answersLogoWhite

0


Best Answer

Who would ever imagine that a free toy in a box of cereal would be the springboard for cyber fraud. 'Cyber,' an abbreviation of the word cybernetics - the science of communication and automatic control in both machines and living things, was the descriptive fraud committed by John Draper, a rather quirky individual who initially had fun more in his mind than premeditated malicious acts of fraud.

In the early sixties, as Mr Draper sat at his breakfast table, gobbling down his morning sustenance of sugar-infused breakfast cereal, he did what many men find themselves doing, placing the cereal box in front of them and reading the marketing propaganda whilst they eat. He discovered that he was the beneficiary of a free gift, nestled somewhere within the box. Not being predisposed to the social mores of cereal hygiene, he dug his hand into the bottom of the box and fished out his free toy: A tiny blue whistle.

Not having a pressing social-calendar, Mr Draper, a grown man, entertained himself with his new toy. He was fascinated by the extremely high pitch the whistle was producing. It wasn't quite high enough to attract the neighbourhood's dogs, but it did have other potential applications: its 2600Hz tone was quite similar to the new sounds occasionally heard following the pressing of the newly released touch-tone telephones being introduced across the US.

With a bit of playing around he could initiate a telephone call that bypassed the local exchange and directly accessed the international trunk-lines belonging to AT&T (American Telephone and Telegraph). He could dial local numbers, then by pitching his whistle, connecting to the next set of trunk lines. In time, with two local phone lines in his home, he could route his outbound call from the US to London, then connect to the British Telecom trunk Lines to Hong Kong, then on to Moscow, then back to the US, where his own phone would ring. Mr Draper would often entertain friends with this little trick.

When he was enlisted in the Air Force and based in Alaska, Mr Draper happily arranged for all his comrades to make free telephone calls to their families in the contiguous US, through his nifty little toy. It was a crime to access the AT&T lines and to use their lines for personal gain (the calls to families, etc.), it was considered 'theft of service.' And, the fact that the lines were not limited to within the state of Alaska, but continually crossing numerous state lines, his action was a federal crime.

But Mr Draper had yet to consider this. He constructed a number of little boxes that were used to replicate his free whistle and sold them to people who were more excited about the prospect of making free calls around the world, than the fact they were participating in a cyber-fraud.

In 1972, Mr Draper was convicted of cyber-fraud. But the damage was done. His trickery had been published on multiple computer bulletin boards as a rogue programme called 'The Creeper.' Untold numbers of individuals availed themselves of this illegal, but lucrative opportunity.

So advanced did the crime become that at one point, Mr Draper was able to make an untraceable call to the White House, using the current access password 'Olympic,' to be connected through to the President of the United States -Richard Nixon. Whoever it was that answered the call sounded very much like President Nixon, according to Mr Draper and friends listening. But the call recipient became both suspicious and angry because the password was strictly assigned to reach him during a global emergency. Mr Draper's complaint was that Los Angeles had run out of toilet paper! The call recipient was furious and demanded to know who it was that had phone him!

Years on, summarising the costs to AT&T, the cost of changing all the access frequencies, re-routing of lines and transit exchanges was so vast as to be incalculable. The costs were equally immeasurable by US security agencies, and telephone companies around the world.

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What was one of the earliest recorded computer related crimes?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about General History

What year did computer crimes start?

It came about in the 1960's and 1970's -Early computer crimes often involved physical damage to computer systems and subversion of the long-distance telephone networks.


How are the human rights act and the Holocaust related?

after the Holocaust it was realised that crimes of this nature had no actual laws defining them.


Did Jesse James have issues?

Haha, good one. I think all outlaws have problems, as if that's why they do the crimes. You know I'm related to Jesse James? =D


What crimes put you on on death row?

Capital crimes are those punishable by death. In many countries and states there are no capital crimes. The most common capital crimes are murder, rape and treason.


What are three different types of computer related crime?

Computer Crime, or "Cybercrime" refers to a type of crime in which a computer or a computer network generally played a vital role in the commission of the crime. Cyber-criminals can use the computer to attack other people or computers, or they can simply keep illegal content on their computers. There are many categories of computer-crime, but three categories serve as the bulk of computer crimes that are committed.SpammingThe sending of bulk Emails to a countless number of computers is known as "Spamming" and is considered illegal, depending on the country where the spanning originates from. Because spamming can be perfectly legal depending on the country, spammers are difficult to prosecute.FraudComputer Fraud has many forms, including altering computer input and output, altering or deleting stored data, and altering or misusing system tools and software packages for fraudulent purposes. Additionally, computers can be misused to perform various other types of fraud, such as bank fraud or theft (of information).Obscene/Offensive ContentAny illegal content that is stored on a computer is also considered a computer crime. While the kind of content considered "illegal" will vary from country to country,child pornography is considered illegal worldwide, and makes up the majority of this category of computer crime. Many task forces have been created across the country to deal with this specific violation.

Related questions

Describe and analyze the range of computer-related crimes and based upon this analysis offer up some effective countermeasures?

Describe and analyse the range of computer-related crimes and, based upon this analysis, offer up some effective countermeasures.


New emerging legal field that tracks and combats computer-related crimes is called?

cyberlaw


What are the computer crimes?

Crimes committed digitally with on a computer or a digital appliance.


What is traditional crime?

Traditional crimes include: Recorded property crimes Rape and Robberies Assaults Kidnapping


What is another name for bias-related crimes?

Discrimination. Hate crimes.


What are some drug-related crimes?

Drug-related crimes are those that are committed while under the influence of a substance or related to manufacturing and/or distribution of such substances.


How are hate crimes related to fear and or ignorance?

Hate crimes are usually related to both fear of the unknown and pure ignorance.


Where can I get information/services related to credit fraud protection?

The Secret Service constantly implements and evaluates prevention and response measures to guard against electronic crimes as well as other computer related fraud.


UCMJ does not address computer crimes directly but articles 92 133 and 134 have been used to prosecute computer crimes within the DOD?

true


UCMJ does not address computer crimes directly but articles 92 133 and 134 have been used to prosecute computer crimes within the DOD.?

true


Are there crimes committed that are related to video games?

no


Gun related crimes?

What are you trying to ask?