Mostrando entradas con la etiqueta famoushacker. Mostrar todas las entradas
Mostrando entradas con la etiqueta famoushacker. Mostrar todas las entradas

miércoles, 3 de junio de 2015

EL FRAUDE DE HACKING MEXICO IMPORTANTE LEER

Algunos de mis paisanos Mexicanos habrán escuchado sobre Hacking México. Una Pseudo "escuelita" que ofrece cursos de capacitación de seguridad ofensiva, dando certificaciones supuestamente respaldadas por la SEP[Secretaria de Educación Publica] y el IPN [Instituto Politecnico Nacional].



Honestamente de respetable no tiene absolutamente nadaRaúl Robles el "CEO" se pasa el día ofendiendo a toda la gente que le sigue en su pagina de Facebook. Así es, el día entero lo dedica a sentirse rico, superior y dios de la informática. Como todo un excelente Troll humillando y rebajando a diestra y siniestra a quien se le cruce, aquí unos ejemplos solo de un día, de unas horas.

       

Las capturas de arriba son solo pequeñas pruebas de que clase de personas sin educación, ni respeto por los demás te están "Certificando". Raul Robles disfruta sentirse superior a los demás, ofenderte, y humillarte sino te haz capacitado, sino haz sido estafado inscribiendote en algunos de sus cursos.

También se pasa diciendo una serie de sandeces sobre el Software Libre, como que es para pobres, como los que usan Android, aún cuando el mismo en una entrevista publicada en su sitio afirma que el SO de uno de sus dispositivos de  hacking esta basado en Debian, pero bueno, el asunto no es tema.

El asunto aquí no es solo el tipo de persona que es, sino que nisiquiera puede certificarte, es un defraudador, mentiroso y fanfarrón.[Entre muchas otras cosas].

Se llaman un empresa, ojala lucrasen con profesionalismo y respeto, pero quien obtiene dinero a base de mentiras es un DEFRAUDADOR.

Les dejo esta nota que se publica en: http://hackingmexico.info/ [Copiado y Pegado: Literal ;-)]
Como ya hemos dicho Raúl Robles no solo se dedica a sentirse rico e importante y rebajar a sus semejantes. Además es un estafador y mentiroso, deben de tener cuidado con esta vergüenza de "Director Ejecutivo" que afirma que sino te has dejado capactitar estafar entonces eres un don nadie pobre diablo que no merece ser mas en la vida.

Y surge una y otra vez las mismas preguntas.

¿Dejaras que esta persona te certifique estafe?

¿Invitarias a esta persona a dar un conferencia a tu evento y ser "libre de expresarse" solo con vulgaridades? ¿No preferirías un conferencista profesional?

Importante Aclarar: No cuestiono sus conocimientos, trayectoria o experiencia. Lo que señalo es la forma en que menosprecia a todo aquel que no ha sido estafado con sus pseudo -certificaciones, denuncio que le miente a las personas diciendo que la SEP y el IPN lo respaldan, no me importa si odia a Android o al Software Libre cada quien es libre de usar lo que bien le parezca (ni fan de Android soy), sin embargo es deplorable que se pase el día entero humillando y degradando a los demás y todavía tiene el descaro de decirte que si quieres ser "tan grande y exisitoso como él" entonce le pagues una certificación haber si asi dejas de ser un "don nadie, Raúl Robles es una vergüenza para el empresario Mexicano, es un niñito que presume su iOS y piensa que todos lo envidiamos cuando en realidad nadie quisiera estar cerca de él. Y bien todavía para rematar como muchos comentan en su pagina de facebook, ademas de defraudador, mentiroso, irrepestuso y bla bla hasta TONTO es, en vez de conseguir mas clientes victimas dando una buena pantalla (De seriedad y respeto) y creando una buena reputación se la pasa sintiéndose dios entre mortales androides.

