Job Seeking Hacker Gets 30 Months In Prison 271
wiredmikey writes "A hacker who tried to land an IT job at Marriott by hacking into the company's computer systems, and then unwisely extorting the company into hiring him, has been sentenced to 30 months in prison. The hacker started his malicious quest to land a job at Marriott by sending an email to Marriott containing documents taken after hacking into Marriott servers to prove his claim. He then threatened to reveal confidential information he obtained if Marriott did not give him a job in the company's IT department. He was granted a job interview, but little did he know, Marriott worked with the U.S. Secret Service to create a fictitious Marriott employee for use by the Secret Service in an undercover operation to communicate with the hacker. He then was flown in for a face-to-face 'interview' where he admitted more and shared details of how he hacked in. He was then arrested and he pleaded guilty back in November 2011. Marriott claims the incident cost the company between $400,000 and $1 million in salaries, consultant expenses and other costs."
Good (Score:5, Insightful)
Blackmail is blackmail whatever method is used to carry it out. Thinking that you're some sort of "lee7" hacker doesn't change the rules. Besides which, this guy comes off as an arrogant moron anyway.
Re:Good (Score:5, Interesting)
I'm guessing Marriott's monetary claims are mostly "It's his fault we have to pay all this money, we wouldn't have to fix anything if he hadn't used those flaws to break in."
He still hacked and deserves what he got, but Marriott is just trying to shift the blame of their security flaws so investors don't point the blame at them.
Re:Good (Score:5, Insightful)
He still hacked and deserves what he got, but Marriott is just trying to shift the blame of their security flaws so investors don't point the blame at them.
Why do you think this? I couldn't find anything related to it in the article. Do you have some preconceived idea of how companies should act, and then judge them without checking the evidence? That's a serious cognitive bias.
He was able to hack their systems by spear-phishing, sending trojans directly to specific employees. This isn't necessarily a security flaw of the system, but rather lack of training for users (who may not care and may not want to be trained).
Re:Good (Score:5, Insightful)
He was able to hack their systems by spear-phishing, sending trojans directly to specific employees. This isn't necessarily a security flaw of the system, but rather lack of training for users (who may not care and may not want to be trained).
Except that users are part of the system that is being attacked. As Bruce Schneier put it, only amateurs attack machines; professionals target people.
It is true that user training is hard. It is equally true that the system should be resilient to stupid users, just as it should be resilient to malicious users. Spear-phishing and trojans are just a way to get non-malicious users to behave maliciously, and the system should be designed to contain the damage that malicious users can cause. There are a variety of technical measures that can be taken to prevent malicious users from leaking information or otherwise violating the security of the system; a large company should be taking these sorts of measures.
Re: (Score:3)
Re:Good (Score:5, Insightful)
We really do not have to throw our hands in the air and declare spear-phishing to be some kind of ultimate attack that cannot be defended against.
Re: (Score:2)
In this case it doesn't look like the guy got much other than a few documents, at least that's all the article mentions, so I maybe they do have some protections.
Re: (Score:3)
He has a point, and so does the other poster. Marriott cannot absolve themselves of all blame here and trumping up enormous costs is kind of way to shift the expense they should have already been paying to secure their systems. A million dollars is a little over board. I'm not blaming the victim here either, just saying that it is a little bullshit to pile all those costs on to the hacker afterwards.
As far as preventing trojans being sent to employees you could look at it preventing all file transfers ov
Re: (Score:2)
removing all executable attachments on email, all attachments on email that cannot be decompressed,
Companies that do this drive me crazy.
Re:Good (Score:5, Insightful)
Seriously?
Not allowing .exe files in emails drive you crazy? Especially when email was never truly designed for file transport in the first place?
Not allowing compressed file attachments that cannot be scanned drives you crazy?
Well tough cookies buddy. If you need to send files back and forth with a user on my network you can go through different channels, and whatever they are, you can bet that the file will be scanned and the user will not be allowed to install software. If you are trying to protect from being scanned or opened, you are already wrong to do so. The user has no basis or justification to need privacy (from the system) when exchanging information across email. Part of the data diode and behavioral analysis I mentioned.
None of what I said prevents normal file transfers needed in the course of business. Just executable files.
I hardly see how that is unreasonable.
If I wanted to go overboard and be unreasonable I would remove PDF attachments.
Re:Good (Score:5, Interesting)
If you were the IT guy at my company, I would complain to the CTO until I got an exception to your restriction. I don't care about your petty concerns when they get in the way of doing my job. Neither does anyone else.
Good fucking luck. I am the CTO.
Petty? Setting aside your childish attitude, your job does not come first. The company comes first. Without the company... you don't have a job.
You are part of the problem. Instead of trying to understand the "why" of a policy you actively undermine it with a blatant and flagrant attitude mixed with ignorance, shortsightedness, and selfishness.
As the CTO, I need to protect the integrity of the company. That means making sure that there exists policies, software, and infrastructure design to protect corporate assets. Part of corporate assets is data. Customers trust us with their medical records, insurance policies, financial information... I could go on.
Am I to tell a customer that we had 1,000,000 records leaked because you wanted to transfer around executable files and bitched and moaned along with a couple of other people till you got your way? Hardly sounds reasonable. In fact, it makes me look I just was not doing my job.
Funny how that works out huh? Everything I try to do to reasonably find a balance between use of the system and security of the system is seen as some sort of fascism by people like you and you actively bitch and moan to try to undermine it. Yet.... when something goes wrong.... well that's my fault. The particulars are not relevant, such as your behavior and participation, because I was just supposed to magically create a world where you have no restrictions and everything works in perfect safety.
Now instead of acting like a child, why don't you give me an actual reason why you need to send executables and protected, nested, compressed files around in email?
This whole conversation got started with you saying it was impossible to prevent data leakage and penetration, I then offered a reasonable response, at which point you said you would try to undermine it to your fullest extent. How much sense does that make?
Re:Good (Score:5, Insightful)
With your attitude, you're right. You would not be working for my company.
Very simply that is because I am a very fair and reasonable CTO. When users (which includes you) get out of line and have no justifications for their actions that create liability for the company, when I provide efficient and workable alternatives, they get disciplinary action all the way up to being fired.
The reason why is that I am well respected by the people in my company from top to the bottom. I have always worked well with people to find solutions without endangering the company, or creating a hostile work environment between IT and the users.
You would not fit into our company. You cannot even give me:
1) A good reason why you need to send that type of data in email.
2) A cogent description of your needs for me to find a solution.
How can I begin to help when you refuse? You have no respect for my job, my responsibilities, or a willingness to participate in problem solving or conflict resolution.
You are the weakest link. Good bye.
Re: (Score:3)
And it's people like you who spend so much goddamn time worrying about little "issues", that if given the power to do so by the company management, you'd drag the entire business down from accomplishing its actual goals all in the name of preventing these "issues."
And it's people like you who don't want to worry about any issues that even remotely have the perception of slowing you down until it costs the company HUGE. I really don't know who you deal with, but the attempt to protect company data is not a little "issue".
And when you introduce bureaucracy into every goddamn file copy operation, and require justification and paperwork for every stupid special situation that comes up, what kind of parasitic overhead does this introduce to the business as a whole?
That's insane. Where did you get that from my posts?
You describe a situation where I am like those aliens from Hitchhikers Guide to the Galaxy where you have to sign endless forms for every single possible action.
I never even alluded to that. You d
Re:Good (Score:5, Informative)
And yes, my docs are confidential and none of you IT monkeys should be able to read them ...
There is your first problem. Already there is no room for reasonable cooperation without mutual respect and understanding.
IT should be a 'business enabler'
WRONG, WRONG, AND WRONG.
I am not just "IT". I am the CTO.
Enabling you to do your job is only one part of my job, and not even the most important. I must prioritize my responsibilities. In order to keep the company safe and sound I have to reasonably find a balance between the use of a system and the security of a system. That is first and foremost. Figuring out how to make your life easier comes in second.
Do you really think there is a danger? Hackers targeting your company would simply send the latest 0-day, which your anti-virus wouldn't catch anyway.
Yes, Yes I do. Absolutely. Hackers would not just "send the latest 0-day". They will try social engineering, dropping flash drives in the parking lot, probing of Internet facing assets, email phishing attacks, etc.
How can their 0-day get through if all email attachments are locked down to document file types only, and those are inspected and have certain functionality removed?
I don't care about little Hitlers in IT that talk about staff as 'The user has no basis or justification to' ... WTF!
With respect, I get paid to decide the basis and justification for your actions.
Anything the user needs for business you should provide!
Wrong. Anything that the business needs, I need to find a reasonable solution that the user can work with while satisfying the primary needs for the business. Which is that reasonable balance between use and security I spoke of earlier. It's not Burger King, it's not what you want when you want it.
but instead of 'being reasonable' and blocking everything you should provide a solution to enable that user in secure file-sharing with people if there is a business need
I completely agree. Which is why I completely block email, especially on inbound, but have other means of secure document sharing between you and corporate clients. Which is important to note, I don't view the customers as your customers, but the company's customers.
In your case, which is not unusual, email is not the best and most secure method. A secured website that allows you to share very specific data with customers is best. We have vendors and service providers that have very strong data policies as well. They would never ever send a PDF via email. Secured PDFs are downloaded via a web portal with multiple user account credentials that I get to control via another management portal. I can then review all of it as part of my job.
I understand your need. My job is not fill your need the way you want. Why? Simply put, you ain't the CTO buddy. I am the CTO. When something goes wrong, it is my ass on the line, not specifically yours. If it is bad enough, like a huge data breach, your livelihood is affected along with countless others. That's a responsibility I would have to live with.
So that's why I carefully consider your needs. What is it you are trying to do? How can I make that the easiest way possible for you? How do I make it secure and satisfy our data security policies and the vendors? Multiple vendors? How do I make your life easier and more efficient?
At the end of day, believe or not, I exist to make your lives easier so you can be more productive, while also protecting the company to the best of my ability. It's not to be a dick and make your life hell for "funsies".
And yes, my docs are confidential and none of you IT monkeys should be able to read them ...
I'm going to touch on this twice beca
Re: (Score:3)
You can be my boss.
Re: (Score:3)
there's a CEO (with an MBA of course) that loves to override my decisions when the whiny users complain that they "can't get their work done"
I don't get an override exactly, but when the company is unable to put certain policies in place due to financial constrictions or otherwise I just write a letter. Part of the well written contract, and that is best asset that anybody in IT can have. A very well defined relationship with the company is essential.
Some CTO's and IT people get too emotionally involved and treat the network and corporate assets like it is their personal property to be defended at all costs. I see it as a job, I do it to the
Re: (Score:2)
Re: (Score:3)
He still hacked and deserves what he got, but Marriott is just trying to shift the blame of their security flaws so investors don't point the blame at them.
Why do you think this?
That's what I'd do. Why let a perfectly good crisis go to waste?
Really? (Score:3, Insightful)
Do you apply this logic to your own network? Actually let me rephrase that. Do you apply this logic to your own possessions, property and family? Do you believe burglary victims should share part of the blame because they didn't reinforce the glass windows(security flaws) in their homes?
Let's call a horse a horse here. This man was a criminal. He deserved what he got.
Re: (Score:3)
Re: (Score:2, Interesting)
It's "1337" hacker. Just sayin'.
And seriously, ... the incident cost the company between $400,000 and $1 million in salaries, consultant expenses and other costs. ???
That's got to be the craziest application of 'cop math' I've seen in a non-drug related case ever.
Re:Good (Score:4, Funny)
It's "1337" hacker. Just sayin'.
And seriously, ... the incident cost the company between $400,000 and $1 million in salaries, consultant expenses and other costs. ???
That's got to be the craziest application of 'cop math' I've seen in a non-drug related case ever.
I guess you haven't seen the 'math' used in file sharing law suits then.
Re: (Score:2)
The math makes sense, but the way they group it with "other costs" it is deceiving - the keywords are actually salaries and consulting expenses, not other costs. They obviously had to hire and/or contract some computer security professionals to fix their broken security and make sure it doesn't happen again and they're blaming part of the expense as having to hire these professionals. To put this in perspective, it is a lot like saying "we had to hire desk guards because people were just taking the keys to
Re: (Score:3)
Not really, they probably panicked, and hired a couple of outside consultants to check their security.
And since they probably didn't have a real inside expert (or they would not need this) they also needed a senior security manager...
So all in all 3 persons with expensive rare skills hired on short notice.
for let's say 3 month.
180 days * average 1500$/day => 270 K$ + at least one senior manager and one assistant to track what their are doing...
"et voila" => 400 k$
Add cost of building, chairs, computer
Re: (Score:3)
naive or sarcasm... not sure - going with the former
1337 is leetspeak (internet slang that actually predates the internet, but that is quibbling) for leet, which is slang for elite, so it means elite hacker.
Re: (Score:3)
So in this case it's blackemail?
Re:Good (Score:5, Funny)
clearly, this whole thing is obama's fault.
Re: (Score:3, Informative)
Re:Good (Score:5, Insightful)
Re:Good (Score:5, Insightful)
Well, mostly he was seriously stupid, he might have got a job if he would have shown the weaknesses, and offered to help them, making sure that if they didn't want him, he would just forget about it, or if they would be interested make at a latter time an intrusion test.
He should also make sure that he can explain how to pull documents out, but not actually do it.
That way he would not have to go to jail... (or at least very much lower the risk of...)
But nobody sane hires a blackmailer without immediately thinking about how to put the idiot in jail...
Re: (Score:2)
But the blackmail itself is just a negotiation.
No, it's extortion. And that is a crime.
Re: (Score:3)
I don't see why Blackmail should be illegal. In this case he hacked their system so that is a crime. But the blackmail itself is just a negotiation.
Always good to get input from the world of finance.
Geez what a moron (Score:5, Funny)
I mean, if he had access to their network and wanted a job, he should have forged interview and approval emails.
Think outside the box, man.
Re: (Score:2)
Eh just sneak his bank account onto the list of approved ones surely? This is seriously grounds for an internet Darwin though.
Re:Geez what a moron (Score:5, Interesting)
Actually I was thinking something similar. In a large enough company communication becomes a real problem. Departments don't really communicate much. If you were to study your target a while and figure out who everyone's superiors are and the like, all it would take is a well-crafted email from some higher-up that says "hey hire this guy" and the odds are the underling wouldn't go back to their boss and say "are you sure?" - they'd just start the paperwork. Large companies are dysfunctional that way. They kind of have to be. The more people in the company the less practical being well informed is.
Re:Geez what a moron (Score:5, Informative)
He could claim entrapment. There are articles every once in a while about some hacker that breaks into sombody's servers, and they're so impressed they recruit him right off.
You'd have to be an idiot to believe things like that, but it doesn't take a lot of brains to cause damage.
Except no one induced him into breaking the law. The very first contact that he had with Marriot contained proof that he had already committed a crime.
Entrapment only works when the originating idea for the crime came from a police officer, or an agent thereof. (If a cop tells a confidential informant to get a gang to rob a specific store, then that would be entrapment as well.)
Re: (Score:3)
The economy put him into a state of desperation. It's political policies which ultimately provoked him into breaking the law.
Somehow, I doubt you'd use the same argument to justify the people who mugged you.
The question no one is willing to ask is why is it that some of the most skilled or talented computer geniuses are unable to find jobs?
If you're a computer genius you can probably work a till, so why not get a job in a supermarket? Seriously, if there aren't the jobs around for computer geniuses to work at being geniuses on computers, you have to accept the reality of the situation and find something else to do. Life is not designed solely around your specific wishes, talents and desires.
Re: (Score:3)
For what it's worth, entrapment usually involves not only originating the idea, but also use of coercion(force, blackmail etc) to get someone to commit a crime. Otherwise those pointless drug and prostitution busts wouldn't be possible, and the police could save a lot of taxpayer money by not busting people who aren't criminals :P
I'm sorry.. but where is the inducement to commit the crime with drug and prostitution busts? The police are allowed to present opportunity to commit the crime, but they cannot give the idea to the person.
Leaving a $100 bill on the ground is ok, but telling the person about the $100 and telling them to take it is inducement. While one could say that "usually" entrapment involves coercion, it's simply the easiest way to prove entrapment, not necessarily the most common.
The difference with drug and prostituti
Re: (Score:2)
He's not American, and may not have even been to the US before he was "tricked" into flying over. He has no rights in the US.
Of course he doesn't. Why should he be any different from the rest of us?
Cost them $1Million (Score:5, Insightful)
Re: (Score:2)
Re:How much does 30 months in jail cost us? (Score:4, Insightful)
Ultimately it might have been cheaper just to give the guy a job.
Except that it's insane to employ a blackmailer as you can never ever trust them. Same with a fraudster. You've got to hire someone else to fix the problems, and in general the cost of punishment is regarded as permissible as part of the cost of a reasonable degree of social stability.
$400K-$1M seems low (Score:2)
How someone can be that smart in hacking.. (Score:5, Insightful)
"I found a security hole in your systems and may help you to improve this, and your systems globally".
Re:How someone can be that smart in hacking.. (Score:5, Insightful)
You haven't met many computer nerds, have you?
Re: (Score:2)
That's why man requires punitive measures to keep order.
Most folks "get it". For those who refuse to get it, a knouting is in order.
Re:How someone can be that smart in hacking.. (Score:5, Insightful)
..and that stupid otherwise? The right move was to arrange an IT job interview with Marriott, and claim good security skills. "I found a security hole in your systems and may help you to improve this, and your systems globally".
No, no, no, no, NO.
You absolutely do *not* do that. Some (reasonable) companies *will* be grateful that you informed them of a problem with their security. Others will get the wrong end of the stick- even if you found the hoed through innocent means- assume that you hacked or were trying to hack into their system, and act accordingly.
Others still won't care, but will be angry that their shortcomings have been exposed (either the organisation as a whole, or vested interests that hold sway within that organisation, e.g. the crappy IT guy who's just been made to look bad) and that they have to correct them. Under such circumstances you are in danger of them maliciously trying to punish you or get revenge in some manner.
You do *not* risk the second or third happening, regardless of whether informing the company would benefit them. Ideally you'd be able to, but this isn't an ideal world, and you do not put yourself at risk for a benefit that they might not perceive as such. At best, if you need to report this kind of thing, you do it anonymously and/or in a manner that makes it untraceable or at least such that you won't be at risk of retribution.
This is the problem with geeks not understanding that the world does not operate in the logical manner they'd like to think, of assuming that people will behave logically and of not factoring in personal politics, self-interest and inadvertantly standing on someone else's toes.
Re: (Score:2)
It seems like a reasonable risk to me. He may have gotten a job like that - and if not, then he'd be no worse off. I mean, what's Mariott going to do in revenge? Not fluff his pillows when h
Re: (Score:2)
I mean, what's Mariott going to do in revenge? Not fluff his pillows when he stays there?
Er, they (*) are going to make the case that part or all of his activities constituted hacking of or intrusion into their system, leading to his possible arrest.
Unless it's *very* clear that the guy has done nothing wrong- and believe me, this is an area where the lines can be blurred, and even if they aren't can be made to appear that way- he's going to have to defend himself against these accusations with both the police and a court system that probably won't be as tech-savvy as they should be and coul
Re: (Score:2)
corporate security loves a good witchhunt, and they will likely go after you for jail time and far more money than you have.
BR> if you find an exploitable hole in a system used by a big company, the best thing you can do is make an infographic detailing how to exploit said hole and what do do afterwards, wardrive a few towns over until you find an open AP, and post it all over 4chan and other places like that.
the corporations have demonstrated an inability to be reasonable, time and time again, n
Re: (Score:2)
Re: (Score:2)
I don't think they have any moral or legal basis for being upset with that.
Technically you are right. This is why they have better lawyers than you. To ensure you don't "get away on a technicality", like for example being innocent. Basically, when you are risking a jail term based on a misunderstanding it's just not worth it.
