Hackers do not require sophisticated hacking tools or a 65-hour work week. According to an online report dated August 01, 2018, a tech savvy valedictorian from Massachusetts used their skills to steal $2M of bitcoins. The exploited vulnerabilities were social media accounts, emails and cell phones. These are standard personal online tools (SPOT) used by internet users. Referring to Lockheed Martin’s Cyber Kill Chain, the third step occurred without triggers, questions or inspections. Joel Ortiz, a 20-year-old, used social engineering, whereby the family members were able to loan him digital funds according to court documents. To impersonate victims, texting was used. Ortiz was a robot software programmer on his high school’s robotics team. In December 2017, Lockheed Martin had been awarded an indefinite (unrestricted) contract for $77.7M and in support of the Naval Air Warfare Center Weapons Division in China Lake, California. How can SPOTs be surveyed under the contract? SPOT is a re-appropriated acronym, for this blog purposes, used to describe tools to conduct transactions on the Internet. Personally Identifiable Information (PII) is different than SPOT and is sanctioned by all government entities. Although many cyber security crimes disclose PIIs, there are Information Technology (IT) security crimes that do not. An example of a crime is the lawsuit filed against Rivers Casino. Two women, Julie Capone and Hayley Clerici, allege invasion of privacy, conspiracy and infliction of emotional distress according to Reed Ward. Furthermore, the complaints cite the violation of Pennsylvania’s wiretapping laws. PA is one of twelve dual consent states in the U.S. according Joseph Mistick, criminal law expert and Law Professor at Duquesne University School of Law. All parties involved in private conversations must agree to be recorded. When contacting organizations for services, you are explicitly giving consent: This call is being recorded for training purposes. In the case of Eric Lord, theft of movable property over $10,000 is a noteworthy IT security crime. Five days after termination from Brinks Security in 2016, Eric Lord, 39-years-old, called a company that retains ATM combinations to a safe. He was given access to safe by personating a co-worker. On August 03, 2018, a criminal complaint was filed in Waukesha County, Wisconsin. Checks and balances are often overlooked in cyber security as vegetables in fruitarian diets. The blog is in plain sight.
Resources:
Associated Press. “Valedictorian allegedly stole $2M in digital currency by hacking cell phones.” 01 August 2018, New York Post, https//nypost.com/2018/08/01/valedictorian-allegedly-stole-2m-in-digital-currency-by-hacking-cell-phones/. Accessed 05 August 2018.
Enking, Leonora (Ellie). Chameleon. 02 November 2000. Flickr. https//www.flickr.com/photos/33037982@N04/3513203707/in/photostream/. Accessed 05 August 2018.
GitHub Inc., https//github.com/vz-risk/VCDB/issues/11932. Accessed 05 August 2018.
GitHub Inc., https//github.com/vz-risk/VCDB/issues/11966. Accessed 09 August 2018.
GitHub Inc., https//github.com/vz-risk/VCDB/issues/11971 Accessed 09 August 2018.
Guza, M. “Lawsuit: Rivers Casino employees snooped on texts, email and bank info.” 08 August 2018, triblive.com, https//triblive.com/local/allegheny/13952701-74/lawsuit-alleges-casino-employees-snooped-on-text-messages-email-bank-info. Accessed 09 August 2018.
Grant, J. “Butler Co. Traffic Stop Case Shining Spotlight on Pa. Wiretapping Laws.” 15, July 2017, https//pittsburgh.cbslocal.com/2017/02/15/butler-co-traffic-stop-case-shining-spotlight-on-pa-wiretapping-laws/. Accessed 09 August 2018.
Ramirez, A. “Former Brinks employee charged with stealing thousands from ATMs.” 08 August 2018, Milwaukee Journal Sentinel, https//www.jsonline.com/story/communities/lake-country/crime/2018/08/08/man-charged-stealing-cash-atms-oconomowoc-and-brookfield/923400002/. Accessed 09 August 2018.
Reed Ward, P. “Two women sues Rivers Casino for alleged misuse of surveillance cameras.” 09 August 2018, Pittsburgh Post Gazette, wwwpost-gazette.com/news/crime-courts/2018/08/08/Rivers-casino-Pittsburgh-lawsuit-Dennis-McCurdy-Scott-Scherer-surveillance-Wiretap/stories/201808080153. Accessed 09 August 2018.
Zacks Equity Research. “Lockheed Martin Secures $77.7-Million Cyber Security Contract.” 13 December 2017, Zacks.com, Nasdaq.com, https//www.nasdaq.com/article/lockheed-martin-secures-777-million-cyber-security-contract-cm891124. Accessed 05 August 2018.