No te dejes engañar pasa la voz. ;-)

La información aquí es estraida de: http://hackingmexico.info/ sin embargo la pagina anterio ha añadido comentarios personales, gracias y saludos.
sres. y sras. desde el año 2012 aparece la Pseudo empresa llamada HackingMexico que ha venido a revolucionar todo lo referente a la Seguridad informática en méxico, pero no se emocionen. :p
Al decir revolucionar la Seguridad Informática en méxico es por que siempre se han dedicado a ofender, minimizar, despreciar y socabar la integridad de las empresas totalmente y legalmente constituidas y que tienen sus valores curriculares legalmente constituidos por las diferentes empresas gubernamentales y por las empresas mas grandes de Seguridad Informática en México y el mundo.

y además el "DICE" tener valores curirculares del IPN y de la SECRETARIA DE EDUCACIÓN DE MEXICO..........
VEAMOS DETENIDAMENTE si es cierto............

cabe mencionar que despues de esta evidencia vista y aun así le creen a esta persona que toda la vida ah sido de fraudes........... ya es por que realmente les gusta la mala vida......


martes, 2 de junio de 2015

Sex, Drugs, and the Biggest Cybercrime of All Time

The fast times & hard fall of three teenage friends with a knack for illegal code

BY  | 
They'd been high all weekend long — on Ecstasy, coke, mushrooms and acid — so there seemed little harm in doing one last bump of Special K while they packed up to leave their $5,000-a-night duplex in South Beach. For the past three days, the three friends had barely bothered leaving their hotel, as a dozen club kids in town for Winter Music Conference, the annual festival that draws DJs and ravers from all over the world, flocked to their luxury suite to partake of the drug smorgasbord laid out on the coffee table. But even stoned on industrial-grade horse tranquilizers, Albert Gonzalez remained focused on business — checking his laptop constantly, keeping tabs on the rogue operators he employed in Turkey and Latvia and China, pushing, haranguing, issuing orders into his cellphone in a steady voice. "Let's see if this Russian asshole has what I need," he'd say calmly. Then he would help himself to glass plates of powder, each thoughtfully cut into letters for easy identification: "E" for Ecstasy, "C" for coke.
Albert's two friends were in no shape to think about work. Stephen Watt, a freakishly tall bodybuilder, was planted on the big leather sofa, immobile as the hotel suite's potted palm. Only 23, Watt was the group's coding genius, who until recently had been employed in the IT department at Morgan Stanley, the giant Wall Street investment bank. Patrick Toey, 22, Albert's most loyal foot soldier, was lazing around the suite, staring at the Miami seascape through the two-story picture windows, letting his thoughts drift.
"Listen, I need you to do this now," Albert was saying in a firm voice as he set his laptop on the desk in the master bedroom upstairs. For weeks, he had been badgering Stephen, known in hacker circles as the "Unix Terrorist," to refine a crucial bit of code for him. They were in the midst of pulling off the biggest cybercrime ever perpetrated: hacking into the databases of some 250 companies — including Barnes & Noble, OfficeMax, 7-Eleven, Boston Market, Sports Authority and DSW — and stealing 170 million credit-card numbers. But unless Albert could get Stephen to focus, the whole thing was in danger of falling apart.
"Now that I've got you here, I need you to do it, or it's never gonna happen," Albert urged. The whites of his brown eyes had gone veiny from the K, but he was still the ringleader, still in control.
Stephen somehow managed to climb the suite's glassed-in staircase and sit down in front of the laptop, but nothing he saw on the screen made any sense — his brain was scrambled beyond comprehension. "Dude," he wailed, "I can't fucking read!"
Albert didn't miss a beat. "Patrick, what about you?" he called out. "You sober enough to do this?"
Patrick moved toward the desk as if underwater. "Uh, this is going to be difficult," he said. "But at least I can read."
Stephen pitched over onto the master bed, where, eyes closed, he groggily dictated code to Patrick, who laboriously typed it out, letter by letter. The task at hand seemed impossible, given their chemical impairment, but Stephen was notorious among hackers for his ability to dash off intricate code that could blast through even the most secure computer networks. Finally, after 10 minutes of following Stephen's directions, Patrick hit the "return" button and declared the program functional. "Thank God," Albert pronounced, his eyes widening with relief and excitement. Together, the three friends had just succeeded at putting some finishing touches on a vast criminal enterprise, one that U.S. Attorney General Michael Mukasey would call "the single largest and most complex identity-theft case ever charged in this country."
