text stringlengths 0 1.99k |
|---|
a half, 24 hours a day, 7 days a week. We received literally |
hundreds of phone calls from hackers coast to coast, ranging in |
age from 17 to 43. All of them though had one thing in common, |
they were looking for ways to cheat the system. |
The hackers identified themselves by nicknames or handles like |
CB radio operators use, calling themselves things like Ax |
Murderer, Big Foot, and Captain Magic. They left messages on a |
variety of questionable subjects, this hacker for instance told |
how to confidentially eavesdrop on drug enforcement radio |
conversations. A New York hacker called The Jolter swapped |
information on making free long-distance calls through stolen |
access codes, and plenty of others offered credit card numbers |
to make illegal purchases on someone else's account. |
John Maxfield: Well these kids trade these credit card numbers through the |
computer bulletin boards much like they'd trade baseball cards |
at school. What we've seen in the last few years is a series |
of hacker gangs that are run by an adult, sort of the |
mastermind who stays in the background and is the one who |
fences the merchandise that the kids order with the stolen |
credit cards. |
Mike Wendland: Then there were the malicious messages that had the potential |
to do great harm. The Repo Man from West Virginia left this |
message telling hackers precisely how to break into a hospital |
computer in the Charleston, WV area. |
[Picture of Hospital] |
This is where that number rings, the Charleston Area Medical |
Center. We immediately notified the hospital that there |
computer security had been breached. Through a spokesperson, |
the hospital said that a hacker had indeed broken into the |
hospital's computer and had altered billing records. They |
immediately tightened security and began an investigation. |
They caught the hacker who has agreed to make restitution for |
the damages. Maxfield says though, "Most such break-ins are |
never solved". |
John Maxfield: When you are talking about electronic computer intrusion, it's |
the perfect crime. It's all done anonymously, it's all done by |
wires, there's no foot prints, no finger prints, no blood |
stains, no smoking guns, nothing. You may not even know the |
system has been penetrated. |
Mike Wendland: Our experience with the "Sting" bulletin board came to a sudden |
and unexpected end. Our cover was blown when the hackers |
somehow obtained confidential telephone company records. The |
result a campaign of harassment and threats that raised serious |
questions about just how private our supposedly personal |
records really are. That part of the story tomorrow. [For a |
little more detail about how their cover was "blown" see PWN |
Issue 7/Part One, "Maxfield Strikes Again." Heh heh heh heh.] |
Mort Crim: So these aren't just kids on a lark anymore, but who are the |
hackers? |
Mike Wendland: I'd say most of them are teenagers, our investigation has |
linked about 50 of them hardcore around this area, but most |
very young. |
Mort Crim: Far beyond just vandalism! |
Mike Wendland: Yep. |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
A few quicknotes in between shows, Mike Wendland and John Maxfield set up THE |
BOARD. Carman Harlan and Mort Crim are newscasters. |
Also if anyone is interested in the stupidity of Mike Wendland, he flashed the |
post that contained the phone number to the hospital across the screen, Bad |
Subscript put the VCR on pause and got the number. If interested please |
contact Bad Subscript, Ctrl C, or myself. |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
Carman Harlan: Tonight on the second part of a news 4 [WDIV-TV, Channel 4 in |
Detroit] extra Mike Wendland and the I-Team report on how they |
setup a sting bulletin board to see how much they could get on |
these criminal hackers. Mike joins us now to explain that |
information, that was not the only thing they got. |
Mike Wendland: That's right, Carman & Mort. Our so called sting bulletin |
board received hundreds of calls from hackers all over America, |
and even Canada. They offered to trade stolen credit cards, |
and they told how to electronically break into sensitive |
government computers. But our investigation came to a sudden |
end when our sting board was stung. Our cover was blown when |
a hacker discovered that this man, computer security expert |
John Maxfield was serving as the I-Team consultant on the |
investigation. Maxfield specializes as a hacker tracker and |
has worked for the F.B.I. and various other police and security |
agencies. The hacker discovered our sting board by getting a |
hold of Maxfield's supposedly confidential telephone records. |
John Maxfield: And in the process of doing that he discovered the real number |
to the computer. We were using a different phone number that |
was call forwarded to the true phone number, he found that |
number out and called it to discover he was on the sting board. |
Mike Wendland: But the hacker didn't stop at exposing the sting, instead he |
posted copies of Maxfield's private telephone bill on other |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.