text stringlengths 0 1.99k |
|---|
hacker bulletin boards across the country. |
John Maxfield: The harassment started, all of the people on my phone bill got |
calls from hackers. In some cases their phone records were |
also stolen, friends and relatives of theirs got calls from |
hackers. There was all sorts of other harassment, I got a call |
from a food service in Los Angeles asking where I wanted the |
500 pounds of pumpkins delivered. Some of these kids are |
running around with guns, several of them made threats that |
they were going to come to Detroit, shoot me and shoot Mike |
Wendland. |
Mike Wendland: A spokesperson from Michigan Bell said that the breakdown in |
security that led to the release of Maxfield's confidential |
records was unprecedented. |
Phil Jones (MI Bell): I think as a company were very concerned because we work |
very hard to protect the confidentially of customer's |
records. [Yeah, right]. |
Mike Wendland: The hacker who got a hold of Maxfield's confidential phone |
records is far removed from Michigan, he lives in Brooklyn, NY |
and goes by the name Little David [Bill From RNOC]. He says |
that getting confidential records from Michigan Bell or any |
other phone company is child's play. Little David is 17 years |
old. He refused to appear on camera, but did admit that he |
conned the phone company out of releasing the records by simply |
posing as Maxfield. He said that he has also sold pirated |
long-distance access codes, and confidential information |
obtained by hacking into the consumer credit files of T.R.W. |
Little David says that one of his customers is a skip-tracer, a |
private investigator from California who specializes in finding |
missing people. Maxfield, meanwhile, says that his own |
information verified Little David's claim. |
John Maxfield: The nearest I can determine the skip-tracer was using the |
hacker, the 17 year old boy to find out the whereabouts of |
people he was paid to find. He did this by getting into the |
credit bureau records for the private eye. This is an invasion |
of privacy, but it's my understanding that this boy was getting |
paid for his services. |
Mike Wendland: In Long Island in New York, Maxfield's telephone records were |
also posted on a bulletin board sponsored by Eric Corley, |
publisher of a hacker newsletter [2600 Magazine]. Corley |
doesn't dispute the harassment that Maxfield received. |
Eric Corley: Any group can harass any other group, the difference with hackers |
is that they know how to use particular technology to do it. If |
you get a malevolent hacker mad at you there's no telling all the |
different things that can happen. |
Mike Wendland: What can happen? Well besides getting your credit card number |
or charging things to your account, hackers have been known to |
change people's credit ratings. It is really serious business! |
And tomorrow night we'll hear about the hacker philosophy which |
holds that if there is information out there about you it is |
fair game. |
Mort Crim: "1984" in 1986. |
Mike Wendland: It is! |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - |
Carman Harlan: News four [WDIV-TV, Channel 4 in Detroit] extra, Mike Wendland |
and the I-Team look at how these hackers are getting out of |
hand. |
Mike Wendland: The problem with hackers is not just with mischief anymore, |
unscrupulous hackers are not only invading your privacy, they |
are costing you money. Case and point, your telephone bills, |
because American telephone companies have long been targets of |
computer hackers and thieves we are paying more than we should. |
Experts say the long distance companies lose tens of millions |
of dollars a year to, these self described "Phone Phreaks." |
For example in Lansing, the Michigan Association of |
Governmental Employees received a phone bill totalling nearly |
three hundred and twenty one thousand dollars. For calls |
illegally racked up on there credit card by hackers. Such |
victims seldom get stuck paying the charges, so hackers claim |
there piracy is innocent fun. |
Phil Jones (MI Bell): Nothing could be further from the truth, it becomes a |
very costly kind of fun. What happens is that the |
majority of the customers who do pay there bills on |
time, and do use our service lawfully end up quitting |
after that bill. |
Mike Wendland: That's not all, hackers regularly invade our privacy, they |
leave pirated credit card numbers and information how to break |
into electronic computer banks on bulletin boards. Thousands |
of such electronic message centers exist across the country, |
most operated by teenagers. |
John Maxfield: There is no law enforcement, no parental guidance, they're just |
on their own so they can do anything they want. So the few bad |
ones that know how to steal and commit computer crimes teach |
the other ones. |
Mike Wendland: There is very little that is safe from hackers, from automatic |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.