Only 25 years old, with little more than a high school education, Albert had created the perfect bubble, a hermetically sealed moral universe in which he made the rules and controlled all the variables — and the only code that mattered was the loyalty of his inner circle. He even had an insurance policy, one designed to keep him a step ahead of the federal agents charged with tracking cybercrime: For the past four years, Albert had been working as an informant for the Secret Service, helping federal agents to identify and bust other rogue hackers. His double life as a snitch gave him an inside look at how the feds try to safeguard the nation's computer data — and reinforced his own sense of superiority. "Psychologically," his sister later told a judge, "it was feeding an obsession that in the end would become my brother's downfall."
But as Albert stood in his South Beach hotel room in March 2007, getting caught was the furthest thing from his mind. The coding work complete, he briskly snapped his laptop shut and hustled his friends down to the Loews' marble-floored lobby, where, acting as sober as possible, he settled their $17,000 bill for the weekend, paying mostly in twenties. Knowing it would take a while to count that much cash, the hotel manager ordered a round of frozen daiquiris for the gentlemen. For now, as the three friends sipped their drinks and hypnotically watched their stacks of cash being counted right in front of them, Albert felt untouchable.
When Albert Gonzalez was 12, he bought a computer with the allowance he had saved up working for his father, a landscaper. At first, his new hobby seemed a harmless distraction: He played video games — car racing and wrestling, mostly — and spent hours taking the computer apart and putting it back together. He even set up computers for other families in his working-class neighborhood of Miami, where most of the residents, like Albert's father, were first-generation immigrants from Cuba. But Albert's fascination soon turned into a fixation. "It was already like an obsessive vice," his mother, Maria, would later tell a judge. By the time he entered South Miami Senior High, the once-outgoing Albert had turned isolated and untalkative, his grades plummeting as he neglected his homework in favor of the huge programming textbook he had bought. Maria begged her son to see a psychologist.
"No," Albert told her. "I am not crazy."
"You don't have to be crazy to go to a psychologist," his mother pleaded, but Albert was unmoved. "If you take me, I'm not going to talk," he warned. "I'm just going to stay quiet." When she moved the computer to his sister's room, Albert simply snuck in during the night to log on to chat rooms devoted to computer programming. Albert's father, who had fled Cuba in the 1970s on a homemade raft, took more drastic action: Enlisting the help of some policemen friends, he staged a fake arrest of Albert, trying to scare his son into returning to reality.
That didn't work either. Instead, Albert escaped further into the solace of the world of programming chat rooms — where he called himself "soupnazi," after the grumpy Seinfeld restaurateur. Before long, he discovered Internet Relay Chat, a web forum popular with hackers who discussed the how-tos of breaching Internet security at its highest levels. He had stumbled across a community that shared not just his computer obsession but also his caustic humor and profound alienation in a way his real-life peers didn't get. Albert and his online friends spent hours swapping tips on hacking, debating their favorite bands and trading booger jokes. By the time he graduated high school, in 1999, Albert had already hacked into the websites of NASA and the government of India — cyberfeats that had prompted visits by Miami detectives and the FBI, who warned him to cut it out.
At this point, Albert wasn't trying to cash in on his skills as a hacker; he simply relished the intellectual puzzle of network security, the powerful rush of picking the locks of high-tech vaults. It wasn't about stealing anything — it was more the gloating rights, about showing the straight-world programmers that he was better and smarter than them. But Albert wasn't just a typical misfit hacker. He was also that rarest of computer geeks: one who could actually relate to other human beings. He was the perfect fusion of the dorky and the suave — the easygoing charm of George Clooney combined with the tech-savvy drive of Steve Jobs. With his good looks and smooth confidence, Albert was never at a loss for female company. And with the guys, he was always the man with the plan. "Albert's an alpha," says a close friend who met Albert online. "If you're all sitting around doing nothing, he's the one who picks a direction and goes, and everyone goes with him."
One night in 1999, a few months after graduating from high school, he decided to drive three hours from Miami to Melbourne, Florida, to meet one of his online friends, a coding whiz who went by the chat-room handle "jimjones." Stephen Watt was a gangly, high-strung, seven-foot-tall senior — only 16 years old, he had skipped a grade — with a 4.37 GPA and few friends. It was past midnight when Albert's headlights finally appeared in the driveway, where Stephen met him for fear of waking his conservative parents. The boys snuck through the house and into Stephen's room, where Albert promptly produced a homemade bong. "No, thanks, I'm good," Stephen mumbled; he had never tried drugs before. They went on to have the best weekend ever, driving aimlessly around town, hanging at the mall, talking computers. A favorite topic was their shared loathing of "white hat" hackers, who used their computer expertise to help businesses find and fix network vulnerabilities. White hats ruined all the fun for "black hat" pranksters, and Stephen — who was as histrionic as Albert was laid-back — could rant for hours about the evils of white-hat sellout phonies.