Re:How someone can be that smart in hacking.. (Score:5, Insightful)
No moral or legal basis for being upset, huh?
"Hi, I noticed you'd left your front door unbolted, and your big-screen television is clearly visible from the street. Also, just to check, I climbed over your back fence and tried the back door, which you left unlocked. When I got inside and heard your dog barking I was a little worried, but it turns out he's really friendly. I've taken the liberty of writing up a list of suggestions for you to make your house more secure; it's taped on the front of your fridge. Incidentally, I just happen to sell alarm systems, if you're interested..."
Re: (Score:3)
What makes you think he was smart in hacking?
Re: (Score:3, Interesting)
He is just not that smart, period. Say you run a company, some schmuck breaks through some web-app and steal some documents and then blackmails you with these documents to get a job? So what does he expect exactly, an actual job from you?
Let me put it this way - I wouldn't call cops on him, I would invite him for an 'interview' and clean his clock.
Re: (Score:2)
sorry didn't see the "L" , i totally got the wrong impression about the type of interview you conduct, my apologies
Re: (Score:3, Insightful)
Re: (Score:2)
He sent a trojan directly to certain individuals in the company, and got them to open it. Once it's been opened, then you have access to a lot of things.
Re: (Score:2)
Except he didn't really find a hole in their systems. He found he could email some employees malware, trick them into opening it, and now he has a backdoor into the system. Now they could stand to strengthen up their IT policies/employee training a bit, but this isn't like he found a backdoor in their web server, and it's possible the docs he accessed weren't even particularly confidential.
Probably the reason he couldn't arrange an IT job interview with Marriott, and claim good security skills is he didn't
This story needs more press. (Score:5, Insightful)
The general public thinks of "hackers" as super geniuses. This gives actual smart people a bad reputation. We need more stories like this to show that the average computer cracker is at least as stupid as the average Joe.
Honestly, any janitor could tell you instantly why this plan is idiotic.
Re: (Score:3)
I am an eJanitor, you insensitive clod!
Re: (Score:3)
Yes, it needs more press, but not for that reason.
The word "hacker" is already synonymous with "Skeevy computer criminal" in the mind of the general public â" despite the fact that's not what the hacker community means to those who actually make up the hacker community.
Call criminals who use computers criminals. Don't call them hackers. It makes hackers look bad.
Re: (Score:3)
No, the greater damage is to so-disant 'smart people's self image. He's pretty typical of most smart people I've known... intelligence and common sense are in no way connected.
Re: (Score:3)
Let me show you my back door (Score:5, Interesting)
After I replied, he told me a story about a programmer interviewing for a position at Darden who had very good qualifications. He was asked the same question and immediately said, "Let me show you my back door", and proceeded to log into a company web site and pull up their web site administration page. The programmer actually seemed shocked when told that there is no way Darden could hire him.
There is a fine line between genius and insanity but stupid is all by itself.
Re: (Score:3)
I'm currently working a contract with Darden Restaurants, the largest full service retaurant company in the world, and as you can imagine they are very serious about security.
Right, that because the restaurant industry is the first one that comes to mind when I think of "serious about security".
Re:Let me show you my back door (Score:5, Insightful)
Olive Garden's Seafood Portofino with Minestrone Soup is without question the best recipe of it's type I have ever tasted, and don't get me started on the bread sticks.
Damn, now I'm hungry.
Re: (Score:3)
But there are issues with supply chain and ingredients that are why franchise
Re: (Score:3)
You really should stop watching Ratatouille and Mission Impossible back-to-back while under the influence - because you've gotten them confuse
Re: (Score:2)
I guess I could never work at Darden either. I would have to lie to get a job, or if I told the truth they already
Re: (Score:2)
Now I wouldn't have shown him the security breaches but if you simply said that you know for a fact that many companies that you have worked for neve
Re: (Score:2)
I worked at the corporate office of a large, nationwide restaurant company. Saying you are the best tech guy at a restaurant company is like being the tallest guy in the Munchin Baskeball Association.
