home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
The Unsorted BBS Collection
/
thegreatunsorted.tar
/
thegreatunsorted
/
texts
/
txtfiles_misc
/
bu-bust2.toe
< prev
next >
Wrap
Text File
|
1995-03-03
|
2KB
|
46 lines
Hacker suspect can't reach out and touch just anyone
Crime: Judege puts tight controls on phone use by accused computer
infiltrator, who could face 35 years in prison.
Raleigh, N.C. - A man accused of cracking security on some of the
nation's most protected computers was held without bond Friday and his access
to the key tool of cybertheft - telephones - was sharply limited. Kevin D.
Mitnick, charged Wednesday with computer fraud and illegal use of a telephone
access device, may speak by phone with his lawyers, his mother and his
grandmother - but marshals or jailers must place any calls, said U.S.
Magistrate Wallace W. Dixon. "Those phone calls will be monitored," Dixon
added.
Assistant U.S. Attorney John S. Bowler explained that all of Mitnick's
alleged crimes "involved use or access to telephones," he said. Prosecutors
say the man described as the nation's most-wanted computer infiltrator used
commandeered cellular-phone circuits to raid corporate computer systems and
steal information worth more than $1 million. Six years ago, Mitnick, 31, was
sentenced to a year in prison after being convicted of infiltrating MCI
telephone computers and causing $4 million damage to Digital Equipment Corp.
On Friday, the bespectacled Mitnick, in a black sweatsuit and leg irons,
with his curly hair in a ponytail, listened intently but said little. "Yes,
your honor," he replied when asked to confirm that he had wanted to waive bond
consideration and preliminary hearing. No plea was entered. He face up to 35
years in prison and $500,000 in fines if convicted.
Authorities released a three-page breakdown of property seized from
Raleigh apartment where Mitnick was arrested following a nationwide search by
law enforcement and computer-security officials. Investigators again credited
the help of Tsutumo Shimomura, who devoted much of his time since Christmas to
tracking the intruder who gained access to his personal computer that day.
"He was not very difficult to catch," Shimomura told a news conference.
"The same tools he used to snip networks are the tools we used to monitor and
catch him." The case showed that computer networks aren't as secure as the
public beleive, he said, adding that encryption and other measures would help.
O.C. Register Saturday, Feb. 18, 1995
News page 12
bugsy `toe'