Copy Link
Add to Bookmark
Report

MOLE 02

eZine's profile picture
Published in 
MOLE
 · 28 Dec 2019

  


+-------------------------------+
| * Computer Crime * |
| (a short bibliography) |
| newspaper articles |
| |
| 12/20/92 |
| [MOLE02.TXT] |
+-------------------------------+

Search request: FI TW COMPUTER CRIME
Search result: 18 citations in the Newspaper Articles database


1. Two hackers plead guilty to computer crime charges. (John Lee, Julio
Fernandez) (New York Pages)
New York Times v142 (Fri, Dec 4, 1992):B12(N), col 1, 4 col in.

2. O'Reilly, Richard.
Crime panel debates consequences of seizing bulletin boards.
(investigators using computer bulletin boards as evidence) (Column)
Washington Post v115 (Mon, Dec 9, 1991):WB17, col 1, 16 col in.
Pub Type: Column.

3. Mitgang, Herbert.
Thriller writers are quick to find new orders of evil; missing the cold
war, authors turn to things like computer crime and terrorism.
New York Times v141, sec4 (Sun, Dec 1, 1991):E6(N), E6(L), col 1, 19 col
in.

4. Zamora, Jim Herron.
Tax cheaters entering the computer age: Crime: Con artists are filing
phony returns electronically and trying to collect refunds. Officials say
the scam is most prevalent in Southern California.
Los Angeles Times v110 (Sun, August 25, 1991):B1, col 2, 28 col in.

Abstract:
Tax criminals in Southern California have developed a new form of tax fraud
using electronically filed returns. Recent investigations by the Department
of Justice have led to several indictments including a tax preparer who is
charged with cheating the government out of $500,000. One 'scam' involves
setting up a phony company which lists homeless or unemployed people as
employees. These 'employees' then file income tax returns. They do this via
an electronic system, collecting a tax return check. Federal officers are
unwilling to say exactly how sham companies are detected, but it is
revealed that any electronic return with a Social Security number that does
not match against a name will be reviewed.

5. Keller, John J.
Dialing for free: thanks to hackers, cellular phone firms now face crime
wave; an altered computer chip is permitting easy access to networks
nationwide: Mr. Sutton's key omission. (Robert Dewayne Sutton, hacker)
Wall Street Journal (Fri, June 14, 1991):A1(W), A1(E), col 1, 33 col in.

Abstract:
Robert Dewayne Sutton, a 'computer hacker,' sold illegal computer chips
that allow a user to place fraudulent calls on cellular telephone systems.
Federal agents arrested Sutton in Feb 1989, but by that time, the wave of
crime that Sutton allegedly started was too big to stop. Experts say that
free calls now add up to about $200 million a year, and the US Secret
Service, which investigates telephone crimes, fears that cellular fraud
could amount to $600 million by 1992. Sutton, who taught himself to 'burn'
or reprogram computer chips, apparently borrowed a program written by
another hacker named Kenneth Steven Bailey. The original program that
Bailey wrote included a security feature that prevented the program from
being copied, but Sutton's version, which he sold for hundreds of dollars
per copy, did not include that feature. Thus, there was now no control over
the program's spread; it was sold to some who sell time to other. The
illegal telephones were found to be widely used for drug trafficking and
other criminal activities.

6. Becklund, Laurie; Rohrlich, Ted.
Crime computer is a help, but can't do it all. (automated fingerprint
identification system)
Los Angeles Times v110 (Sat, Jan 5, 1991):A31, col 1, 23 col in.

Abstract:
The Los Angeles Police Department is using an automated fingerprint
identification system to track down suspects. Police departments using the
laser system are linked to the California-ID computer run by the state
Department of Justice. The state's computer can look for a matching
fingerprint in 15 minutes. Fingerprints taken from suspects are enlarged
for removal of temporary defects and are sent to the computer in a series
of geometrical equations that correspond to an individual's fingerprint
configuration. Computerized fingerprint matching is also used for state
license and police position applications.

7. Wilke, John R.
Protecting privacy in computer media. (Massachusetts legislators
considering computer crime bill that protects civil liberties) (column)
Wall Street Journal (Fri, Nov 9, 1990):B1(W), B1(E), col 1, 6 col in.
Pub Type: Column.

