Federal prison for breaching security

Assignment Help Basic Computer Science
Reference no: EM131038972

In March 2010, 28 year-old Albert Gonzalez was sentenced to 20 years in federal prison for breaching security measures at several well-known retailers and stealing millions of credit card numbers, which he then resold across a variety of shadow "carding" Web sites. Using a fairly simple packet sniffer, Gonzalez was able to steal payment card transaction data in real time, which he then parked on blind servers in places such as Latvia and Ukraine-countries formerly part of the Soviet Union. Gonzalez named his activities "Operation Get Rich or Die Tryin'" and lived a lavish lifestyle by selling stolen credit card information. He was eventually tracked down by the U.S. Secret Service, which was investigating the stolen card ring. Operation Get Rich or Die Tryin' took place for more than two years and cost major retailers, such as TJX, OfficeMax, Barnes & Noble, Heartland, and Hannaford, more than $200 million in losses and recovery costs. It is the largest computer crime case ever prosecuted.

At first glance, Operation Get Rich or Die Tryin' seems to be an open-and-shut case. A hacker commits a series of cybercrimes, is caught, and is successfully prosecuted. Fault and blame are assigned to the cybercriminal, and justice is served for the corporations and the millions of people whose credit card information was compromised.

Unless you ask the shareholders, banking partners, and some customers of TJX, who filed a series of classaction lawsuits against the company claiming that the "high-level deficiencies" in its security practices make it at least partially responsible for the damages caused by Albert Gonzalez and his accomplices. The lawsuits point out, for example, that the packet sniffer Gonzalez attached to the TJX network went unnoticed for more than seven months. Court documents also indicate that TJX failed to notice more than 80 GB of stored data being transferred from its servers using TJX's own high-speed network. Finally, an audit performed by TJX's payment-card processing partners found that it was noncompliant with 9 of the 12 requirements for secure payment card transactions. TJX's core information security policies were found to be so ineffective that the judge presiding over sentencing hearing of Gonzalez reviewed them to determine whether TJX's damages claim against him of $171 million is valid.

Apart from lawsuits, TJX faced a serious backlash from customers and the media when the details of the scope of the breaches trickled out. Customers reacted angrily when they learned that nearly six weeks had passed between the discovery of the breach and its notification to the public. News organizations ran headline stories that painted a picture of TJX as a clueless and uncaring company. Consumer organizations openly warned people not to shop at TJX stores. TJX's reputation and brand image was shattered in the wake of Operation Get Rich or Die Tryin', and only a small portion of the damage was actually Albert Gonzalez's fault.

The real lesson of Operation Get Rich or Die Tryin' may not be the crime itself, but how a lackluster security policy was chiefly responsible for it happening in the first place.

Source: David, K., & Solomon, M. G. (2010). Fundamentals of information systems security (1st ed.).

Sudbury, MA: Jones & Bartlett

Reference no: EM131038972

Questions Cloud

Disadvantages and advantages of each investment method : evaluate the performance of capital projects, and suggest some ways to hold managers accountable for spending overruns. Recommend when capital projects should be abandoned due to subsequent cost overruns. Support your position.
Determining the use of two arrays : Define two arrays x and f, each of size 10, using call-by-reference, to pass an array to a function, named sum. In main: define array, pass arrays, print out the array and the results on screen. In function sum, take arrays from main and sum the a..
Prepare the statement of cash flows of dux company : On November 12, 500 shares of common stock were repurchased as treasury stock at a cost of $8,000. Required
Prepare powerpoint presentation slides on given three assets : Prepare a PowerPoint presentation slides on three assets, Oil for commodity and US dollar for currency and Deutsche bank for financial sector.
Federal prison for breaching security : In March 2010, 28 year-old Albert Gonzalez was sentenced to 20 years in federal prison for breaching security measures at several well-known retailers and stealing millions of credit card numbers, which he then resold across a variety of shadow "c..
When should variances be investigated : If there is any topic that you would like to discuss further, please email me and I will include as one of the discussions.We discussed managerial accounting during week 1. Let's work a refresher exercise E1-1 and see how much you remember
What is the unit conversion cost for may : What is the unit conversion cost for May? (Round unit costs to 2 decimal places, e.g. 2.25.) The unit conversion cost for May $
Create a supplier performance improvement plan : Create a supplier performance improvement plan. Include the steps that need to be taken to identify the root cause, potential containment, and corrective action. You need to include how you will monitor compliance to corrective action and if the c..
Ending inventory using the average periodic method : The following information comes from CROW Inc.'s inventory records: Purchase date Units Cost per unit Sale date Units sold Beginning inventory 40 $12 Jan 2 150 $10 Jan 10 125 Jan 12 100 $8 Jan 15 100 Jan 20 100 $5 Jan 31 50 Required: Determine End..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Capacity as a systems analyst

In your capacity as a systems analyst, you may face situations in which you encounter an ethical dilemma. For example, you may be asked to design a system that supports an activity with which you personally disagree

  What label will you put on the power cable for floppy drive

Where is the master boot record for a floppy disk located? In order to identify the working voltage properly, what label will you put on the power cable for the floppy drive?

  Describe all the necessary equipment

Your sister owns a small clothing store. During a conversation at a family dinner, she mentions her frustration with having to manually track and reorder high demand items. She would like an automated system but has a very small budget. Write a 4-5 p..

  What was the most significant advance of windows and why

What was the biggest mistake Microsoft made in Windows development over the last 30 years and why?

  Write name of storage location involved in the code

Recognize each dependency by type; write the two instructions involved; recognize which instruction is dependent; and name storage location involved.

  Why do some block cipher modes of operation only

Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

  The pointer''s of c++

Write a 800 word discussion of what was lost and what was gained in Java's designers' decision to not include the pointer's of C++

  Converting binary numbers in decimal

Convert the given binary numbers in decimal: 101110; 1110101; and 110110100. Convert the given decimal numbers to bases indicated.

  Preventing the type of attack

Deccan Herald titled Hackers holding your PC to ransom Propose two (2) methods that computer users could use to prevent this type of attack.

  Explain can capabilities protect against all trojan horses

Can capabilities protect against all Trojan horses? Either show that they can or describe a Trojan horse process that C-Lists cannot protect against.

  Assess your knowledge and growth

Explain what you learned about the Website you selected by looking at the source code. (i.e., the version of HTML that was used, comment tags, if the head elements were marked, and if so, the type of information they contained.) Thinking back to the ..

  Write java program that allows the user to enter wall space

Write a Java program (from scratch) that allows the user to enter the wall space to be painted and the price of paint per gallon.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd