home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Hacker Chronicles 1
/
HACKER1.ISO
/
cud3
/
cud317b.txt
< prev
next >
Wrap
Text File
|
1992-09-11
|
4KB
|
80 lines
------------------------------
From: Silicon.Surfer@unixville.edu
Subject: A Media Commentary on the RIGGS Sentencing
Date: Tue, 14 May 91 20:39 EDT
********************************************************************
*** CuD #3.17: File 2 of 5: Media Comment on Riggs Sentencing ***
********************************************************************
Here is an article I recently saw in the May/June 1991 issue of
Contingency Journal. The author seemed very glad of the judges
decision of restitution for Bell South by the computer hackers (I bet
the author would have approved of dismemberment of their hands also).
According to the story's bio sketch, the author is an attorney with 20
years of experience, including 10 years in computer security at a
major financial institution.
It is interesting to note that the author states that one of the
schemers published the information in a hacker's newsletter. But the
author never mentions that the case against the publisher was dropped
by the government, nor does the author correct the slur that the
publisher was in on the scheme (actually it was proved in court by the
government's own witness that the publisher was not part or any way
connected with the scheme). I only wish that the government would
order restitution to the American taxpayer for what the S & L scheme
will cost us in the next few years.
+++++++++++++++++++++++++++++++++++
Restitution Ordered For Bell South Hackers
By Michael H. Agranoff, Attorney
The law is beginning to respond effectively to the problem of computer
hacking. In September 1988, three young men began implementing a
scheme to steal proprietary data from Bell South Telephone Co.
computers. They illegally gained access to Bell South from a home
computer, downloaded the data and tried to disguise the fraud by using
the IDs of legitimate users.
The stolen data was transferred on an interstate computer network and
stored on a bulletin board system. It was made known to others in a
hacker's newsletter published by one of the schemers.
If the fraud had continued, it could have disrupted telecommunication
channels throughout the country, according to government prosecutors.
The hackers were in a position to retrieve and modify credit
information, eavesdrop on telephone conversations and worse.
Various charges of fraud, theft and conspiracy were lodged against the
trio. They attempted to get the charges dismissed on technical
grounds, were unsuccessful and pleaded guilty to a smaller number of
charges.
A federal judge in Georgia imposed sentences last November. One
hacker was given 21 months in prison and two years supervised
probation.
The other two hackers were each given 14 months in prison. Seven of
those months were to be served in a half-way house, where they must
assist colleges and businesses in computer work. Following release,
the hackers must each complete three years community service, to
include 120 hours each year of computer-related work, during which
time they may not own or access a computer, except for employment,
without supervision approved by the court.
Each of the three hackers was also ordered to pay restitution to Bell
South amounting to $233,880 per hacker. Readers may reflect upon this
sentence. In trying to
protect the public interest and yet not be vindictive, the judge
rendered (in this writer's opinion) a wise and thoughtful decision.
Will it send the appropriate message to potential hackers throughout
the country? Let us see.
********************************************************************
>> END OF THIS FILE <<
***************************************************************************