohibit the commission of two ormore acts of racketeering (including two or more acts in violation of 18U.S.C. ~ 1343 and/or 1029), and permits forfeiture of theinstrumentalities used or obtained in the execution of a crime; and 18U.S.C. ~ 371, the federal conspiracy statute.                                   PROBABLE CAUSE                         BULLETIN BOARD SYSTEM 312-528-5020    27. CI 404-235 has accessed a public electronic bulletin board at312-528-5020 over three dozen times between 4/7/89 and 12/31/90.  Themost recent access was on 4/28/90.  In the "Phone Phun" subsection ofthe BBS, CI 404-235 has regularly seen messages posted by users of theBBS, which contain long distance carrier customer                                - 17 -authorization codes, references to hacking, and to credit cards andcredit bureaus.  This affidavit is in support of a search warrant fortwo premises where evidence of the operation of the BBS is expected tobe found.  CI 404-235 provided to affiant copies of messages posted tothe BBS, including the following:           Numb   12 (54r4q9kl-12)            Sub   miscellaneous...           From   DON THOMPSON (#689)             To   all           Date   03/17/89  03:55:00  PM           o.k.:           1999:   322300       342059                   366562       344129                   549259       549296                   492191       496362                   422000       549659    28.  In the above message, "1999" refers to the last four digits ofthe local access number assigned to Starnet, a long distance network ownedby ITT Metromedia Communications.  To use such codes, a caller dials thelocal access number, the customer authorization code, and the area codeand number to be called.  Marty Locker, ITT Security, verified that thelocal access number 950-1999 is Starnet's (Starnet's authorization codesand six digits long).  Loss figures on the above are unknown.    29.  On 3/20/89, user #452 "Blue Adept" replies to a previous message,as follows:                                - 18 -Numb   25  (54r4q9kl-25) Sub   Reply to: Reply to: Legal expenses>From   BLUE DEPT (#452)  To   allDate   03/20/89 08:42:00 AM1999 is starnet.  they've busted several people I know.they live to bust people.  mainly with extraordinarilylarge fines.  I've heard of them taking it to courtthough.  first person they busted was theDiskmaster/Hansel.  really cool guy.  hacked em 300times with the applecat and they busted him.  he didn't"Hacked em 300 times" refers to the number of timers that"Diskmaster/Hansel" is supposed to have attempted to hack out a Starnetcustomer authorization code.  "Applecat" is the name of a modem (computercommunications device) and related software program which automates thecode-hacking process.Numb  69 (54r4q9kl-69) Sub  loop>From  JOE FRIDAY  (#120)To    allDate  03/25/89  07:10:00 PMIF ANYONE HAS A LOOP FOR THE 404 AREACODE I WOULD APPR.IT VERY MUCH!!  IF THERE ARE ANY REAL PHREAKS THAT STILLDO HACK ALOT LEAVE I THINCK YOU MIGHT BENEIFIT FROM IT.18002370407-8010464006ACN-8205109251-IF ANYONE STILL GETS INTO LMOSE LEAVE ME A MESSAGE..    30.  On 4/17/90 Mark Poms, Director of Security, Long DistanceService of Washington D.C., verified the following:   1)1-800-237-0407 is his company's assigned 1-800-line number.Authorization code 8010464006 has suffered $6, 287.22 in fraud                                - 19 -losses, and 8205109251 has suffered $970.34 in fraud losses.    31.  In the above message, "LOOP" refers to a telephone company "looparound test line".  Hackers commonly exchange information on loops, inorder to be able to communicate with each other without divulging theirhome telephone numbers.  If two hackers agree to call a loop number at acertain time, they loop allows them to speak with each other -- neitherhacker needs to know or to dial the other's telephone number.  "LMOSE"refers to a type of computer system (LMOS) operated by Bell regionaloperating companies (local telephone companies).  This computer systemcontains data such as subscriber records, and the LMOS system is solelyfor the use of telephone company employees for the purpose of maintainingtelephone service.  (Explanations provided by Bellcore computer securitytechnical staff member David Bauer.)Numb  136  (56r5q9kl-136) Sub  Suicide?>From  THE RENEGADE CHEMIST (#340)To    AllDate  04/18/89  05:33:00 PM9501001074008187438057919068671056855054168071679                                - 20 -    32.  On 3/20/90 Karen Torres, MidAmerican Communications, a longdistance carrier which a local access number of 950-1001 as validMidAmerican customer authorization codes.  She advised that all but theinvalid code were terminated "due to hacking".     950-1001074008    Valid code, no loss187438    Valid code, no loss057919    Invalid068671    Valid code, no loss056855    Valid code, no loss054168    Valid code, no loss071697    Valid code, no lossNumb  109  (53r3q0k2-109) Sub  Reply to: Reply to: Reply to: Reply to:          Reply to:  John Anderson>From  BRI PAPE (#22)To    ALL...Date  06/28/89  05:31:00 AMANOTHER valid code..AND A DIVERTER...215-471-0083..(REMAIN QUIET)    33.  950-0488 is the local access number for ITT MetromediaCommunications, according to Marty Locker, ITT Security.  Fraud,losses, if any, on this customer authorization code are unknown.    34.  On 4/16/90, Kathy Mirandy, Director of Communications,Geriatrics and Medical Center Incorporated,                                - 21 -United Health Care Services, in Philadelphia, PA, verified that1-215-471-0083 is her company's telephone number.  She stated thatbetween 12/28/88 nand 5/15/89, her company suffered a fraud loss of$81,912.26 on that number.  In the above message,"diverter" refers to a common hacker/phone phreak term for a means ofplacing telephone calls through a telephone facility which belongs tosomeone else.  The hacker "diverts" his call through the otherfacility, and if the outgoing "diverted" call is a long distance call,the owner of the facility is billed for the call as though itoriginated from the victim telephone facility.    35.  On 7/3/89, CI 404-235 accessed the BBS and observed thefollowing message, a copy of which was provided to the affiant:Numb  137  (56r3q0k2-137) Sub  dib.>From  POWER ASSIST  (#524)To    *Date  07/02/89  12:01:00 AMDivertors:   1800 543 7300                  543 3300I'm not sure if this is a 800 to 800 : 800 777 2233    36.  On 4/18/90 Delores L. Early, Associate General Counsel of theArbitron Company, Laurel, Maryland, verified that 1-800-543-7300 islisted to her company.  She advised that her company suffered a directfraud loss by October, 989 of $8,100 on that line, as well asadditional expenses in for form of the installation of "an elaboratesecurity procedure to prevent this                                - 22 -type of fraudulent use," and lost employee time in identifying andcorrecting the problem.  "800 to 800" refers to whether the "divertor"posted in the above message can be used to call out to another 800number.Numb  113 (53r6q0k2-113) Sub  Codes>From  BLUE STREAK  (#178)  To  ALLDate  07/26/89  05:05:00  AMHere is a code:1800-476-3636388409+acn950-026648700586563216575775oops first one is 4847 not 487Blue Streak.Blee blee blee thats all pholks.    37.  On 4/2/90. Dana Berry. Senior Investigator, Teleconnect (adivision of Tele*Com USA, a long distance carrier), verified that 1-800-476-3636 code 388409 is her company's authorization code and it hassuffered a fraud loss of x176.21 {transcrib. note: portion of dollarfigure (first digit) is illegible on copy of affidavit}    38.  On 4/20/90, Christy Mulligan, ComSystems Security, whose companyis assigned the local access number 950-0266, verified the following:                                - 23 -              1) 4847005         $2,548.75 loss due to fraud              2) 8656321         $2,000.00 loss due to fraud              3) 6575775         $  753.61 loss due to fraudNumb   122  (57r3qlk2-122) Sub   TRW>From   NEMESIS TKK (#311)To     GarthDate   09/30/89  04:01:00 AM

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -