Jerry Neil Schneider

Last updated

Jerry N. Schneider (born circa 1951) is a social engineer and security consultant. While still in high school in 1968, Schneider started a company called "Creative Systems Enterprises" (CSE) and began selling his own invented electronic communication devices. Schneider obtained parts by information diving from Pacific Telephone and Telegraph's dumpsters. During this scavenging, he built up a collection of PTT documents including invoices and training manuals. After a few years, he reportedly knew more about PTT's procedures than its own employees. [1]

1970–1971: Schneider expanded his telephone wholesale business while majoring in Electrical Engineering in college.

June, 1971: Schneider started a plan to acquire new telephone equipment from PTT, market it as "refurbished," and sell it through CSE, his own company. The exact details of his scam are currently not available. He also acquired equipment from Western Electric Company in a similar manner. He sold equipment back to Pacific and to others.

January, 1972: A former employee of CSE (presumably disgruntled) tips off law enforcement. Police raid CSE's offices and warehouse. The District Attorney estimates the found equipment is worth $8,000. At this time, they learn that Schneider had made off with $125,000 worth of gear. Schneider later admits to nearly $900,000.

He was arrested on February 8, 1972. Contemporary sources rate his caper as one of the most famous computer crimes in history. [2]

After plea bargaining, Schneider eventually pleaded guilty on May 15, 1972 to one count of grand theft of $5,000 worth of equipment. In July 1972, he was sentenced to two months in a minimum security facility. He only served forty days and paid a $500 fine.

1972: Schneider, at 21, formed a security consultancy that targeted companies wishing to protect themselves from computer criminals. [ citation needed ]

November 26, 1974: Date of final judgement of civil suit from PTT. Suit stated that Schneider had stolen equipment valued at $214,649.63, and that equipment valued at $73,452.81 had been returned.

1977: Schneider left the security consulting firm.

Related Research Articles

A hacker is a person skilled in information technology who uses their technical knowledge to achieve a goal or overcome an obstacle, within a computerized system by non-standard means. Though the term hacker has become associated in popular culture with a security hacker – someone who utilizes their technical know-how of bugs or exploits to break into computer systems and access data which would otherwise be inaccessible to them – hacking can also be utilized by legitimate figures in legal situations. For example, law enforcement agencies sometimes use hacking techniques in order to collect evidence on criminals and other malicious actors. This could include using anonymity tools to mask their identities online, posing as criminals themselves. Likewise, covert world agencies can employ hacking techniques in the legal conduct of their work. On the other hand, hacking and cyber-attacks are used extra- and illegally by law enforcement and security agencies, and employed by state actors as a weapon of both legal and illegal warfare.

Nortel Networks Corporation (Nortel), formerly Northern Telecom Limited, was a Canadian multinational telecommunications and data networking equipment manufacturer headquartered in Mississauga, Ontario, Canada. It was founded in Montreal, Quebec, in 1895 as the Northern Electric and Manufacturing Company. Until an antitrust settlement in 1949, Northern Electric was owned principally by Bell Canada and the Western Electric Company of the Bell System, producing large volumes of telecommunication equipment based on licensed Western Electric designs.

<i>2600: The Hacker Quarterly</i> American underground technology publication

2600: The Hacker Quarterly is an American seasonal publication of technical information and articles, many of which are written and submitted by the readership, on a variety of subjects including hacking, telephone switching systems, Internet protocols and services, as well as general news concerning the computer "underground."

Kevin Mitnick American computer security consultant, author, convicted criminal, and hacker

Kevin David Mitnick is an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes.

Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from phone, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking.

Wardialing is a technique to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for modems, computers, bulletin board systems and fax machines. Hackers use the resulting lists for various purposes: hobbyists for exploration, and crackers—malicious hackers who specialize in breaching computer security—for guessing user accounts, or locating modems that might provide an entry-point into computer or other electronic systems. It may also be used by security personnel, for example, to detect unauthorized devices, such as modems or faxes, on a company's telephone network.

