The Lure: The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals / Edition 1by Stephen C. Schroeder
Pub. Date: 02/14/2011
Publisher: Cengage Learning
Beginning in the fall of 1999, a number of Internet-related businesses and financial institutions in the United States suffered computer intrusions or "hacks" that originated from Russia. The hackers gained control of the victims' computers, copied and stole private data that included credit card information, and threatened to publish or use the stolen credit
Beginning in the fall of 1999, a number of Internet-related businesses and financial institutions in the United States suffered computer intrusions or "hacks" that originated from Russia. The hackers gained control of the victims' computers, copied and stole private data that included credit card information, and threatened to publish or use the stolen credit cards or inflict damage on the compromised computers unless the victims paid money or gave the hackers a job. Some of the companies gave in and paid off the hackers. Some decided not to. The hackers responded by shutting down parts of their networks and using stolen credit card numbers to order thousands of dollars' worth of computer equipment. THE LURE is the true, riveting story of how these Russian hackers, who bragged that the laws in their country offered them no threat, and who mocked the inability of the FBI to catch them, were caught by an FBI lure designed to appeal to their egos and their greed. The story of the sting operation and subsequent trial is told for the first time here by the Department of Justice's attorney for the prosecution. This fascinating story reads like a crime thriller, but also offers a wealth of information that can be used by IT professionals, business managers, lawyers and academics who wish to learn how to protect systems from abuse, and who want to respond appropriately to network incidents. They also provide insight into the hacker's world and explain how their own words and actions were used against them in a court of law - the evidence provided is in the raw, uncensored words of the hackers themselves. This is a multi-layered true crime story, a real-life law and order story that explains how hackers and computer thieves operate, how the FBI takes them down, and how the Department of Justice prosecutes them in the courtroom.
- Cengage Learning
- Publication date:
- Product dimensions:
- 5.90(w) x 8.90(h) x 1.50(d)
Table of Contents
Introduction. 1. Speakeasy. 2. The Investigation Begins. 3. The Lure. 4. The Sting. 5. In Custody. 6. PayPal and eBay. 7. A (not so) Brief Primer on National Security Investigations. 8. eBay. 9. Victim Banks. 10. CTS (San Diego). 11. Verio and webcom.com. 12. The Motion to Suppress and Preliminary Skirmishing. 13. Preparing for Trial. 14. The Trial. 15. Aftermath.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >