text
stringlengths
0
1.99k
a half, 24 hours a day, 7 days a week. We received literally
hundreds of phone calls from hackers coast to coast, ranging in
age from 17 to 43. All of them though had one thing in common,
they were looking for ways to cheat the system.
The hackers identified themselves by nicknames or handles like
CB radio operators use, calling themselves things like Ax
Murderer, Big Foot, and Captain Magic. They left messages on a
variety of questionable subjects, this hacker for instance told
how to confidentially eavesdrop on drug enforcement radio
conversations. A New York hacker called The Jolter swapped
information on making free long-distance calls through stolen
access codes, and plenty of others offered credit card numbers
to make illegal purchases on someone else's account.
John Maxfield: Well these kids trade these credit card numbers through the
computer bulletin boards much like they'd trade baseball cards
at school. What we've seen in the last few years is a series
of hacker gangs that are run by an adult, sort of the
mastermind who stays in the background and is the one who
fences the merchandise that the kids order with the stolen
credit cards.
Mike Wendland: Then there were the malicious messages that had the potential
to do great harm. The Repo Man from West Virginia left this
message telling hackers precisely how to break into a hospital
computer in the Charleston, WV area.
[Picture of Hospital]
This is where that number rings, the Charleston Area Medical
Center. We immediately notified the hospital that there
computer security had been breached. Through a spokesperson,
the hospital said that a hacker had indeed broken into the
hospital's computer and had altered billing records. They
immediately tightened security and began an investigation.
They caught the hacker who has agreed to make restitution for
the damages. Maxfield says though, "Most such break-ins are
never solved".
John Maxfield: When you are talking about electronic computer intrusion, it's
the perfect crime. It's all done anonymously, it's all done by
wires, there's no foot prints, no finger prints, no blood
stains, no smoking guns, nothing. You may not even know the
system has been penetrated.
Mike Wendland: Our experience with the "Sting" bulletin board came to a sudden
and unexpected end. Our cover was blown when the hackers
somehow obtained confidential telephone company records. The
result a campaign of harassment and threats that raised serious
questions about just how private our supposedly personal
records really are. That part of the story tomorrow. [For a
little more detail about how their cover was "blown" see PWN
Issue 7/Part One, "Maxfield Strikes Again." Heh heh heh heh.]
Mort Crim: So these aren't just kids on a lark anymore, but who are the
hackers?
Mike Wendland: I'd say most of them are teenagers, our investigation has
linked about 50 of them hardcore around this area, but most
very young.
Mort Crim: Far beyond just vandalism!
Mike Wendland: Yep.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
A few quicknotes in between shows, Mike Wendland and John Maxfield set up THE
BOARD. Carman Harlan and Mort Crim are newscasters.
Also if anyone is interested in the stupidity of Mike Wendland, he flashed the
post that contained the phone number to the hospital across the screen, Bad
Subscript put the VCR on pause and got the number. If interested please
contact Bad Subscript, Ctrl C, or myself.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Carman Harlan: Tonight on the second part of a news 4 [WDIV-TV, Channel 4 in
Detroit] extra Mike Wendland and the I-Team report on how they
setup a sting bulletin board to see how much they could get on
these criminal hackers. Mike joins us now to explain that
information, that was not the only thing they got.
Mike Wendland: That's right, Carman & Mort. Our so called sting bulletin
board received hundreds of calls from hackers all over America,
and even Canada. They offered to trade stolen credit cards,
and they told how to electronically break into sensitive
government computers. But our investigation came to a sudden
end when our sting board was stung. Our cover was blown when
a hacker discovered that this man, computer security expert
John Maxfield was serving as the I-Team consultant on the
investigation. Maxfield specializes as a hacker tracker and
has worked for the F.B.I. and various other police and security
agencies. The hacker discovered our sting board by getting a
hold of Maxfield's supposedly confidential telephone records.
John Maxfield: And in the process of doing that he discovered the real number
to the computer. We were using a different phone number that
was call forwarded to the true phone number, he found that
number out and called it to discover he was on the sting board.
Mike Wendland: But the hacker didn't stop at exposing the sting, instead he
posted copies of Maxfield's private telephone bill on other