What's New!

Chat with
Hackers

How to Defend
Your Computer 

The Guides
to (mostly) 
Harmless Hacking

Happy Hacker 
Digests (old stuff) 

Hacker Links 

Hacker
Wargames 

Meet the 
Happy Hacksters 

Help for 
Beginners 

Hacker 
Bookstore 

Humor 

It Sucks 
to Be Me!

How to Commit
Computer Crime (not)! 

What Is a 
Hacker, Anyhow? 

Have a 
Great Life! 

News from the 
Hacker War Front
So you want to be a computer criminal?

Crime laws, continued...

1.  Producing, using, or trafficking in counterfeit access devices.  (The offense must be committed knowingly and with intent to defraud.)

Penalty:  Fine of $50,000 or twice the value of the crime and/or up to 15 years in prison, $100,000 and/or up to 20 years if repeat offense.

2.  Using or obtaining unauthorized access devices to obtain anything of value totaling $1000 or more during a one-year period.  (The offense must be committed knowingly and with intent to defraud.)

Penalty:  Fine of $10,000 or twice the value of the crime and/or up to 10 years in prison, $100,000 and/or up to 20 years if repeat offense.

3.  Possessing 15 or more counterfeit or unauthorized access devices. (The offense must be committed knowingly and with intent to defraud.)

Penalty:  Fine of $10,000 or twice the value of the crime and/or up to 10 years in prison, $100,000 and/or up to 20 years if repeat offense.

4.  Producing, trafficking in, or having device-making equipment.  (The offense must be committed knowingly and with intent to defraud.)

Penalty:  Fine of $50,000 or twice the  value of the of the crime and/or up to 15 years in prison, $1,000,000 and/or up to 20 years if repeat offense.

5.  Effecting transactions with access devices issued to another person in order to receive payment or anything of value totaling $1000 or more during a one-year period.  (The offense must be committed knowingly and with intent to defraud.)

Penalty:   Fine of 10, or twice the value of the crime and/or up to 10 years in prison, 100,000 and/or up to 20 years if repeat offense.

6.  Soliciting a person for the purpose of offering an access device or selling information that can be used to obtain an access device.  (The offense must be committed knowingly and with intent to defraud, and without the authorization of the issuer of the access device.)

Penalty:  Fine of $50,000 or twice the value of the crime and/or up to 15 years in prison, $100,000 and/or up to 20 years if repeat offense.

7.  Using, producing, trafficking in, or having a  telecommunications instruments that has been modified or altered to obtain unauthorized use of telecommunications services. (The offense must be committed knowingly and with intent to defraud.)

This would cover use of “Red Boxes,” “Blue Boxes” (yes, they still work on some telephone networks) and cloned cell phones when the legitimate owner of the phone you have cloned has not agreed to it being cloned.

Penalty:  Fine of $50,000 or twice the value of the crime and/or up to 15 years in prison, $100,000 and/or up to 20 years if repeat offense.

8.  Using, producing, trafficking in, or having a scanning receiver or hardware or software used to alter or modify telecommunications instruments to obtain unauthorized access to telecommunications services.

This outlaws the scanners that people so commonly use to snoop on cell phone calls. We just had a big scandal when the news media got a hold of an intercepted cell phone call from Speaker of the US House of Representatives Newt Gingrich.

Penalty:  Fine of $50,000 or twice the value of the crime and/or up to 15 years in prison, $100,000 and/or  up to 20 years if repeat offense.

9.  Causing or arranging for a person to present, to a credit card system member or its agent for payment, records of transactions made by an access device.(The offense must be committed knowingly and with intent to defraud, and without the authorization of the credit card system member or its agent.

Penalty: Fine of $10,000 or twice the value of the crime and/or up to 10 years in prison, $100,000 and/or up to 20 years if repeat offense.

More on computer crime law--->>

Carolyn's most
popular book,
in 4th edition now!
For advanced
hacker studies,
read Carolyn's
Google Groups
Subscribe to Happy Hacker
Email:
Visit this group