Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Operation Sundevil
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|US Secret Service computer crime investigation}} '''Operation Sundevil''' was a 1990 nationwide [[United States Secret Service]] crackdown on "illegal computer [[Hacker (computer security)|hacking]] activities." It involved raids in approximately fifteen different cities and resulted in three arrests and the confiscation of computers, the contents of [[Bulletin board system|electronic bulletin board systems (BBSes)]], and floppy disks. It was revealed in a press release on May 9, 1990. The arrests and subsequent court cases resulted in the creation of the [[Electronic Frontier Foundation]]. The operation is now seen as largely a public-relations stunt{{Citation needed|date=November 2021}}. Operation Sundevil has also been viewed as one of the preliminary attacks on the [[Legion of Doom (hacking)|Legion of Doom]] and similar hacking groups.<ref>{{cite book|last=Clapes|first=Anthony Lawrence|title=Softwars : the legal battles for control of the global software industry|publisher=Quorum Books|location=Westport, Conn.|year=1993|isbn=0-89930-597-0}}</ref> The raid on [[Steve Jackson Games]], which led to the court case ''[[Steve Jackson Games, Inc. v. United States Secret Service]]'', is often attributed to Operation Sundevil, but the Electronic Frontier Foundation states that it is unrelated and cites this attribution as a media error.<ref>{{cite web|url=http://www.sjgames.com/SS/topten.html|title=The Top Ten Media Errors About the SJ Games Raid|date=1994-10-12|publisher=[[Steve Jackson Games]]|access-date=2009-03-08}}</ref><ref>{{cite web|url=http://articles.techrepublic.com.com/5100-10878_11-6042211.html|title=Geek Trivia: Gaming the (legal) system|last=Garmon|first=Jay|date=2006-02-28|publisher=[[TechRepublic]]|access-date=2009-03-09|archive-url=https://archive.today/20120710235209/http://www.techrepublic.com/article/geek-trivia-gaming-the-legal-system/6042211|archive-date=2012-07-10|url-status=dead}}</ref> The name comes from the [[Sun Devil Stadium]] of [[Arizona State University]], near the local Secret Service headquarters from where the investigation and raids were coordinated.<ref name="Sterling3">{{cite book |last=Sterling |first=Bruce |author-link=Bruce Sterling |title=[[The Hacker Crackdown]]: Law And Disorder On The Electronic Frontier |access-date=2009-03-08 |year=1994 |publisher=Bantam Books |location=New York |isbn=0-553-56370-X |chapter=Part Three: Law and Order |chapter-url=http://www.farcaster.com/sterling/part3.htm |archive-date=2009-03-01 |archive-url=https://web.archive.org/web/20090301003101/http://www.farcaster.com/sterling/part3.htm |url-status=dead }}</ref> ==Background== Prior to 1990, people who manipulated telecommunication systems, known as [[Phreaking|phreakers]], were generally not prosecuted within the United States. The majority of phreakers used software to obtain calling card numbers and built simple tone devices in order to make free telephone calls. A small elite, highly technical segment of phreakers were more interested in information about the inner workings of the telecommunication system than in making free phone calls. Phone companies complained of financial losses from phreaking activities.<ref name="Sterling2" /> The switch from [[Analogue electronics|analog]] to [[Digital data|digital]] equipment began to expose more of the inner workings of telephone companies as hackers began to explore the switches and trunks. Due to a lack of laws and expertise on the part of American law enforcement, few cases against hackers were prosecuted until Operation Sundevil.<ref name="Sterling3" /> However, starting in 1989, the US Secret Service (USSS), which had been given authority from [[United States Congress|Congress]] to deal with access device fraud as an extension of [[Mail and wire fraud|wire fraud]] investigations under [[Title 18 of the United States Code#Part I - Crimes|Title 18 (Β§ 1029)]], began to investigate. Over the course of the 18-month-long investigation, the USSS gathered alleged evidence of rampant credit card and calling card fraud over state lines.<ref name="Newsbytes">{{cite journal|last=McMullen|first=Barbara E.|author2=John F. McMullen|date=May 10, 1990|title=News conference reveals nationwide hacker investigation|journal=Newsbytes}}</ref> Operation Sundevil allowed multiple [[Federal law enforcement in the United States|federal law enforcement agencies]], particularly the Secret Service and the FBI, to gain valuable expertise on fighting this new form of criminal activity as well as expanding the agencies' budgets. New laws were created to allow federal prosecutors to charge individuals accused of phreaking, hacking, wire, and [[credit card fraud]]. Evidence gained from Operation Sundevil allowed law enforcement to convince the United States Congress of the need for additional funding, training, and overall expansion.<ref name="Sterling3" /> ==Action== Along with the [[Chicago]] Task Force and the [[Arizona]] [[Organized crime|Organized Crime]] and [[Racketeering]] Bureau, the operation involved raids in [[Austin, Texas|Austin]], [[Plano, Texas|Plano]], [[Cincinnati]], [[Detroit]], [[Los Angeles]], [[Miami]], [[New York City|New York]], [[Newark, New Jersey|Newark]], [[Phoenix, Arizona|Phoenix]], [[Pittsburgh]], [[Richmond, Virginia|Richmond]], [[Tucson, Arizona|Tucson]], [[San Diego]], [[San Jose, California|San Jose]], [[San Francisco]], and [[Seattle]]. The raids were centered in Arizona, where the press conference occurred.<ref name="Newsbytes" /> Raids generally took place in middle-class suburbs and targeted [[credit card]] thieves and telephone abusers.<ref>{{cite web|url=http://w2.eff.org/legal/cases/SJG/?f=gurps_labor_lost.article.txt|title=Gurps' Labour Lost|last=Sterling|first=Bruce|publisher=[[Electronic Frontier Foundation]]|access-date=2009-03-08|archive-url=https://web.archive.org/web/20170206161302/https://w2.eff.org/legal/cases/SJG/?f=gurps_labor_lost.article.txt|archive-date=2017-02-06|url-status=dead}}</ref> They were carried out by local police, with the aid of over 150 Secret Service agents, FBI and CIA.<ref name="Sterling3" /> Twenty-seven [[Warrant (law)|search warrants]], resulting in three arrests, were issued and executed on May 7 and 8, 1990.<ref name="DataChannels">{{cite journal|date=May 16, 1990|title=Three arrested in nationwide sting against computer hackers|journal=Data Channels|publisher=Phillips Publishing Inc}}</ref> Police also took around 42 computers and approximately 25 BBSes, including some of the most infamous and elite hacking BBSs in the world at that time, such as Cloud Nine. This was the largest crackdown on electronic bulletin boards in world history. Finally, about 23,000 [[floppy disk]]s were also seized. These held a variety of data, including software, phreaking and hacking tools, tens of thousands of credit card details, and a plethora of illegal copyrighted material. The three people arrested were "Tony the Trashman," "Dr. Ripco," and "Electra."<ref name="Sterling3" /> Other parts of the operation targeted the underground [[Online magazine|ezine]] ''[[Phrack]]'', which had published the contents of a proprietary text file copied from [[BellSouth]] computers and containing information about the [[Enhanced 9-1-1|E911]] emergency response system, although this was later made null in a court case in which it was proven that the same information about the E911 system was also provided to the public through a mail-order catalog.<ref name="Sterling2">{{cite book |last=Sterling |first=Bruce |author-link=Bruce Sterling |title=[[The Hacker Crackdown]]: Law And Disorder On The Electronic Frontier |access-date=2009-03-08 |year=1994 |publisher=Bantam Books |location=New York |isbn=0-553-56370-X |chapter=Part Two: The Digital Underground |chapter-url=http://www.farcaster.com/sterling/part2.htm |archive-date=2008-12-25 |archive-url=https://web.archive.org/web/20081225012409/http://www.farcaster.com/sterling/part2.htm |url-status=dead }}</ref> ==Aftermath== In a press release on May 9, 1990, officials from the federal government and the Arizona state government revealed that the Secret Service was involved in the investigation. The Assistant Director of the US Secret Service, Garry M. Jenkins, commented in a press release that, "the Secret Service is sending a clear message to those computer hackers who have decided to violate the laws of this nation in the mistaken belief that they can successfully avoid detection by hiding behind the relative anonymity of their computer terminals."<ref name="Sterling2" /> Two public-access computer systems were shut down in the days following the operation: an AT&T Unix system in [[Dallas, Texas]]<small><sup>[http://sdf.org/?faq?BASICS?02 sdf]</sup></small> and a Jolnet system in [[Lockport, Illinois]]. Neither has been linked to the operation, however. An AT&T spokesman claimed the shutdown was a result of an internal investigation and was not related to the operation.<ref name="DataChannels" /> In response to the arrests, the [[Electronic Frontier Foundation]] was founded by [[Mitch Kapor|Mitchell Kapor]], the founder of [[Lotus Software|Lotus Development Corporation]], and [[John Perry Barlow]], an author.<ref>{{cite web|url=http://w2.eff.org/legal/cases/SJG/|title=Steve Jackson Games v. Secret Service Case Archive|publisher=[[Electronic Frontier Foundation]]|access-date=2009-03-08|archive-url=https://web.archive.org/web/20080411142701/http://w2.eff.org/legal/cases/SJG/|archive-date=2008-04-11|url-status=dead}}</ref> The foundation hired lawyers to represent the hackers in two of the cases arising from Operation Sundevil.<ref>{{cite web|url=https://www.newscientist.com/article/mg12717261.300-crackdown-on-hackers-may-violate-civil-rights-.html|title=Crackdown on hackers 'may violate civil rights' |last=Charles|first=Dan|date=1990-07-21|publisher=[[New Scientist]]|access-date=2009-03-08}}</ref> Operation Sundevil was the most publicized action by the federal government against hackers.<ref name="Sterling3" /> In part due to this, it has been seen as a public-relations stunt and a message to hackers. While it did little overall damage to the hacking community in the long run, it did stop the illicit hacking activities of many of the best hackers in the world for a short period of time, which is why it has been lauded as a tactical success due to the surprise and damage it caused to the communities in comparison to the long wars waged against the [[Legion of Doom (hacking)|Legion of Doom]].<ref name="Sterling3" /> However, it has also been criticized as a failure due to several unsuccessful prosecutions, and a number of raids not even leading to arrest.<ref name="ripco">{{cite web|url=http://w2.eff.org/legal/cases/SJG/?f=ripco_case_closed.article.txt|title="Operation Sundevil" is finally over for Dr. Ripco|last=Esquibel|first=Bruce|date=1994-10-08|publisher=[[Electronic Frontier Foundation]]|access-date=2009-03-08|url-status=dead|archive-url=https://web.archive.org/web/20110810225717/http://w2.eff.org/legal/cases/SJG/?f=ripco_case_closed.article.txt|archive-date=2011-08-10}}</ref> ==See also== * [[Operation Cybersnare]] * [[The Hacker Crackdown]] ==References== {{reflist}} {{Hacking in the 1990s}} [[Category:1990 in the United States]] [[Category:Copyright enforcement]] [[Category:Hacker groups]] [[Category:Electronic Frontier Foundation]] [[Category:Carding (fraud)]] [[Category:Law enforcement operations in the United States|S]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Citation needed
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Hacking in the 1990s
(
edit
)
Template:Reflist
(
edit
)
Template:Short description
(
edit
)