Wrong Way... Do Not Enter (Score:2)
This guy got it all wrong. There is no such thing as capture the flag hacks leading to jobs. Who gave him the idea that this would work out in his favor? Tech smarts was there, but no sign of the minimal business smarts it takes to hold a job was there.
i'm trying to grasp the level of stupidity here (Score:5, Funny)
"hi, i'm arnold, i stole your tv. would you like to hire me to put a lock on the bathroom window i broke into?"
i'm trying to put myself in the thinking here, and no... i just can't understand. i've reached my stupidity simulation threshold. i simply cannot understand a person this dumb
this guy should have hired a lawyer first... (Score:3)
Hi, I'm Steve B., You may know me from youtube videos of my rousing speaches at Microsoft developer conferences.
I didn't invent your android phone or any of the software on it, but I have found a flaw in the system that I can exploit. Its a flaw in the legal system but that's not important.
If you don't want me to activate this exploit, you need to pay me $30.00 for every phone you sell.
It's a good thing he didn't pirate music (Score:2, Interesting)
30 months? It is a good thing he didn't pirate some MP3s. Then they would really be mad at him.
So, did he release the blackmail stuff yet? (Score:2)
Re: (Score:2)
Eh? How would he release the info? Unless the Secret Service is as dumb as he is, he was probably whisked off to the "interview" as soon as he got off the plane, and then arrested. He hasn't been unsupervised since he set foot in the US.
Title vs summary (Score:2)
The title and summary seem to convey different things. "Job Seeking Hacker Gets 30 Months In Prison" sounds like a hacker was trying to get a hacking job somewhere, while the summary makes it clear that he hacked his way into getting said job. Just saying.
Nonetheless, blackmail is blackmail. Malicious hacking involving the exposure of private data to unwarranted eyes ought to be punished.
Do you see what happens? (Score:3)
Do you see what happens when you fuck a stranger in the ass?
Sometimes stupid is painful. (Score:2)
And this is one of those times.
I'm not a hacker but... (Score:3, Insightful)
Darwin awards for lame haxors? (Score:3)
He deserves it.
Re:Secret Service? (Score:5, Informative)
Since Cybercrime/computer fraud falls under their jurisdiction. Since about 1983 or '84, I think.
Re: (Score:2)
Since Cybercrime/computer fraud falls under their jurisdiction. Since about 1983 or '84, I think.
Wow, the movie Hackers actually got something right!
Re:Secret Service? (Score:5, Informative)
I guess referring to them as the SS would not be too far from the truth...
Re: (Score:3)
http://www.gutenberg.org/files/101/101-h/101-h.htm [gutenberg.org]
There is some other information scattered around:
http://www.textfiles.com/news/2600dcr2.txt [textfiles.com]
http://www.totse2.com/totse/en/zines/cud_a/cud664.html [totse2.com]
It is not terribly hard to find this information, if you are curious. As bad as things may have gotten in the US, we have not quite stooped to the level of China when it comes to covering up aggressive gov
Re: (Score:2)
Re: (Score:2)
https://en.wikipedia.org/wiki/Operation_Sundevil [wikipedia.org]
Re: (Score:2)
The secret service has been involved in investigating computer crime for decades now. They are well-known for their attacks on free speech, their violations of civil rights, and their propensity for exaggerating the economic cost of hacking.
Re:$1 mil? Seriously? (Score:5, Insightful)
Why do you think the damages are made up?
Once the notice comes to IT that they've had a break-in you've got an awful lot of work to do. Much more than just applying a security patch. You've got to figure out what happened and which systems were affected. Which means that even if you have a situation like this where the attacker tells you how they got in, you don't know if they are lying. So you have to do a security survey of every single system on your network to make sure there are no back doors, root kits, or altered data. Just reviewing could readily cost you hundreds to thousands of dollars per system. You may be facing multiple nuke-n-pave situations on your servers (may cost you $5,000 - $10,000/system.) Which means you will be losing data or will have to recreate data. If you have a centralized reservation system they may have to take that down in which case you are idling thousands of workers worldwide as well as losing business during the downtime. That's probably measured in thousands of dollars per minute in costs and losses. You've got to bring in your legal team and executive management so they can determine if non-IT related actions that need to be taken (offer your customers identity theft protection?) Who knows how much that is, but it could easily be north of $100,000. Probably you'll be bringing in security experts to review your policies, practices and implementation. A team of four at $250/hr/consultant and you are burning $40,000/week just in consultant fees. Those consultants will be working with your IT staff who will not be doing their normal work, so that's another $5,000 - $10,000/week.
$400,000 - $1,000,000 is an easy number for an IT organization to reach in a large company. A business the size of Marriott may well have a central IT staff numbering between 750 - 1000 people. If they have a particularly efficient team and are on the low end of staffing (750) and have good control of salary ($60,000/yr), they have annual staff costs over $56,000,000. Diverting 10% of those means $108,000/week.
Re: (Score:2)
Except the hacker didn't create the holes in the network, so any costs devoted to finding and fixing them shouldn't be included, only the costs of detecting and fixing the damage itself should be included.
Re: (Score:3)
Except the hacker didn't create the holes in the network,
How do you know that?
More specially, how do you that once he had access the hacker didn't introduce new vulnerabilities into the system?
Re: (Score:2)
I am almost certain that they counted the "applying a security patch" and "closing the hole" he had found. Tell me if you really think they carefully excluded that component?
And that is definitely dishonest, since whatever hole he found was a pre-existing condition. What's the car analogy...
Re: (Score:3)
I certainly never said they didn't include applying security patches and closing holes. I said that it's more than that. As soon as someone is wandering around your network you don't know what systems have been compromised. He emailed an executable to an employee. The employee ran the executable. The program installs itself on the employee's machine and provides a mechanism for the intruder to stage additional attacks on your network. Maybe he installed a key logger which gives him the employee's credential
Re: (Score:2)
Once the notice comes to IT that they've had a break-in you've got an awful lot of work to do.
Of course. Reactive security audits are much more expensive than proactive security audits. Life sucks when you are inept. What he did was inexcusable, but to put all the blame on a script kiddie is just unprofessional. If a criminal organization had broken in it could be way more expensive.
Concentrate on fixing the problem, not the blame.
Re:$1 mil? Seriously? (Score:4, Interesting)
A team of four at $250/hr/consultant and you are burning $40,000/week just in consultant fees.
Actually, you came in way low on that. I've been one of those consultants, and you end up doing WAY more than a 40 hour week when cleaning up a major incident. The first engagement I did, we billed 100 hours each in the first 5 days, and indeed we were billed at $250/hr...for a grand total of an even $100,000 for just the first week. That was a decade ago; costs are higher now. This also didn't include travel or expenses, or any opportunity costs of delayed projects (there were many). We ended up having to go over the entire environment with a fine-toothed comb, discerning what may or may not have been owned. Anything in doubt got nuked and totally rebuilt (not recovered from backup) just like you said. Fortunately, they had good backups of their databases, so recovery of that data went just fine...but databases are the one thing that is least likely to be properly recovered from backup media, owing to the MUCH greater complexity of doing those backups right. I don't even know where to begin on determining the cost, if it turns out you lose a database instance as a result.
Re:$1 mil? Seriously? (Score:4, Insightful)
I'm so tired of seeing these ridiculous and obviously made-up damages
Did you even bother to read the summary, let alone the article? They had a lot of work to do in interacting with the feds in advance of busting this guy in person (he was cracking/extorting from Hungary). This involved many employees, corporate lawyers, etc. You tie up those sorts of man-hours, including the time to gather and preserve an unknown until you're done pile of forensic information from a huge IT footprint at a company that size ... I'm surprised the cost wasn't higher.
What I'm tired of are people who are so vitriolically anti-business in their mindset that they won't even do the mental work of thinking something like this through, lest it take some of the fund out of Complaining About The Man.
Re: (Score:2)
That's the very first thing I thought, too!
Re: (Score:2)
No, no, no, you should have hacked in to change things so that your post would have been backdated to be first. Then we'd have hired you to get you to show us how you did it. Newbie!