views:

1429

answers:

19

Are there any real stories about computer crime? I'm talking about stuff like in "Office Space", stealing fractions of pennies a couple of million times... Like that, only actual events. And not Captain Crunch, please, making phone calls for free does not count. No, actual robberies or super smart frauds that depended on computer technology to some extent. Links or books for further reading please.

+41  A: 

The Cuckoo's Egg is a classic one.

Greg Hewgill
Totally agreed! I would have posted that one if you hadn't done it.
BoltBait
Great! Exactly the kind of stuff I was looking for!
c0m4
Came here to post this, great book.
Factor Mystic
If you can see Cliff Stoll, the author, on television sometime you must! He's... fun to watch. :)
Doug L.
I was wondering where I'd heard of Clifford Stall (for a while I thought I had him confused with Clifford Pickover), but I remember: he makes Klein bottles! You should watch this highly entertaining TED talk by Cliff Stoll: http://www.ted.com/index.php/talks/clifford_stoll_on_everything.html
ShreevatsaR
+17  A: 

It depends on your definition of "crime". The Sony Rootkit was certainly borderline, and definitely unethical - but I don't think it was ever prosecuted as a "crime".

-R

Huntrods
Yes that was evil.
c0m4
+11  A: 

I had a co-worker once who was fired for running a prostitution ring out of his office. He kept track of everything in an Excel spreadsheet, but I'm not sure that qualifies it as "computer crime".

MusiGenesis
And what was your role in the "organization"?
erickson
i think his official title was "playtester" :-P
Steven A. Lowe
Let's just say that the dot-com bust forced a lot of people to diversify their economic endeavors, and that I've had worse jobs. :)
MusiGenesis
+27  A: 

Microsoft Access.

Nat
Anyone who has ever had to use it for anything remotely elaborate, feels your pain.
Chris Ballance
nice one! it so true :)
call me Steve
@Chris: why the past tense? Some of us are still stuck in that particular circle of Hell.
MusiGenesis
Lol, Access at +9 and vista at -2, is access really that criminal.
Gamecat
Nat
So powerful! So easy to get stuff started! . . . not so easy to finish stuff, and SO fracking unsuitable for any real world problem. MS Access bit me in the Ass for the last godsdamn time about 3 years ago. Never again folks, never again . . .
Binary Worrier
+14  A: 

One of my favorites was a hack by Kevin Poulsen in which he gained access to the telephone system of a LA radio station and seized all the phone lines to guarantee winning contests by being the 102nd caller. He won a number of items using this hack, including a new Porsche.

Robert Gamble
+6  A: 

Mitnick, was a good one who turned white-hat and now does security consulting.

However, he was more of a social engineer than a "computer criminal" per se.

Chris Ballance
nonetheless, his books are good reads
Jimmy
Yes, I enjoyed his books also.
Chris Ballance
+4  A: 

Votes counted by Diebold machines for the Republican nomination in New Hampshire in 1988. http://www.rense.com/general80/mdro.htm

I am not sure what real is. Was a crime actually committed? I don't know.

Mark Stock
+2  A: 

Here in Greece we had the Athens Affair during and after Olympics 2004 (wikipedia link).

Athens affair involved the illegal tapping of more than 100 mobile phones on the Vodafone Greece network belonging mostly to members of the Greek government and top-ranking civil servants.

Panos
A: 

The extortion from virus protection publishers like Norton and McAfee that Microsoft perpetuates.

dacracot
[citation needed]
Sherm Pendley
still waiting for my first virus, havent had any installed in the past 16 years
Shawn Simon
Yeah, I have a Mac too.
dacracot
My comment isn't meant to question the existence of viruses. I'm questioning the claim that it's an extortion racket - i.e. that the virus protection publishers are the source of the viruses. A pity there's no "tinfoil hat nonsense" tag for answers... :-)
Sherm Pendley
I don't think they are the source of viruses. I do think virus infection could easily be eliminated as a problem, but will not be because it supports an entire industry.
dacracot
Oh, well in that case, that's a totally reasonable comment then... :(
SpoonMeiser
Oh Pluheezeee . . .
Binary Worrier
Black helicopters in the sky...
Mike C.
+1  A: 

If there are any that were really good, nobody here will have heard of them :)

There was something really cool I read about a person who was going around DOSing casino websites with his giant botnet. He'd take out their site for a few hours (costing them a few hundred K or so in profits) then he'd send them a letter telling them what he'd done and that he wouldn't take them out for an entire weekend if they paid him a few million (Generalizations are because my memory sucks).

The story was by some guy hired to fight them. He had the weekend from hell--it read almost like a spy novel. He went to vegas where they had some really huge pipes, got the site forwarded through them, added extra routers, there were a bunch of tricks I really didn't get--routing requests through other third parties and filtering there, stuff like that. The attacker tried a lot of different tactics too, most were eventually countered.

The casino did go down enough that they would have saved money if they had just paid the ransom as most others did, but I think they said they considered it a success overall.

Sorry I don't have a link. If anyone knows it, please leave a comment here.

Bill K
+4  A: 

Employee locks entire San Fran WAN would have to rate as one the biggest ones of it's type, i.e.disgruntled employee with high level of IT access.

I'd imagine several readers of SO would have this access but doubt they would be as drastic as this if upset.

dove
A: 

How about this case of ONLINE MURDER !

Hard to beat that :)

Robert Gould
Ok, not quite what I was looking for. Still funny :-)
c0m4
+15  A: 

One of the most intriguing computer crimes I’ve heard was a story about Ron Harris on the History Channel. He was programmer for the Nevada Gaming Control Board (NGCB) who investigated flaws in gaming machines in Las Vegas. He began to turn to the dark side after he saw Larry Volk, a programmer who was going to rat out on the gaming industry, get assassinated before he was able to testify.

Mr. Harris was able to use his position of power to upload trojan horse programs onto the EPROMs of slot machines while he was validating them in accordance with his job at the NGCB. His program would modify the odds for a slot machine only when a certain sequence of coins had been entered into the machine. Ingenious!

After evaluating a random number generator for a Keno game, he determined a flaw in it and exploited this flaw to determine the next numbers selected for Keno in Atlantic City. Unfortunately, his partner in crime was not very good and acted very suspicious after they won the jackpot. Doh!

It is a fascinating story to watch on the History Channel... I think the episode was called 'Slot Busters'.

Kevin
+6  A: 

No citation needed, since it is everywhere in the news. Curiously not mentioned yet, perhaps because we suffer from it daily
One big crime, perpetrated by thousand of people earning lot of money from that, is the spam industry.
A major annoyance for users, which loose countless cumulated hours to sort that out (I got the MyOpenID HTML messages caught by the spam filter of my e-mail provider, for example), and a big financial loss for the network actors, since they count for up to 80% of e-mail traffic, resulting in a sensible consumption of bandwidth and resources.
Not to mention numerous frauds ("we have lot of money in Africa, help us to bring it to Europa/USA") and scams (all health related spams).
And the phishing techniques ("urgent, your PayPal/eBay/Amazon/<whatever big name> account will be closed, click here").

Somehow related, all the trojan industry, manipulating thousands of infected zombie PCs, ready to launch a DoS attack (eg. for blackmail) or just to be used as spam relay.
The infection agent is often spam, or so called e-cards, or "Microsoft" sending to everybody a patch in an attachment (yeah, I believe that... But some people are naive/not knowledgeable).

These are not "best", just a daily menace/annoyance, which can be dangerous noneless.

PhiLho
A: 

if we can find detailt writen tchnical evidence of a crime and we would give it to you how big is the change you would want to replicate that.

most storys outthere are real only thing is that the names are incorrect en some details are left to to prevent replication by people who do not understand the technology behind it. the people who do understand are most likely not to use it to commit a crime.

Gos
A: 

I found The Internet Incident by Ian Probert a very good read a few years back

Pondidum
+1  A: 

Illegal file sharing.

Also see Brief History of Computer Crime (PDF) for a lot of summary information and tons of references to more material.

Bill the Lizard
A: 

The Salami Slice has few real world notable incidents as it is both hard to detect and not in the interest of the bank/institution to reveal that it has happened.

This mini history of computer crime has a section on it and lists this as having happened as early as the 1970s.

My favourite is this one which has the advantage of not necessarily being illegal :)

ShuggyCoUk
A: 

"Black Sunday", January 21, 2001 — Satellite television provider DirecTV transmitted an electronic message from its orbiting satellites that destroyed thousands of hacked smart cards, which had been allowing pirates to gain free access to hundreds of channels of programming for four years.

See "From the Eye of a Legal Storm, Murdoch's Satellite-TV Hacker Tells All"

none