<i>Hackers: Heroes of the Computer Revolution</i> 1984 non-fiction book by Steven Levy

Hackers: Heroes of the Computer Revolution (ISBN 0-385-19195-2) is a book by Steven Levy about hacker culture. It was published in 1984 in Garden City, New York by Nerraw Manijaime/Doubleday. Levy describes the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers.

Social engineering (security) Psychological manipulation of people into performing actions or divulging confidential information

In the context of information security, social engineering is the psychological manipulation of people into performing actions or divulging confidential information. This differs from social engineering within the social sciences, which does not concern the divulging of confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional "con" in that it is often one of many steps in a more complex fraud scheme.

A white hat is an ethical security hacker. Ethical hacking is a term meant to imply a broader category than just penetration testing. Under the owner's consent, white hat hackers aim to identify any vulnerabilities the current system has. Contrasted with the black hat, a malicious hacker, the name comes from Western films, where heroic and antagonistic cowboys might traditionally wear a white and a black hat, respectively. There is a third kind of hacker known as a grey hat who hacks with good intentions but at times without permission.

Kevin Poulsen American computer hacker

Kevin Lee Poulsen is an American former black-hat hacker and a contributing editor at The Daily Beast.

A black hat hacker is a hacker who violates computer security for their own personal profit or out of malice.

A security hacker is someone who explores methods for breaching defenses and exploiting weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or evaluation of a system weaknesses to assist in formulating defenses against potential hackers. The subculture that has evolved around hackers is often referred to as the "computer underground".

The 414s were a group of computer hackers from Milwaukee who broke into dozens of high-profile computer systems, including ones at Los Alamos National Laboratory, Sloan-Kettering Cancer Center, and Security Pacific National Bank, in 1982 and 1983.

Data breach Intentional or unintentional release of secure information

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage, and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice, organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak".

Justin Tanner Petersen was an American hacker, concert promoter, sound engineer, private investigator and an informant for the Federal Bureau of Investigation. While tasked with helping to catch other hackers and fugitives wanted by the FBI, he continued to commit serious crimes.

LulzSec Hacker group

Lulz Security, commonly abbreviated as LulzSec, was a black hat computer hacking group that claimed responsibility for several high profile attacks, including the compromise of user accounts from PlayStation Network in 2011. The group also claimed responsibility for taking the CIA website offline. Some security professionals have commented that LulzSec has drawn attention to insecure systems and the dangers of password reuse. It has gained attention due to its high profile targets and the sarcastic messages it has posted in the aftermath of its attacks. One of the founders of LulzSec was computer security specialist Hector Monsegur, who used the online moniker Sabu. He later helped law enforcement track down other members of the organization as part of a plea deal. At least four associates of LulzSec were arrested in March 2012 as part of this investigation. Prior, British authorities had announced the arrests of two teenagers they alleged were LulzSec members, going by the pseudonyms T-flow and Topiary.

HackingTeam was a Milan-based information technology company that sold offensive intrusion and surveillance capabilities to governments, law enforcement agencies and corporations. Its "Remote Control Systems" enable governments and corporations to monitor the communications of internet users, decipher their encrypted files and emails, record Skype and other Voice over IP communications, and remotely activate microphones and camera on target computers. The company has been criticized for providing these capabilities to governments with poor human rights records, though HackingTeam states that they have the ability to disable their software if it is used unethically. The Italian government has restricted their licence to do business with countries outside Europe.

Cryptocurrency and crime describes notable examples of cybercrime related to theft of cryptocurrencies and some of the methods or security vulnerabilities commonly exploited. Cryptojacking is a form of cybercrime specific to cryptocurrencies that has been used on websites to hijack a victim's resources and use them for hashing and mining cryptocurrencies.

References

  1. "Appeal of Jerry N Schneider" (PDF). State Board of Equalization (Canada). Archived from the original (PDF) on 2005-03-09.
  2. Becker, Jay (1980). "Computer Crime – career of the future" (PDF). Haftofthespear. National Center for Computer Crime Data.