Chilean fraudster's problem worsens
-
Upload
belden-menkus -
Category
Documents
-
view
212 -
download
0
Transcript of Chilean fraudster's problem worsens
FRAUD/HACKING NEWS
Mexicans protest against cellular phone fraud
M exico's licensed cellular phone companies are demanding Mexican officials crack down on the growing number of pirate
cellular phone agencies. The pirate companies steal, or figure out the code of a client with a licensed cellular phone, and then make a clone
phone that copies the first signal. Any calls made on the cloned phone will be
"crack down o n charged to the first user and routed th rough the l i c ensed c o m p a n y .
t h e y r o w l n y Cellular phone agencies in Mexico
number of pirate estimate the loss of $40 million a year t h r o u g h f raud . The US
cellular /
pnone telecommunications company GTE
a,,encies,,~ ' has been se l l ing the M e x i c a n companies equipment that detects phones using the same signal, but no
legislation exists in Mexico to punish the pirate agencies. The users of the pirate phones usually pay a flat fee of around 3000 pesos every two months.
Hacker changes school computer grades
D espite hacking into his high school's computer to change the grades of a few of his friends, the police are recommending no charges be
filed against a teenage hacker. According to the Salt Lake Tribune, the teenager tapped into a file that conta ined the passwords of
"the teenager tapped faculty and staff and used the pas swords to change some
into a file that grades. Teachers informed the
contained the police that someone had illegally tapped into sensitive files in the
passwords of faculty school's c o m p u t e r sys tem.
and staff and used When the police started investigating, the 17-year-old
t h e passworos'- to student gave himself up. He was
h n suspended for one week and all c,,an~e some those who had had their grades
grades" changed lost computer network privileges at the school for one year. The damage was not as bad
as the police originally thought. They had feared that the student had distributed the passwords to other students.
Computer Fraud & Security April 1996 © 1996 Elsevier Science Ltd