About
Community
Bad Ideas
Drugs
Ego
Erotica
Fringe
Society
Technology
Hack
Introduction to Hacking
Hack Attack
Hacker Zines
Hacking LANs, WANs, Networks, & Outdials
Magnetic Stripes and Other Data Formats
Software Cracking
Understanding the Internet
Legalities of Hacking
Word Lists
register | bbs | search | rss | faq | about
meet up | add to del.icio.us | digg it

Legalities of Hacking


NOTICE: TO ALL CONCERNED Certain text files and messages contained on this site deal with activities and devices which would be in violation of various Federal, State, and local laws if actually carried out or constructed. The webmasters of this site do not advocate the breaking of any law. Our text files and message bases are for informational purposes only. We recommend that you contact your local law enforcement officials before undertaking any project based upon any information obtained from this or any other web site. We do not guarantee that any of the information contained on this system is correct, workable, or factual. We are not responsible for, nor do we assume any liability for, damages resulting from the use of any information on this site.

"The likelihood of getting arrested for computer hacking has increased to an unprecedented level. No matter how precautionary or sage you are, you're bound to make mistakes. And the fact of the matter is if you have trusted anyone else with the knowledge of what you are involved in, you have made your first mistake." -@OsiriS@-

AT&T Finds 'There's Sharks in These Waters' by Fiber Optics News
 AT&T officials have found that sharks have attacked their TAT-8 fiber optic test bed cable system in the Grand Canary Islands 3 times.
Amateur Hackers Tripped Up by Danna Dykstra Coy
 San Luis Obispo police have cracked a case of computer hacking. Now they've got to work out the bugs. Officers were still interviewing suspects late Friday linked to a rare case of computer tampering that involved at least four people, two of them computer science majors from Cal Poly.
An Apple For The Captain by Stephen Wozniak
 The best prank I've seen with the Apple was played by Cap'n Crunch. John Draper, one of Apple's first employees, was responsible for designing a telephone board for us.
An Introduction to the Computer Undergound
An introduction to the Computer Underground
Article about the sentencing of 3 members of the L
Article on Kevin Mitnick, the world's most wanted
Bulletin Board User Says Her Privacy Was Violated by Brock N. Meeks
 Linda Thompson alleges that BBS operator Bob Predaina violated her privacy rights as they relate to her electronic correspondence. The suit cites 10 counts under the federal Electronic Communications Privacy Act of 1986 and Indiana state law.
Colorado Cops Go Online by Bulletin Board Systems
 Larry Scheideman said the IBM PC was just sitting in a corner doing nothing when he suggested that the Lakewood, CO, Department of Public Safety sponsor a bulletin board.
Congressional Testimony of Emmanuel Goldstein
 Edward J. Markey (D-MA) and Jack Fields (R-TX) launched into a tirade against the evils of computer hackers and generally demonstrated their ignorance on the subject and their unwillingness to listen to anything that didn't match their predetermined conclusions. Those conclusions are basically that 2600 Magazine is a manual for criminals and that hackers are a blight on civilization.
Crime and Puzzlement by John Perry Barlow
 By this, I knew that the WELL had a new resident and that his corporeal analog was supposedly called Acid Phreak. Typing !finger optik yielded results of similar insufficiency, including the claim that someone, somewhere in the real world, was walking around calling himself Phiber Optik. I doubted it.
Defeating Computer Forensics by protonigger (a.k.a Murder Mouse)
 A quick guide to keeping your data out of the law's hands.
Don't Throw Out The Computer With The Crime by Dick Adler
 Chicago Tribune article on NIRVANAnet(tm)
Electronic Crime Scene Investigation: A Guide for First Responder by NIJ
 Computers and other electronic devices are present in every aspect of modern life. At one time, a single computer filled an entire room; today, a computer can fit in the palm of your hand. The same technological advances that have helped law enforcement are being exploited by criminals.
Elementary school kids in Berkeley get brainwashed
Everything a Hacker Needs to Know About Being Busted by the Feds by Agent Steal
 The likelihood of getting arrested for computer hacking has increased to an unprecedented level. No matter how precautionary or sage you are, you're bound to make mistakes. And the fact of the matter is if you have trusted anyone else with the knowledge of what you are involved in, you have made your first mistake.
