text stringlengths 0 1.99k |
|---|
Posted: 8/20/86 @ 12.08 hours |
Greetings: |
You are now on THE BOARD, a "sting" BBS operated by MIKE WENDLAND of the |
WDIV-TV I-Team. The purpose? To demonstrate and document the extent of |
criminal and potentially illegal hacking and telephone fraud activity by the |
so-called "hacking community." |
Thanks for your cooperation. In the past month and a half, we've received all |
sorts of information from you implicating many of you to credit card fraud, |
telephone billing fraud, vandalism, and possible break-ins to government or |
public safety computers. And the beauty of this is we have your posts, your |
E-Mail and--- most importantly ---your REAL names and addresses. |
What are we going to do with it? Stay tuned to News 4. I plan a special |
series of reports about our experiences with THE BOARD, which saw users check |
in from coast-to-coast and Canada, users ranging in age from 12 to 48. For our |
regular users, I have been known as High Tech, among other ID's. John Maxfield |
of Boardscan served as our consultant and provided the HP2000 that this "sting" |
ran on. Through call forwarding and other conveniences made possible by |
telephone technology, the BBS operated remotely here in the Detroit area. |
When will our reports be ready? In a few weeks. We now will be contacting |
many of you directly, talking with law enforcement and security agents from |
credit card companies and the telephone services. |
It should be a hell of a series. Thanks for your help. And don't bother |
trying any harassment. Remember, we've got YOUR real names. |
Mike Wendland |
The I-team |
WDIV, Detroit, MI. |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
This then is the result: |
Phrack World News proudly presents... |
Mike Wendland & the I-Team Investigate |
"Electronic Gangsters" |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
Carman Harlan: Well we've all heard of computer hackers, those electronic |
gangsters who try to break into other people's computer |
systems. Tonight on the first of a three part news 4 [WDIV-TV, |
Channel 4 in Detroit] extra, Mike Wendland and the I-Team will |
investigate how such computer antics jeopardize our privacy. |
Mike joins us now to tell us what at first may have been |
innocent fun may now be affecting our pocket books. |
Mike Wendland: Well Carman and Mort, thanks to the media and movies just about |
everyone knows about hackers and phone phreaks. By hooking |
their Apples, their Ataris, and their Commodores into telephone |
lines these electronic enthusiasts have developed a new form of |
communication, the computer bulletin board. There are probably |
10,000 of these message swapping boards around the country |
today, most are innocent and worthwhile. There are an |
estimated 1,000 pirate or hacker boards where the main |
activities are electronic trespassing, and crime [Estimates |
provided by John Maxfield]. |
[Clipping From Wargames comes on] |
In movies like Wargames computer hackers are portrayed as |
innocent hobbyist explorers acting more out of mischief than |
malice. But today a new generation of hackers have emerged. A |
hacker that uses his knowledge of computers to commit crimes. |
Hackers have electronically broken into banks, ripped off |
telephone companies for millions of dollars, trafficked in |
stolen credit card numbers, and through there network of |
computer bulletin boards traded information on everything from |
making bombs to causing terrorism. |
[Picture of John Maxfield comes on] |
John Maxfield: Well, now there are electronic gangsters, not just electronic |
explorers they are actually gangsters. These hackers meet |
electronically through the phone lines or computer bulletin |
boards. They don't meet face to face usually, but it is a |
semi-organized gang stile activity, much like a street gang, or |
motorcycle gang. |
Mike Wendland: John Maxfield of Detroit is America's foremost "Hacker |
Tracker". He has worked for the F.B.I. and various other law |
enforcement and security organizations. Helping catch dozens |
of hackers around the country, who have used their computers |
for illegal purposes. To find out how widespread these |
electronic gangsters have become, we used John Maxfield as a |
consultant to setup a so-called "sting" bulletin board [THE |
BOARD]. |
We wrote and designed a special program that would allow us to |
monitor the calls we received and to carefully monitor the |
information that was being posted. We called our undercover |
operation "The Board", and put the word out on the underground |
hacker network that a new bulletin board was in operation for |
the "Elite Hacker". Then we sat back and watched the computer |
calls roll in. |
In all we ran our so called "Sting" board for about a month and |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.