text stringlengths 0 1.99k |
|---|
Many of the calls allegedly were made from New Orleans where the Hurricanes |
played in the Sugar Bowl New Year's Day. "We had a telephone conversation and |
visited with MCI officials and another meeting has been set for Friday to go |
over people who still have a balance," Jankovich said. "MCI has informed me |
they will not press charges against the student athletes involved. We have 12 |
players who still owe money. We will sit down with those 12 and develop a |
payment schedule on Friday." |
David Berst, director of enforcement for the NCAA in Mission, Kansas, said he |
was unsure if the NCAA would investigate the matter. |
Just goes to show, if you get caught, claim to be a dumb jock... |
Information from +++The Mentor+++ |
______________________________________________________________________________ |
MCI Gets Scammed October 10, 1986 |
---------------- |
ORLANDO, Fla. (UPI)--Jessica Barnett's phone bill this month was no quick |
read--it ran 400 pages long and totaled $90,152.40. |
"Who could pay a $90,000 phone bill? I'll have to mortgage my house to pay my |
bill," said the 28-year-old housewife, who contacted MCI Telecommunications |
Corp. in Atlanta shortly after opening the 2-inch thick bill. |
"I called them and said, 'Hi, I've got this high bill.' They asked how much, |
and when I told them they laughed. They said, 'You've got to be kidding.'" |
MCI spokeswoman Laurie Tolleson said computer hackers apparently discovered |
the Barnett's personal code and used it to make long-distance calls. |
Most of the calls were made to Tennessee, and some lasted nearly two hours, |
Tolleson said. Others were placed to Georgia, Alabama and Maryland. |
"It's like they call continuously 24 hours a day, all day," Barnett said. "I |
don't see the point in making these calls. If I was going to do something |
like that, I'd be exotic and call Europe--not Tennessee or Norcross, Ga." |
It was not Barnett's first problem with the phone company--she received a |
$17,000 bill in July. She thought things were straightened out when she did |
not get a bill last month, but the bill that arrived Monday included $70,000 |
in past-due charges. She said she and her husband, Jim, are not taking the |
mix-up too seriously. "He kidded that now he knows what I do all day," |
Barnett said. |
"What can you do? It doesn't bother me as long as I don't have to pay it. I |
feel bad for MCI. I think they're getting ripped off." |
Typed by Sally Ride:::Space Cadet |
______________________________________________________________________________ |
MCI Introduces VAX Mailgate |
--------------------------- |
VAX Mailgate is a software product that combines the strengths of Digital |
Equipment Corp.'s "All-In-1" Integrated Office And Automation System with MCI |
Mail's public electronic mail service for around-the-world business |
communication. |
Information From USA Today-Special MCI Edition |
______________________________________________________________________________ |
MCI Card Fraud Detection Unit - The Online Security System 11/7/86 |
----------------------------- |
The following is a brief description of the new on-line security system for |
the MCI Card. The system developed in order to provide real-time detection of |
excessive (and therefore potentially fraudulent) card usage. Rather then |
depending on FREWS reports for their current Early Warning System, they are |
now able to investigate and arrest card abuse as it occurs, rather than |
waiting until damage has been done. |
A. Detection |
In order to detect possible fraud as it occurs, a counting mechanism in |
the Fraud Detection Unit will be tracking call attempts for every MCI Card |
authorization code on a continuous basis. Generic parameters based on |
number of call attempts in a specified period (currently 15 calls in a 25 |
minute period) are used to identify potential card abuse. As soon as the |
threshold is reached for any one code, Security and Investigation will be |
notified, via PC screen, hardcopy, and audible alarm. |
B. Verification |
Upon notification of a potential problem, Security and Investigations will |
first pull up the account record to check the Note Screen for anything |
that may indicate Card abuse (i.e., non-payment, Card lost, stolen, or |
never received). They will then try to contact the customer to verify |
whether the Card is being used legitimately or not. For problems detected |
after business hours, the customer will be contacted the following |
morning. |
C. Deactivation |
If the customer has not been making the calls, or if the account phone |
number is found to be illegitimate, the code will be deactivated |
immediately in the Card Authorization Center. If the customer cannot be |
reached, Security and Investigations will continue to monitor call volumes |
on the code and will deactivate the code only if the high volumes continue |
or reappear. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.