"He wasn't as interested in the ideology," Stephen would later recall. Albert just wanted to hack shit for fun — and maybe for profit. Not as a white hat, of course; he'd never sell out. Instead, he coined a new term to describe the role he saw for himself. He'd be a "green hat" — the color of money. Albert wanted a wife and kids someday, and he could already foresee that raising a family would require some serious cash. "What good will a couple million dollars do?" he asked Stephen. "You have health problems, your kids need braces, you pay for their college — your money goes right down the drain."
Albert's initial attempts to succeed in the real world got off to a rocky start. He dropped out of Miami Dade Junior College in his first semester, bored by his intro computer courses, and moved to New York to work for a dot-com firm that soon went bust. He landed another job, at Siemens, but bailed when the company moved to Pennsylvania. In 2002, unemployed and liberally self-medicating, Albert took his first stab at being a green hat: He became one of the leaders of an Internet "carding" forum called Shadowcrew, where thousands of international criminals exchanged services, from selling fake driver's licenses and Social Security cards to stolen credit- and debit-card numbers. But while Albert was good at orchestrating such deals, he didn't know how to stay off the police's radar. In 2003, he was arrested in New Jersey after withdrawing money with a fake bank card from an ATM. He had 15 phony cards in his possession.
Where another hacker might have seen jail time, Albert saw opportunity: He allowed himself to be recruited as a key informant for "Operation Firewall," a federal cybercrime task force that was trying to take down Shadowcrew. Albert proved to be a diligent snitch, ratting out his fellow hackers to the Secret Service. At the same time, he was studying the agents he worked with — their tactics, their mind-set — and realizing how little they actually understood. "These people are fucking retarded about anything other than jumping in front of a bullet," he told Stephen, insisting that they knew too little about computers to have any real impact on cybercrime. In a perverse way, his work for the government only encouraged his criminal behavior and pushed his wayward ambitions into the stratosphere. In Albert's mind, his value to the Secret Service reinforced just how special his skills were — and what a unique position he was in.
"That is a very big problem with using sources," says E.J. Hilbert, a former FBI cybercrimes agent who went undercover for Operation Firewall. "While working as an informant, Albert obtained insight. Even if his handlers tried to not show him everything, he got a pretty good idea of how things were going to play out." In October 2004, the feds arrested 28 members of Shadowcrew for stealing 1.5 million credit-card numbers — thanks in part to information supplied by Albert. By that point, however, Albert already had a big plan of his own under way. He named it "Operation Get Rich or Die Tryin'."
It didn't start out as some well-organized criminal enterprise. "It wasn't anything official," recalls Patrick Toey. "It was just something I was doing for money. And as a favor to Albert. Because he was a friend." In Patrick, Albert had found his perfect street operative. The two had become fast friends through Internet Relay Chat, but they didn't begin hanging out until four years later, in 2003, when Patrick boarded a bus from his home in Virginia Beach and headed to New York for his first "cashout" trip as a member of Shadowcrew. Only 18, Patrick was making the trip with the blessing of his mom, who needed the rent money.
Arriving in New York, Patrick climbed into Albert's Honda Accord, where he helped himself to a pot cookie from a package at his feet. He and Albert had come prepared for their mission with stacks of blank ATM cards, procured online, upon which they had encoded stolen account data by swiping them through magnetic-stripe readers plugged into their laptops. Together the two friends began scurrying from ATM to ATM with the rigged cards, punching in the PIN numbers they had scribbled on the cards with a Sharpie. Soon the pockets of their cargo pants were bulging with twenties.
Raised in a down-and-out home with a shifting cast of characters, Patrick had started smoking pot at 11, left school at 15 and, shortly thereafter, was busted by the FBI for hacking an Internet service provider. With his lanky swagger and shorn blond hair, he bore a passing resemblance to Eminem in more ways than one: Patrick was also a furious intellect who always seemed one step away from self-immolation. An aimless loner and reliable hacker, he was quiet and laconic, except when provoked — in which case he was always up for a brawl. "If Patrick gets pushed to his limits, he's ready to throw down, a zero-to-90 kind of thing," Stephen says admiringly. "He's like the skinny guy you gotta watch out for, the one who's really fucking crazy."
Operation Get Rich began in Miami. Hackers recruited by Albert would drive up and down U.S. 1, a busy artery of strip malls and traffic lights, with their laptops open, searching for retail stores with open wireless networks, a technique called "wardriving." When they found an open network, they would park in a nearby lot or rent a hotel room close by and swiftly hack into the store's payment database. Then they would bide their time. From that point on, each time the store swiped a card, the hackers could capture its data and send it on to Albert. Albert would then forward the data to Patrick and other hacker allies across the country, who would decrypt and encode the data onto bank cards, cash them out at ATMs, and mail Albert's share to a drop box in Miami. Raised as a Catholic, Albert felt a pang of guilt about the people whose accounts he was raiding — "We're definitely going to hell for this," he told Patrick. But once the fraud was detected, Albert rationalized, the credit-card companies would restore people's money. "And he didn't give a fuck about the credit-card companies," says Patrick.
It was a decent plan but inefficient and risky: Each exploit was limited to a single store, and the hackers were sitting ducks out there in the parking lot for hours at a time. "Being parked out front with an eight-foot antenna isn't the most graceful way of getting in," observes Patrick. What Albert needed was a "sniffer code," a hacking program that would intercept payment data at a higher level. With a well-crafted code, he could follow the chain of network vulnerabilities up from a retail store and into its parent company's larger corporate database, capturing far more data with far less exposure. Albert lacked the technical skills to write such a code himself, but he knew exactly who to call for help. He fired off an IM to Stephen Watt.
By then, Stephen was working in the IT department at Morgan Stanley in New York, having graduated from college at 19, but he found the nine-to-five existence of cubicles and coffee breaks stifling. He lived for the weekends, when he would head to after-hours clubs and trip on LSD, which had quickly become a cornerstone of his lifestyle. He also spent his off-hours writing whatever computer code Albert asked for, including programs to break into networks at bizrate.com and Florida International University. Conventional ethics meant nothing compared to the brotherhood of the hackers. "I never had a moral problem giving him something," Stephen says. "As a friend, my willingness to please him may have overshadowed the way I saw my own moral responsibility." Despite having never lived in the same city, he and Albert had grown even closer over the years. At one point, when Stephen and his live-in girlfriend broke up, Albert had flown up from Miami to help him move, telling Stephen that he needed to drive the U-Haul because Stephen was such a lousy driver. "He spent more money getting to me than I spent on the move," recalls Stephen.
So when Albert asked him to write a sniffer code, Stephen was happy to oblige. He dashed it off in 10 hours — an eye blink, in hacker time — giving it the throwaway title "blabla." He knew better than to ask what Albert needed it for. "Albert was very careful not to give any of the people he worked with, myself included, too much information," Stephen says. "But we all knew what we were getting into."
Using Stephen's sniffer code, Albert and his crew could now hack their way into corporate networks and download debit- and credit-card numbers by the millions — along with user info, passwords and PIN numbers. Albert would then transfer the data onto servers that Patrick had set up in Latvia, Singapore, China and Ukraine, where associates Albert had recruited online would use the information to drain bank accounts and ATMs worldwide. By late 2005, the money being FedExed to Albert's drop box in Miami was arriving in stacks of up to $370,000. Operation Get Rich was paying off.
But Albert wasn't satisfied. Reaping the cash via ATMs, he realized, was too risky — after all, that's what had gotten him caught before. It would be safer and more profitable to simply sell the card numbers to other people and let them worry about getting the cash. So Albert enlisted the services of Maksym Yastremskiy, a 22-year-old Ukrainian cybercrime lord. ("The card 'dumps' are all run by Russians," says Patrick, "so they have the most clientele.") Yastremskiy arranged to have the payment data encoded onto bank cards, which were then sold at nightclubs all over the world for $300 a pop, of which Albert got half. To launder the money before wiring it to Miami, Albert used the offshore Internet-based payment systems WebMoney and E-gold. He had become the consummate businessman, even coining a name for his venture: Green Hat Enterprises. It was a huge, globe-spanning operation, with Albert at its epicenter. "He's just a genius at bringing people together," says Patrick.