Geraldo Rivera Browbeats Craig Neidorf
 On Sept 30, Geraldo Rivera's show focused on "hackers." Not surprisingly, the commentary was closer to sensationalistic fiction than fact. Those who saw the original airing described Rivera's framing of the issue as reprehensible, and his comments about Craig Neidorf were described as potentially slanderous.
Going Undercover In The Computer Underworld by Ralph Blumenthal
 He patrols the back alleys of cyberspace at the edge of the electronic frontier. Traveling on beams of electrons, he is invisible, formless -- the ultimate undercover agent. He's "Phrakr Trakr" of the Hi-Tech Crime Network. But don't look for him in comic books or the video store. He's real.
Guidelines for Evidence Collection and Archiving by Dominique Brezinski
 A "security incident" as defined in [RFC2828] is a security-relevant system event in which the system's security policy is disobeyed or otherwise breached. The purpose of this document is to provide System Administrators with guidelines on the collection and archiving of evidence relevant to such a security incident.
How RIPCO got busted (great read)
How phone phreaks are caught
How to talk to the press
Info about the SJG trial
Is Computer Hacking a Crime?
 The image of the computer hacker drifted into public awareness in the middle Seventies, when reports of Chinese-food-consuming geniuses working compulsively at keyboards began to issue from MIT. Over time, several of these impresarios entered commerce, and the public's impression of hackers changed.
Kevin's Story by Kevin Mitnick
 The banned first chapter of Kevin Mitnick's new book, Defensive Thinking. It was removed without comment by his publisher at the last minute.
Kollywabbles rant from Crypt #32 about the Contra
Legion of Doom Sells out
Millbrae Police Arrest Alleged Teen 'Hackers' by John Curry
 A telephoned bomb threat to the White House early this summer led to the arrest Wednesday of two teen-age "computer hackers" in Millbrae.
New Jersey Hacker Case Test of Sysops' Free Speech by Bulletin Board Systems
 Prosecutors told reporters that the individuals exchanged information that would allow them to access commercial computers without authorization and that some of them had codes that could cause communications satellites to ''change position.''
Night Shift Backs Free Speech Issues
 BBS explorers who want to express their support for unrestricted online data communication might want to check out the Night Shift Bulletin Board in New York.
Nightline: FBI, Privacy, and wire- tapping
On-line and Out-of-Bounds by Julian Dibbell
 The U.S. Secret Service, and a couple of security guys from the telco, told her that they wanted to talk to her 20 year old son. They had reason to belive that Joey was a phone-systems hacker - a phone phreak - known in the computer underground as Acid Phreak. They had reason to believe he was a leader of the notorious hacker organization known as the LoD. They also suspected he was responsible for the multi-million dollar AT&T system crash on 1/5, wich disrupted long-distance service for 9 hours. Joey's mom was not thrilled.
Phone Hackers are Tapping PBXs (article)
Phone Phreak Bugs FBI by Scanman
 Old news article on Captain Crunch and the telco's auto-verify system.
Phone company illegally blocks calls
Police Set Up Bulletin Board Stings by Jim Forbes
 Law enforcement officials here have joined a growing number of police agencies nationwide running "sting"operations to catch persons using bulletin boards for illegal purposes.
Response to Questions by US Secret Service
 The process by which the Secret Service investigates computer related crimes is similar to the methods we use to investigate other types of criminal investigations. Most of the investigative techniques are the same; surveillances, record checks, witness and suspect interviews, etc. the primary difference is we had to develop resources to assist in the collection and review of computer evidence.
Rights of Expression in CyberSpace
Secret Service is Found Guilty in Steve Jackson Ca
Seizure Warrant Documents for RipCo BBS
Sentencing Guidelines too Harsh by Shari Steele
 Sentencing Guidelines applicable to violations of the Computer Fraud and Abuse Act of 1988.
Series of articles on police investigations into c
Series of articles/interviews about hackers who ha
Sky Tower BBS
 The time is 20:38 and I've just got off the phone. It was Enzo, the sysop at Sky Tower. He got busted today. The cops came to his place at around 7 am with a warrant (a year old!) and took all his equipment, Amiga, monitors, modems, his PC, dat, etc. and took him to the police station.
Steve Jackson Games case decision
Steve Jackson Games response to motion to dismiss
