Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image
Article image

Hackers use P.O.

PA Auckland New Zealand computer hackers are breaking into data systems throughout the World using a Post Office line, says a Post Office spokesman. Hackers had tapped into Swiss banks, Japanese electronics firms, and some were believed to be trying to crack American F. 8.1. and C.I.A. computers, one hacker said.

They had access to virtually any computer in the world via the Post Office Pacnet data communica-' tions line out of New. Zealand.

The CMef Post Office data services supervisor, Mr Murray Young, has said that little could be done to stop the hackers. It was up to individual companies and organisations to install computer security systems.

The Pacnet switching service was provided by the Post Office extremely cheaply, he said. The service enabled computer users to be connected with systems world wide — for legitimate purposes. He said he knew of some hackers using the service on legitimate grounds initially, but then to tap into any computer they could find. All the hackers paid was for time on the Pacnet line. A hacker told the “Auckland Star” that the Pacnet

computer-breaking system usually cost less than $lOO each attempt. It could cost more if a hacker sought a E articular computer to reak into without knowing the password. He was reluctant to give specific examples of com-, puters broken into because

‘‘hacking laws overseas are ' the real thing.” It was a relatively new development for New Zealand computer' ; buffs and they were taking

big risks. Hackers who broke into a system of national security could be tracked and prosecuted.

This article text was automatically generated and may include errors. View the full page to see article in its original form.
Permanent link to this item

https://paperspast.natlib.govt.nz/newspapers/CHP19851205.2.131

Bibliographic details

Press, 5 December 1985, Page 28

Word Count
263

Hackers use P.O. Press, 5 December 1985, Page 28

Hackers use P.O. Press, 5 December 1985, Page 28