Operation Cybersnare

Last updated

Operation Cybersnare was a sting operation by United States Secret Service targeted at computer hackers. This was the first undercover Internet sting of its kind. Elaborate ruses were designed by law enforcement agencies to trap computer criminals. The operation lasted for 8 months. [1]

Contents

The sting resulted in arrests of six individuals and the breakup of a sophisticated cell phone fraud ring. [2] These individuals stole millions of dollars worth of data. [3]

History

In January 1995, the Secret Service set up an undercover bulletin board system called “Celco 51” in Bergen County, New Jersey. It was a forum for the purchase of stolen cellular phone access numbers, credit card numbers and personal identity information. An agent served as the board’s operator using the computer moniker “Carder One”. [4] [5]

The undercover agents advertised this bulletin board as "catering to individuals involved in unauthorized computer intrusion and all aspects of computer fraud, including cellular telephone fraud." [6]

In September 1995, Individuals who stole and offered illicit products for sale in the group were identified and arrested. [7] Twelve raids across the country resulted in the arrest of six hackers. More than 30 systems were seized. [8] [9] It also led to the confiscation of 65 illegally programmed phones and 14 readers. [10]

Arrests

Related Research Articles

<span class="mw-page-title-main">United States Secret Service</span> U.S. federal law enforcement agency

The United States Secret Service is a federal law enforcement agency under the Department of Homeland Security charged with conducting criminal investigations and protecting U.S. political leaders, their families, and visiting heads of state or government. Until 2003, the Secret Service was part of the Department of the Treasury, as the agency was founded in 1865 to combat the then-widespread counterfeiting of U.S. currency. President Abraham Lincoln signed the legislation on April 14, 1865, just a few hours before he was assassinated. In 1901, the Secret Service was also assigned to presidential protection duties.

<span class="mw-page-title-main">Kevin Mitnick</span> American hacker (1963–2023)

Kevin David Mitnick was an American computer security consultant, author, and convicted hacker. He is best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. Mitnick's pursuit, arrest, trial, and sentence along with the associated journalism, books, and films were all controversial. After his release from prison, he ran his own security firm, Mitnick Security Consulting, LLC, and was also involved with other computer security businesses.

<span class="mw-page-title-main">Sting operation</span> Deceptive way to catch a person committing a crime

In law enforcement, a sting operation is a deceptive operation designed to catch a person attempting to commit a crime. A typical sting will have an undercover law enforcement officer, detective, or co-operative member of the public play a role as criminal partner or potential victim and go along with a suspect's actions to gather evidence of the suspect's wrongdoing. Mass media journalists occasionally resort to sting operations to record video and broadcast to expose criminal activity.

Phreaking is a slang term coined to describe the activity of a culture of people who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks. The term phreak is a sensational spelling of the word freak with the ph- from phone, and may also refer to the use of various audio frequencies to manipulate a phone system. Phreak, phreaker, or phone phreak are names used for and by individuals who participate in phreaking.

<span class="mw-page-title-main">Computer Fraud and Abuse Act</span> 1986 United States cybersecurity law

The Computer Fraud and Abuse Act of 1986 (CFAA) is a United States cybersecurity bill that was enacted in 1986 as an amendment to existing computer fraud law, which had been included in the Comprehensive Crime Control Act of 1984. Prior to computer-specific criminal laws, computer crimes were prosecuted as mail and wire fraud, but the applying law was often insufficient.

<span class="mw-page-title-main">Cybercrime</span> Type of crime based in computer networks

Cybercrime encompasses a wide range of criminal activities that are carried out using digital devices and/or networks. These crimes involve the use of technology to commit fraud, identity theft, data breaches, computer viruses, scams, and expanded upon in other malicious acts. Cybercriminals exploit vulnerabilities in computer systems and networks to gain unauthorized access, steal sensitive information, disrupt services, and cause financial or reputational harm to individuals, organizations, and governments.

Phone fraud, or more generally communications fraud, is the use of telecommunications products or services with the intention of illegally acquiring money from, or failing to pay, a telecommunication company or its customers.

Operation Sundevil was a 1990 nationwide United States Secret Service crackdown on "illegal computer hacking activities." It involved raids in approximately fifteen different cities and resulted in three arrests and the confiscation of computers, the contents of electronic bulletin board systems (BBSes), and floppy disks. It was revealed in a press release on May 9, 1990. The arrests and subsequent court cases resulted in the creation of the Electronic Frontier Foundation. The operation is now seen as largely a public-relations stunt. Operation Sundevil has also been viewed as one of the preliminary attacks on the Legion of Doom and similar hacking groups. The raid on Steve Jackson Games, which led to the court case Steve Jackson Games, Inc. v. United States Secret Service, is often attributed to Operation Sundevil, but the Electronic Frontier Foundation states that it is unrelated and cites this attribution as a media error.

<span class="mw-page-title-main">Craig Neidorf</span> American editor

Craig Neidorf, a.k.a.Knight Lightning, is an American editor. He was one of the founding editors of Phrack Magazine, an ezine.

globalHell was a group of hackers. The group disbanded in 1999 due to being prosecuted for computer intrusion. The combined losses were estimated to be ranged between $1.5m and $2.5m. They were one of the first hacking groups who gained notoriety for website defacements and breaches. It is called a "cybergang" as it had many of the same characteristics of a gang, such as the organizational structure. They carried out some of the same activities as a gang, including trafficking in stolen credit card numbers.

Bernie S. is a computer hacker living in Philadelphia, Pennsylvania. He was a regular panelist on the WBAI radio show Off the Hook. In 2001 he appeared in Freedom Downtime, a documentary produced by 2600 Films.

A data breach is a security violation, in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen, altered or used by an individual unauthorized to do so. Other terms are unintentional information disclosure, data leak, information leakage and data spill. Incidents range from concerted attacks by individuals who hack for personal gain or malice, organized crime, political activists or national governments, to poorly configured system security or careless disposal of used computer equipment or data storage media. Leaked information can range from matters compromising national security, to information on actions which a government or official considers embarrassing and wants to conceal. A deliberate data breach by a person privy to the information, typically for political purposes, is more often described as a "leak".

DarkMarket was an English-speaking internet cybercrime forum. It was created by Renukanth Subramaniam in London, and was shut down in 2008 after FBI agent J. Keith Mularski infiltrated it using the alias Master Splyntr, leading to more than 60 arrests worldwide. Subramaniam, who used the alias JiLsi, admitted conspiracy to defraud and was sentenced to nearly five years in prison in February 2010.

<span class="mw-page-title-main">Albert Gonzalez</span> American computer hacker and criminal

Albert Gonzalez is an American computer hacker, computer criminal and police informer, who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007, the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing attacks which allowed him to steal computer data from internal corporate networks.

Cramming is a form of fraud in which small charges are added to a bill by a third party without the subscriber's consent, approval, authorization or disclosure. These may be disguised as a tax, some other common fee or a bogus service, and may be several dollars or even just a few cents. The crammer's intent is that the subscriber will overlook and ultimately pay these small charges without challenging their legitimacy or inquiring further.

<span class="mw-page-title-main">Chinese espionage in the United States</span>

The United States has often accused the People's Republic of China of attempting to unlawfully acquire U.S. military technology and classified information as well as trade secrets of U.S. companies in order to support China's long-term military and commercial development. Chinese government agencies and affiliated personnel have been accused of using a number of methods to obtain U.S. technology, including espionage, exploitation of commercial entities, and a network of scientific, academic and business contacts. Prominent espionage cases include Larry Wu-tai Chin, Katrina Leung, Gwo-Bao Min, Chi Mak and Peter Lee. The Ministry of State Security (MSS) maintains a bureau dedicated to espionage against the United States, the United States Bureau.

