Saturday, November 6, 2010

DUBLIN WOMAN PLEADS GUILTY TO HACKING EMAIL ACCOUNTS AND DELETING DOCUMENTS IN DOMESTIC RELATIONS DISPUTE

http://www.gohacking.com

Jamie Staley,26 years old, pleaded guilty in United State district for changing the Email passwords without authorization also accessing those account and deleting Emails from them. 
according to the information available, Staley was involved in the case of child support and visitation argue with her child's father and grandparents in 2008 and then in July 2008 Staley decided to hack child's grandmother and deleted emails between grandma and her attorney regarding to th custody and dispute but the email provider notified the grandma of the password change and when she reset the password, she found out some of the emails had been removed. 
at that time FBI started to investigate and determined Staley also accessed to emails, Facebook and Myspace and accounts of 16 people including her child's elementary school teacher.
Staley pleaded guilty for in felony that is punishable by law up to five years. 
My comment
when I read this case I said thanks God that I am not in the place to judge because what she did it was for love to her son but the law is applicable to anyone and when you do something wrong is wrong and a person shall be guilty of an offence if:
1.the person causes a computer to perform any function with intent to secure access to any program or data held in any computer
 2.the access is unauthorized
3.the person knows at the time when she causes the computer to perform the function that is the case. 


source:
"Woman Pleads Guilty To E-mail Hacking, Deleting Case Documents | NBC 4i." Home | NBC 4i. Web. 06 Nov. 2010. .





Tuesday, November 2, 2010

WOMAN PLEADS GUILTY TO HACKING INTO PRIVATE BOXES ON PERSONAL AD COMPANY COMPUTERS AND THREATENING A CUSTOMER

http://spybusters.blogspot.com

The case that I am going to share today is about the woman, Barbara Denenburg, who pleaded guilty for hacking the ad company and  making death threat against Massachusetts woman who she met through company's personal ad service.
the way that the company works is ,the personal ad goes to the newspaper but instead the reader calls directly, in respond, a reader calls a phone number at the company and leaves a message for the person who put th ad on the newspaper.
Using a computer and from he skill Barbara accessed voice-mail boxes of around 200 people who put the ads on the newspaper and changed the password of 40 of these voice-mails and also greeting 25 of them. following her actions, she harassed number of women through personal ad company among them she began harassing a woman by series of Emails, one of which stated that the victim would be executed by lethal injection. in addition to the emails she sent a package including cardboard tombstone which had been written "RIP" , victim's name, date of birth and "Hated by ... all women everywhere" on it. 
the defendant faced a sentences ,under binding plea agreement,  a time served, 23 months already served, following by three years supervised release and $67000 in restitution. 


My comment
this is kind of crime that at the first place is cyber-crime under property and then cyber-crime against a person with the use of computer such as Emails.
this case involves both Hacking and at the same time Cyber Stalking where the victim got the repeated-threatening Emails and it is punishable by law.
For those that are confuse with biding plea arrangement mentioned in the last paragraph of the caes, it is kind of arrangement in which a prosecutor and defendant arrange to settle the disagreement against defendant. 

Source:"The United States Department of Justice - United States Attorney's Office - District of Massachusetts." Welcome to the United States Department of Justice. Web. 02 Nov. 2010. .

EXTRADITED HACKER SENTENCED TO 10 YEARS IN FEDERAL PRISON FOR MASTERMINDING FIRST-EVER HACK INTO INTERNET PHONE NETWORKS

http://www.voip-weblog.com
This case is about the very first individual hacker that hacked VOIP service and reselling it for profit.Edwin Andrea Pena 27, penetrated the networks of internet phone providers and transmitted over 10 million minutes of unauthorized telephone calls over the victims's network and selling discounted service to his unsuspecting customers. he was able to offer at such low price because he hacked into the computer networks of suspecting VOIP providers, to route his customers'calls. 

Pena fled the United state in 2006 but the chase ended in 2009 when he got arrested in Mexico.Pena Pleaded guilty for computer hacking and wire fraud. United States Attorney Fishman stated: Theft is theft whether he robs a bank or a network and their services. Hackers should assume if they operate from shadow or other countries the law can not keep up with them.
      
Pena caused a loss of more than $1.4 million around one year for networked based company, moreover Pena admitted the help of others, including, Robert Moore who helped Pena for finding vulnerable network ports. 
Pena with the money that he got from this illegal business purchased real state, new cars, also a 40-foot motor boat under the name of someone else, except one car that the court executed a warrant for Pena's 2004 BMW M3. 
Pena was sentenced three years in the prison and in addition to prison time he also had to pay restitution in the amount of $1,012,311. 


My comment:
There are some points regarding to this case, Firs: as United States Attorney Fishman stated a person can steal and many other criminal activities through cyber-space without having physical existence at the place that he wants to commit a crime and the crime is more complicated to what it used to be, But the law is applicable in cyber space the same as real world. 
Second point  is when Pena fled to Mexico and he got arrested in there and then he was return to US for justice, this is because there is an agreement between tow countries regarding to the this case and similar ones that each side needs to send the person for justice to the country that he had caused damages. 