Albert had a lot of players to keep tabs on, a feat made even more difficult by his insistence that they talk business only via encrypted IMs. He checked constantly on Yastremskiy — who, trotting across Eastern Europe, was seven hours ahead — asking for the latest sales figures and urging him to sell his cards "fast fast." Albert had two Russian hackers on the payroll as well, who did much of his online dirty work. In New York, there was a Barclays programmer who helped Albert launder as much as $800,000 but whose behavior was becoming so erratic that Stephen bought a drug-testing kit to threaten him with, at Albert's behest. Back in Miami, Albert was keeping a wary eye on a hacker employee who was starting to flash his newfound wealth a bit too conspicuously, spending close to six figures for a replica of a chain featured in the rap song "Diamonds on My Neck."
Business was booming. "I have a goal," Albert gleefully IM'd Yastremskiy. "I want to buy a yacht like Roman Abramovich" — one of the world's wealthiest men and owner of the world's largest private luxury boat. Albert started pulling in so much cash that he complained to Stephen that he had been forced to count $340,000 by hand because his money counter was broken from overuse. "Fucking BULLSHIT," he IM'd. "This is the 2nd money counter to break this year." Stephen responded with several pages worth of LOLs.
He and Albert talked every day, discussing everything — including Albert's double life as a government informant. At one point, Albert even brought Stephen down to the Secret Service's headquarters in Washington and introduced him to his handlers, who were interested in utilizing Stephen's technical skills. (Stephen declined their pitch.) In an IM, Albert reported that he had wowed federal agents with a presentation on how "malware" — malicious hacking programs — had evolved over the years.
"It's easy to impress these people," he boasted to Stephen. "And that's good."
As Albert's criminal empire grew, he began to indulge in the lifestyle of a minimogul — and he wanted his friends to share in all the debauched experience that his new wealth allowed. In 2005, Albert and his crew made their first trip to Winter Music Conference in South Beach, where they hit the Miami clubs. But the scene annoyed them: Bouncers with attitudes, waiting in line for drinks, sneaking into the bathroom to do drugs — it seemed beneath them. "We didn't want to rub up against the prickly shaved forearms of the guidos," recalls Stephen. "Even though there's great music, the crowd is garbage, people that look like fucking Ronnie and J-WOWW from Jersey Shore."
So when the friends headed back to South Beach the following year, it was with a different mind-set: They were finished partying with the masses. Now that they had money, they could control their own reality, and design it to their exacting standards. They booked a top-of-the-line suite at the Loews and stayed in all weekend, fortifying themselves with "magic milkshakes" — an insane concoction of cookies-and-cream Häagen-Dazs, skim milk, Ecstasy, mushrooms and LSD. Albert and his crew had long since left weed behind, finding it dull and unrewarding (though they kept a stash of top-quality bud for the girls who passed through their suite). These days, they were seeking the most intense drug experience possible, spinning the wheel of chemical roulette and hoping it landed them at some new, more advanced level of perception.
That summer, to celebrate his 25th birthday, Albert threw himself and Stephen a dual birthday bash in New York, at a cost of $75,000. He rented Sky Studios' penthouse duplex, with its soaring Manhattan view and rooftop pool, and he flew up his favorite pair of DJs, Oscar G and Ralph Falcon, from Miami. "The party was spectacular," recalls Sandra Martinetto, a friend of Stephen's who attended the party. "Everybody there was beautiful, glamorous, there was a good vibe — it was packed, like all of New York City was there." Some revelers drank champagne from flutes; others sipped water spiked with MDMA. Patrick Toey made the trip up from Virginia, making it the first night — after years of online friendship and criminal co-conspiracy — that he, Albert and Stephen were together in the same room. Stephen spent much of the party working the door, using his imposing height to make sure the right people got in and the wrong ones stayed out. Patrick, dehydrated from all the Ecstasy, couldn't figure out which water glasses were spiked and wound up guzzling them all, plunging himself into slack-jawed serotonin overload. Albert — always the practical, assured organizer — worked the room, having a blast. On the table, uneaten, sat a white birthday cake with the party's sponsor inscribed in green icing: "Green Hat Enterprises," their own private joke.
As Operation Get Rich continued, their tastes ratcheted upward. By summer 2007, when Albert spent a month in New York, he was dining on Kobe beef and $50-a-shot Johnnie Walker Blue Label. Late night, he and Stephen would head to a club — Cain, PM Lounge, Marquee, the Box — tripping on the psychedelic research chemical 2C-I and dropping $900 for a bottle-service table to draw the girls. When it came time to pay the tab, Albert would peel off a two-inch wad of cash and quote T.I.: "Rubber-band man/Wild as the Taliban." He took home a different girl any night he pleased.
Although Albert styled himself as a high-roller, at heart he remained a frugal immigrant's son. The whole time he was in New York, he crashed at Stephen's one-bedroom apartment in Greenwich Village because he didn't want to waste money on a hotel. "Fuck all the flashy bullshit," he would tell Patrick. "Just getting by is enough when you know you have all that money stored somewhere." He flew coach, bought himself a modest one-bedroom condo in Miami and went to a free clinic when he needed to see a doctor — even though, as he told Stephen, it meant rubbing elbows in the waiting room "with people that look like Trick Daddy." The same guy who spent $75,000 on a single party would spend an hour bargain-shopping online for a $300 printer. "Don't waste your money on a plumber — I can do it," he assured Stephen, repairing his friend's toilet and doing a half-dozen other fix-it projects during his month-long stay.
On the surface, Albert seemed as in control as ever, making everything look effortless: always in motion but never rushed, always finding time to squeeze in his workouts to fine-tune his now-bulging muscles. But the stress of his double life was starting to get to him. As a criminal mastermind, he was keeping daily tabs on a growing constellation of international associates who were stealing data worth millions of dollars. At home, however, he maintained a conventional family life: helping his dad with his landscaping work, doting on his toddler nephew, wooing his on-and-off girlfriend, Jenny Bulas, and her circle of Miami-princess friends. He went to bed each night with his laptop beside him, plugged in but with the battery removed — "just in case," he said, fearing a police raid. Some nights he would be too wired to sleep, and Stephen would play Chopin's nocturnes on his upright piano to lull his friend into slumber. "I used to joke with him, 'If only you were a woman,'" recalls Stephen.
On top of everything, Albert was still working as a federal informant, drawing what he told Stephen was an annual salary of $75,000. (When friends back home asked what he did for a living, he would say vaguely that it involved something computer-related for "the government.") He gave lectures to federal agents on cybercrime and had Stephen and Patrick write code that his handlers could use in their undercover operations. "Me and Albert talked all the time about how fucking crazy it was that he was able to do all this while he was working for the Secret Service," recalls Patrick. "We'd be laughing about it. But I don't know how he dealt with all the stress, living these separate lives."
His double life was almost blown when another informant told the feds that Albert was using the screen name "k1ngchili" to commit cybercrimes. To disprove the charge, Albert paid a ringer to log in as "k1ngchili" whenever he showed up at Secret Service headquarters. Working as an informant was crucial to his criminal enterprise: Prosecutors later admitted that Albert used government intel to tip off his friends when they popped up on the FBI's radar. Patrick says Albert once warned him to stop selling stolen data on a certain Internet forum, since it was in the cross hairs of an investigation that was about to end in arrests.
It was a lot to juggle — and as Albert's crime operation grew, so did everyone's anxiety. In 2007, when Stephen, Albert and Patrick met up in South Beach for Winter Music Conference, the tension hit a new high. Patrick spent the weekend in agony, curled up on a rollaway cot with an ulcer. At one point, Stephen, in a drug-fueled frenzy, began freaking out: He had recently discovered that he had been the victim of credit-card fraud; someone in China had taken out a $4,000 cash advance on his American Express card.
"That fucking Chinaman!" Stephen shouted, standing on the coffee table in bare feet and shorts, balling his fists to the sky. "I am going to hunt him down to the end of the Earth! I will take a sword and drive it through his spine!" Albert and Patrick laughed hysterically as the rant went on and on. Then Stephen suddenly turned to Albert.
"If I found out it was you—" Stephen growled. He thought he saw a shadow of concern cross Albert's face. "Seriously, dude," Stephen said. "I want to know if you had anything to do with this."
Patrick froze, but Albert was as cool as ever. "Hold on a second," he told Stephen, pulling out his laptop. "What's your card number?" Stephen flicked his wallet at Albert and left the room to snort another line. When he returned, Albert and Patrick were all smiles.
"You found it?" Stephen asked.
"Surprisingly enough, I did not have your card," Albert said pleasantly. "I searched everything, and it wasn't in there."
"OK, we're cool." Stephen took a deep breath. "It's only me and the Chinaman now." And just like that, everything was good again.
Patrick looked up yearningly at the dropper bottle atop the fridge. Its label advertised a breath freshener, but Patrick knew it was full of liquid LSD. Unfortunately, he had tons of work to do for Albert — he needed to focus. With a sigh of regret, he turned back to his laptop.
By the fall of 2007, Patrick was living in Miami, staying in Albert's condo. Back in Virginia, he'd been living with his mother and running low on money, as always — prosecutors would later say that despite his essential role as Albert's "trusted subordinate," Patrick made only $80,000 from Operation Get Rich. "I thought going to Miami would be kind of fun," he recalls. A few months before, he had driven down in his Acura Integra — the first car he'd ever owned, proudly bought with his criminal proceeds — only to discover that Albert's condo was no swinging bachelor pad but a sorry-looking dump with no blinds on the windows, no sheets on the bed, and little furniture other than a cheap orange couch and a tiny TV. It was located in a Spanish-speaking neighborhood of recent immigrants; within days, someone had stolen Patrick's car. He was stranded, didn't speak the language — and all Albert did was steadily prod him via IM to make sure he was on top of his workload.