8. Markoff, John.
Drive to counter computer crime aims at invaders; legitimate users voice
worries over rights.
New York Times v139, sec1 (Sun, June 3, 1990):1(N), 1(L), col 1, 36 col
in.

Abstract:
Government crackdown on computer crime is increasing in response to
lawmakers and corporations but some civil liberties are being threatened by
the investigations. Secret Service officials, who are the primary federal
enforcers of computer crimes laws since 1984, suspect that a large number
of bright young computer enthusiasts are responsible for many computer
crimes including telecommunication fraud, credit card fraud, unauthorized
access to other computers and computer viruses. The lack of legal
precedents for search and seizure and freedom of speech as it pertains to
the computer world raises some questions as to how the government can
prosecute and investigate computer crimes.

9. Dreier, David; Herger, Wally.
No harmless hacker he. (computer hacking is dangerous and there needs to
be legislation allowing for prosecution for this crime) (letter to the
editor)
Washington Post v113 (Sat, May 19, 1990):A23, col 2, 9 col in.
Pub Type: Letter to the editor.

10. Schrage, Michael.
Virus vandalism is a prelude to future computer crime. (column)
Los Angeles Times v108 (Thu, Oct 12, 1989):D1, col 2, 20 col in.
Pub Type: Column.

11. Jackson, Robert L.
Computer-crime sleuths go undercover. (to investigate child molesting
cases appearing on 'bulletin boards')
Los Angeles Times v108, secI (Sun, Oct 1, 1989):20, col 1, 33 col in.

12. FBI rejects computer use on suspects; plan would have allowed tracking
those not charged with a crime. (Federal Bureau of Investigations)
Washington Post v112 (Fri, March 3, 1989):A7, col 1, 7 col in.

13. Richards, Evelyn.
Proposed FBI crime computer system raises questions on accuracy, privacy;
report warns of potential risk data bank poses to civil liberties.
Washington Post v112 (Mon, Feb 13, 1989):A6, col 1, 28 col in.

14. Parrish, Edward A.
Breaking into computers is a crime - pure and simple. (computer hacking)
(column)
Los Angeles Times v107, secV (Sun, Dec 4, 1988):5, col 1, 15 col in.
Pub Type: Column.

15. Feldman, Paul.
Computer crime: hard to prove, prosecute.
Los Angeles Times v107, secI (Wed, Nov 23, 1988):3, col 1, 41 col in.

16. Markoff, John.
Briton said to penetrate U.S. computers. (Edward Austin Singh) (computer
crime)
New York Times v138, n47,668 (Oct 24, 1988):25 (2 pages).

Abstract:
London police found and questioned Edward Austin Singh, who allegedly used
computer networks to break into more than 200 military, corporate and
university computer systems. The break-ins took place in both Europe and
the United States during the past five years. Police say that Singh, who is
described as a 'hacker', simply wanted to break into the systems. They say
there is insufficient evidence to support a blackmail charge, which had
been considered in connection with Singh's activities. An American security
expert downplays the seriousness of the incident, saying that although
Singh penetrated American networks, he did not penetrate into classified
information. Singh has been released.

17. White, George.
Battles against computer crime out of the trenches. (businesses
installing security systems, working with consultants; includes related
article on security systems)
Los Angeles Times v107, secIV (Sun, Aug 7, 1988):1, col 4, 44 col in.

18. Miller, James P.
Computer shoot-out helps train police. (crime simulators) (column)
Wall Street Journal (Thu, March 17, 1988):23(W), 27(E), col 2, 5 col in.
Pub Type: Column.

← previous
next →
loading
sending ...
New to Neperos ? Sign Up for free
download Neperos from Google Play

Let's discover also

Recent Articles

Recent Comments

Neperos cookies
This website uses cookies to store your preferences and improve the service. Cookies authorization will allow me and / or my partners to process personal data such as browsing behaviour.

By pressing OK you agree to the Terms of Service and acknowledge the Privacy Policy

By pressing REJECT you will be able to continue to use Neperos (like read articles or write comments) but some important cookies will not be set. This may affect certain features and functions of the platform.
OK
REJECT