Source: "Federal Bureau of Investigation - The Newark Division: Department of Justice Press Release."Federal Bureau of Investigation - Newark - Homepage. Web. 02 Nov. 2010. .



Monday, November 1, 2010

Comcast Hackers Sentenced to Prison

http://www.wired.com
Four mans that were associated with the hacker group Kryogeniks ,by the names Lewis, Nebel, Jr.a.k.a and co-defendant, were sentenced to 18 months in prisons. 
the way they commit a crime was ,they used their skills in order to redirect all traffic directed to www.comcast.com to website that they'd designed. Therefore, the customers that intended to read their emails and listen to their Emails redirected to the website that they found this message  “KRYOGENIKS Defiant and EBB RoXed COMCAST sHouTz to VIRUS Warlock elul21 coll1er seven.”


The costumers that connected to the website were around 5000 per day and the damages caused by this group of hackers  cost Comcast around $89,578.13 .
The four persons in addition to prison time they punished to pay restitution in the amount that they caused damage.  


My comment
when we talk about Cyber-crime simply we can put them into three categories:
Cyber-crimes against: 1. Person  2. Government  3.property
in this case you can see, it is kind of crime against property which incurred damages to Comcast.
moreover, this is good example of unauthorized modification under property damages that is punishable offence.


Source:Poulsen, By Kevin. "Comcast.net Hijacker Gets 4 Months | Threat Level | Wired.com." Wired News. Web. 02 Nov. 2010. .  


Hacking and cracking are  the most well known among these type of activities. 



A fired Information Technology Director was sentenced to 27 months for hacking employer's website

http://enterpriseblog.net/


In 29th October 2010, Assistant Attorney General Lanny announced "Albert-El pleaded guilty to one count of intentionally damaging a protected  computer belonging to Transmarx LLC without authorization. 
According to the information available Albert-El got fire by Trnsmarx when he was information technology assistance. During his employment he had access to administrative-level information and also computer network, which contain the company website hosted on a computer network in Suwanee. 
He accepted that on 25 July, 2008 used a personal computer an administrator account and password in order to access the computer hosting the Transmarx website.  After he got access, he started the transmission of a series of commands that intentionally made damages,  without authorization to the computer by deleting around 1000 files. Furthermore, he admitted he made the dames because he was angry about got the sack. Albert action caused around $6000 losses to Transmarx.1


My comment


when you read this post the very first thing you would realize is that who and for what purposes the person commit a cyber-crime. there are many different people for different purpose commie a cyber-crime. include: student ,member of organized crime syndicates, terrorist and what apply to this case disenchanted and mad employee and they do commit a crime many different purposes, include: for the purpose of a gain, pleasures or retaliation which for this case the latter one can be applied.
there are two elements that they need to be consider for any case of crime .
1. Intention
2. Knowledge
for this case ,it is obvious that the intention act is to cause damages and loss to the company that he used to work for and also the guy had enough knowledge of computer technology for doing illegal activity.  




1.Source:"Virginia Information Technology Director Sentenced to 27 Months in Prison for Hacking Former Employer’s Website." World News and Headlines at Net News Publisher. Web. 01 Nov. 2010. .

Wednesday, October 13, 2010

French Cops Nail Man Who Hacked Obama Twitter

source: http://thesecuritytimes.com
An unemployed 25-year hacker hacked President Obama twitters account, this guy got caught in his native country , French. he explained how he did this. apparently, the guy did this on purpose and as a result of bet.this guy lives with his parents  and goes by  “Hacker Croll” the nom-de-Web of the person who got his hands on Twitter employee data last year ,however,  no other information are revealed about this guy.
th source also says the punishment about the case of Crolle's latest move that it goes under the agreement between French and FBI police, could result the guy to be in jail for two years.


source:
McCahill,, By Will. "French Cops Nail Man Who Hacked Obama Twitter—on a Bet." Newser | Headline News Summaries, World News, Breaking News, and Local News. Web. 13 Oct. 2010. .

Wednesday, October 6, 2010

Hackers deface 5th government Web site, mock automated polls JERRIE ABELLA, GMANews.TV

                                               source: www.you.tube.com


This is the case that  happened recently in Philippine and it's about the government agancy ,Technical Education and Skills Authority, was hacked by hackers before this case, hackers also hacked the Department of health, Department of social welfare and development, National disaster coordinating council, and Department of Labor and Employment. 
Malaccan warned over the series of hacking attacks on government websites, also expresses new concern regarding to security of coming election in May. 
Deputy presidential spokesman said "this is great concert for the authorities in Philippine because it's happening all over the country and it is a matter of information policy within goverment."
Moreover, base on the information, hackers leave the messages referring to a young new cadre who was killed last December and also hackers made the site automatically jump into another page,    a job announcement supposedly from Ventured that inviting technicians across the country to be part of it team. Following the attack Oliver urged the commission on Elections and other agencies to take action for securing their websites.  
My Comment
base on this case you can see how cyber crime can be dangerous not only to the individual but also the whole country. This case and similar cases comes under public law issue and it is known as Cyber crimes against government that has serious consequences if necessary actions are not taken.


source:
"Security of Govt Websites Highlighted in Hacking Incidents." GAZOTUBE.com. Web. 07 Oct. 2010. .