<span class="mw-page-title-main">Roman Seleznev</span> Russian computer hacker

Roman Valerevich Seleznev, also known by his hacker name Track2, is a Russian computer hacker. Seleznev was indicted in the United States in 2011, and was convicted of hacking into servers to steal credit-card data. His activities are estimated to have caused more than $169 million in damages to businesses and financial institutions. Seleznev was arrested on July 5, 2014, and was sentenced to 27 years in prison for wire fraud, intentional damage to a protected computer, and identity theft.

Lizard Squad Hacker group

Lizard Squad was a black hat hacking group, mainly known for their claims of distributed denial-of-service (DDoS) attacks primarily to disrupt gaming-related services.

<span class="mw-page-title-main">Carding (fraud)</span> Crime involving the trafficking of credit card data

Carding is a term describing the trafficking and unauthorized use of credit cards. The stolen credit cards or credit card numbers are then used to buy prepaid gift cards to cover up the tracks. Activities also encompass exploitation of personal data, and money laundering techniques. Modern carding sites have been described as full-service commercial entities.

References

  1. "6 Caught In 'Cyber-Sting' | The Seattle Times". archive.seattletimes.com. Archived from the original on 2023-09-26. Retrieved 2024-03-14.
  2. Bauerschmidt, Tim; Liddle, Ramie (2017-05-04). Driving Miss Norma. Transworld. ISBN   978-1-4735-4358-4. Archived from the original on 2024-03-14. Retrieved 2024-03-14.
  3. FBI Law Enforcement Bulletin. Federal Bureau of Investigation, U.S. Department of Justice. 1998. Archived from the original on 2024-03-14. Retrieved 2024-03-14.
  4. Wall, DavidS (2017-07-05). Crime and Deviance in Cyberspace. Routledge. ISBN   978-1-351-57076-3. Archived from the original on 2024-03-14. Retrieved 2024-03-14.
  5. Cryptography's Role in Securing the Information Society. 1996. doi:10.17226/5131. ISBN   978-0-309-05475-1. Archived from the original on 2023-12-09. Retrieved 2024-03-14.
  6. "WHEN DOES A "HACKER" BECOME AN "ATTACKER?"" (PDF). United States Army Command and General Staff College. Archived (PDF) from the original on 2024-03-14. Retrieved 2024-03-14.
  7. Cryptography's Role in Securing the Information Society. National Academies Press. 1996-10-29. ISBN   978-0-309-17580-7. Archived from the original on 2024-03-14. Retrieved 2024-03-14.
  8. "1995-09-11 -- Cybersnare Sting -- Arrests -- News Release". irp.fas.org. Archived from the original on 2022-12-06. Retrieved 2024-03-14.
  9. Gregson, Reily (1999-11-30). "SECRET SERVICE ATTACKS CELLULAR FRAUD AT SOURCE, STOPS COMPUTER HACKERS". RCR Wireless News. Archived from the original on 2023-08-27. Retrieved 2024-03-14.
  10. Boucher, Geoff (1995-09-13). "On-Line Sting Just the Beginning, Says Cyber-Sleuth Squad". Los Angeles Times. Archived from the original on 2023-08-27. Retrieved 2024-03-14.
  11. "Internet Sting Operation Nets Six Attempting to Sell Stolen Data". Associated Press News . 2019-01-26. Archived from the original on 2019-01-26. Retrieved 2024-03-14.{{cite web}}: CS1 maint: bot: original URL status unknown (link)
  12. "Secret Service Goes On Line and After Hackers (Published 1995)". 1995-09-12. Archived from the original on 2023-05-18. Retrieved 2024-03-14.
  13. Boucher, Geoff (1995-09-12). "Computer Hacker Snared in Cyber-Sting : Technology: Huntington Beach man is one of six arrested in alleged plot to steal credit card and cellular phone codes". Los Angeles Times. Archived from the original on 2023-08-27. Retrieved 2024-03-14.

Further reading