Steve Jackson Games sues the government!
Story about the Treasury Department's AIS BBS, whi
Striking Back at the Hackers by John Carey
 Stung and embarrased by youthful hackers who have repeatedly broken into its central computer system, TRW information services has launched a major counter attack on underground computer based "bulletin boards".
Sysop Jailed in Georgia by Lance Rose
 Adult BBS' continue to spread across the country. Many of them openly carry industrial-strength hardcore materials, without much apparent concern for legal reprisals.
The Constitution in CyberSpace
The Contra Costa Times vs. NIRVANAnet(tm) by Michael Liedtke
 THE CONTRA COSTA TIMES VS. NIRVANAnet(tm) by Michael Liedtke with follow-ups from Demented Pimento, Sam Uzi, Poindexter Fortran, Quaker State Tapioca Rupture, Suzanne d'Fault, and Your Kindly Parole Officer.
The Ethics of Computer Network Attack by William J. Bayles
 Current joint military doctrine includes computer network attack and several more traditional military disciplines in the term "information operations". Defined as "actions taken to affect adversary information and information systems while defending one's own information and information systems," IO encompasses operations security, psychological operations, military deception, electronic warfare, physical attack, and computer network attack.
The Fear & Loathing BBS Was Busted! by Empedocles
 At 8 am. - The FBI from Birmingham, Alabama came in and presented a Search Warrant dated 7/29/93 and proceded to swipe every piece of Electronics from The Doctor - SYSOP of the Fear & Loathing BBS.
The Forbidden Zone BBS
 Messages from Users on the Fall of the Forbidden Zone BBS.
The Great Satellite Caper by Phillip Elmer-DeWitt
 It started innocuously enough: a credit card customer in Connecticut opened his monthly statement and noticed a charge for a piece of electronic equipment that he had never purchased. By last week that apparent billing error had blossomed into a full-fledged hacker scandal and led to the arrest of seven New Jersey teenagers who were charged with conspiracy and using their home computers and telephone hookups to commit computer theft.
The Hacker Menace and Electronic Bulletin Boards
 With the advent of home computers, and the teaching of computer basics at the grade school level, the average age of the begininning (youth) hacker has dropped to only 14!! The overwhelming majority of BBS owners and users are teenagers. Teens tend to form cliques and peer groups, so the formation of phone phreak and hacker gangs was inevitable.
The IBM Bust of 612 by Professor Falken
 Magnus gave him access and Vector looked at the utilties. Well it so happens that Vector was a software writer for ONTRACK SYSTEMS or something. Well it so happens that Magnus had DISK MANAGER that was written by ONTRACK SYSTEMS. Well Vector told Magnus to take that ware down! Becuz it was his companies ware. Well as any decent sysop would he told Vector to suck wally.
The Night of the Hackers by Richard Sandza
 PHBI and scores of other computer bulletin boards are hangouts of a new generation of vandals. These precocious teenagers use their electronic skills to play hide-and-seek with computer and telephone security forces.
The Night of the Hackers by Richard Sandza
 Punch in another number and your modem zips off the touch tones. Here we come across the inevitably tedious side of all this... Bulletin boards are popular. No vacancy in Bates Motel (named for Anthony Perkin's creepy motel in the movie "Psycho"); the line is busy.
This is a partial xscript of Neidorf's hearing
USA v. RaiseTheFist.com by John Pi, FBI Special Agent
 A copy of the text of the FBI's search warrant issued against RaiseTheFist.com.
Your Rights as a Phone Phreak by Fred Steinbeck
 "Oh, I'm not worried. They can't tap my line without a court order." Ever catch yourself saying that? If so, I'll wager you don't know too much about the laws that can prove to be the downfall of many a phone phreak. But you are wagering your freedom and money that you do know. Odds are you don't. At least, I didn't, and I had a very painful experience finding out.
 
This page Copyright © 1997-2006 totse.com.
 

totse.com certificate signatures
 
 
About | Advertise | Bad Ideas | Community | Contact Us | Copyright Policy | Drugs | Ego | Erotica
FAQ | Fringe | Link to totse.com | Search | Society | Submissions | Technology
Hot Topics
Php
Withstanding an EMP
Good computer destroyer?
Wow, I never thought the navy would be so obvious.
Alternatives Internets to HTTP
Anti-Virus
a way to monitor someones AIM conversation
VERY simple question: browser history
 
Sponsored Links
 
Ads presented by the
AdBrite Ad Network

 

TSHIRT HELL T-SHIRTS