[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference noted::hackers_v1

Title:-={ H A C K E R S }=-
Notice:Write locked - see NOTED::HACKERS
Moderator:DIEHRD::MORRIS
Created:Thu Feb 20 1986
Last Modified:Mon Aug 03 1992
Last Successful Update:Fri Jun 06 1997
Number of topics:680
Total number of notes:5456

91.0. "Computer Crime Manual?" by VIKING::WASSER_1 () Wed Feb 06 1985 13:38

	Here (for your comments) is part of an advertisement from 
	CONSUMERTRONICS CO. (2011 Cresent Dr., P.O. Drawer 537 ,
	Alamogordo, NM 99310) that was published in a recent 
	"Computer Shopper":

---------------------------------------------------------------------
|                        COMPUTER PHREAKING                         |
---------------------------------------------------------------------
| According to the FBI, less than 5% of all DISCOVERED com-         |
| puter crimes result in conviction!   Computer crime, or           |
| "Phreaking" costs $ Billions per year, and is clearly one of the  |
| most dangerous - yet most profitable and least risky - of all     |
| crimes!  COMPUTER PHREAKING describes in detail:                  |
|     1) Dozens of computer crime methods.  Schemes include:        |
| Input Transaction Manipulation, File Alteration and Substitu-     |
| tion, Unauthorized Software Modification, Code Busting, Wire-     |
| tapping, Electronic Trespass, etc.  Plus many actual examples,    |
| and a detailed case history based upon actual court records of    |
| a major group!  Why and how Government, business and finan-       |
| cial institutions are easily victimized by savvy Phreaks!         |
|    2) Numerous countermeasures, protection and security           |
| schemes - passwords to public key encription methods.  State-     |
| of-the-art techniques.  Foil even the sharpest Phreaks!           |
|    3) Definitions of popular computer crime terms, including      |
| PIRACY, TROJAN HORSE, LOGIC BOMB, TRAPDOOR,                       |
| GODFATHER, MUTANT, ZOMBIE, BODY SNATCHER,                         |
| SILENT ALARM, CHEESEBOX, CANDYMAN, CODE 10, etc.                  |
|    4) Thorough analysis of why computer crimes are the least      |
| risky and most profitable of all crimes.                          |
|    Learn how to become a computer crime fighter!  Compre-         |
| hensive, illustrated, frank.  ONLY $15!                           |
---------------------------------------------------------------------
T.RTitleUserPersonal
Name
DateLines
91.2EXODUS::MARKWed Feb 06 1985 20:574
Hi.  I am interested in that information.  Could you please post it?



91.3NY1MM::KURZMANTue Feb 19 1985 17:1846
Well, I finally built my bookcases this weekend, and so unearthed my manual:

COMPUTER CRIME.  CRIMINAL JUSTICE RESOURCE MANUAL.
Bureau of Justice Statistics
U.S. Dept of Justice
Washington, d.c. 20531

For sale by the Superintendant of Documents,
U.S. Government Printing Office
Washington, D.C. 20402

"This document was prepared for the National Criminal Justice Information
and Statistics Service of the Law Enforcement Assistance Administration,
U.S. Department of Justice, under grant no. 78-ss-ax-0031 awarded to SRI
International. Points of view and opinions stated herein are those of the 
authors and do not necessarily represent the official position or policies
of the U.S. Department of Justice or of SRI International.

LEAA authorizes and person to reproduce, publish, translate or otherwise
use all or any part of the copyrighted material in this publication, with
the exception of those items indicating that they are copyrighted by or
reprinted by permission of any source other than the SRI International."

[ so the manual being sold may very well be the same as the one distributed
by the U.S. Government".  I've had mine since 1979, so there may be a new
edition by now. Certainly the section that outlines the current laws in each
state is undoubtedly out of date, but the other sections are of course quite
relevant.

Also, SRI also has a document that outlines how to break the security on
TOPS, VMS, MVS, etc, again due to 'research grants'.  These not only point
out flaws in technical implementation, but point out flaws in the overall 
design, and describe the work required for the vendor to have to fix these
flaws. Many have been fixed by now (this is from other SRI material, not the
resource Manual).]

I originally found out about the Resource Manual when it was mentioned 
casually in a Computerworld article.  If someone knows how to get a useful
catalog of Government Publications, please let me know. Or better yet, a
place where they can be viewed for free (and yet catalogued effectively).

I found out about the SRI Research when they were handing out their findings
at a Computer Show in an effort to sell their research services. Indeed I
was impressed, but I suspect that a lot of the people who have their report
were not exactly qualified prospects.

91.4MYVAX::FLEISCHMANNFri Feb 22 1985 11:247
The order number for this document is 027-000-00870-4.  

It is available through the D.C. office (202-783-3238) for $10.00 and
can be ordered over the phone with a VISA or MC.  The report is dated
1979 so I assume it hasn't been revised. 

/marc
91.5ACE::BREWERThu Mar 07 1985 12:275
	I believe that there is a Gov. Publications central office
in Pueblo Colorado. They used to send out an update of new publications
weekly. Ill try and find an address.
	
	-John