Patrick's job was to probe corporate networks for vulnerabilities to a malware attack known as a "sequel injection," which overwhelms the victim's system with meaningless commands until the system gives up and defaults to using the malicious code. As he sat in front of his laptop all day, mindlessly tapping away, he sent a steady stream of IMs to Stephen complaining about the tedium. "Finding these vulnerabilities, you can train a monkey to do it," Patrick says. "But at the same time, hacking is about the path of least resistance. There's no need to overly complicate things if a simple sequel injection can work." To ease the boredom, Patrick kept a full stash of amusements on hand — dozens of Ecstasy pills, an eight ball of coke, a half-liter of ketamine, shrooms, a vial of acid — and spent his off-hours wandering around Albert's barrio in an altered state. "Don't send any more drugs to Patrick," Albert scolded Stephen. "He's been hacking a lot of shit lately" — that is, doing good work.
Albert needed his best soldier in top form: Operation Get Rich was shifting into its most ambitious phase. Although Patrick's attacks were simple, the overall scheme that Albert had devised was quite sophisticated. Rather than sitting outside shopping malls to probe every store within striking distance for vulnerabilities, Albert and Patrick now reviewed lists of Fortune 500 companies to find juicy targets. Then, to find out what kind of computer systems a firm used, they would swing by one of its retail stores and scope out the terminals at the checkout counters. After hacking into corporate databases through company websites, they unleashed Patrick's malware, which they had pretested against 20 different anti-virus programs to make sure its presence wouldn't be detected. Using Stephen's sniffer code — which he and Patrick had retooled in South Beach after Albert's incessant nagging — they then downloaded the credit-card data in small, well-timed chunks, so as not to alert a victim's server administrator with unusual amounts of activity. When they were done, they neatly erased their digital footprints as they exited the system and installed invisible "back doors" to provide them with future access. They had thought through every angle, right down to the chain of 20 encrypted IP-address proxies they used to obscure their own location.
Still, when Patrick stopped to consider what they were doing, he couldn't help but panic. ("Operation Get Busted or Go to Prison Tryin'," he calls it.) Albert reasoned with him to chill out. After all, he told Patrick, they weren't going to stay in the game forever. Albert's long-term plan was to save enough of their criminal earnings to buy a business — maybe a tire shop — and go legit. On his laptop, Albert jotted a note to himself: "15 million is what I want to have total before I start moving to 2nd phase of laundering it."
Even when warning signs appeared, Albert brushed them off. He might have been the world's leading cybercriminal, but he was also a federal informant, pulling down a paycheck from the U.S. government; he knew from firsthand experience that the feds were tripping over their own feet when it came to catching hackers. One day in March 2008, Albert and Patrick were on their way back from a recon mission at a Miami big-box store when Albert, speeding down the highway in his BMW with D. Ramirez on the stereo, suddenly turned the music down.
"Yo, I think we're being followed," Albert said, eyes on the rearview mirror. Patrick laughed nervously in disbelief, but as Albert slowed for their exit, the faded-gold Camaro several car lengths behind them exited too. Albert drove down a street with two right-hand turning lanes and pulled in behind a bus that was making a stop. "If they get behind us now," he said, "they're definitely tailing us." The car slowly pulled behind them.
"Shit," Albert muttered. When the bus lumbered forward, Albert made the right turn — and then another sudden right down a side street, followed by three more quick rights, until he had somehow maneuvered behind the Camaro. ("He's a ridiculously good driver," says Patrick.) As they followed the car that had been tailing them, Albert took out his phone, called Stephen in New York and ordered him to call one of his Secret Service contacts. "You gotta ask him this question," Albert told him. "Who's following us? Is it the boys in blue or the boys in green?" Blue, for the local cops, could be trouble. But green, for the Secret Service, would be even more worrisome. Why would his own handlers be tailing him?
Stephen relayed the question, and a few minutes later, he was yelling the answer in Albert's ear: "He said it's the boys in green! The boys in green!"
"OK," said Albert, smooth as could be. He stopped tailing the Camaro and drove back to the condo, where he sat down to think. In the end, Albert decided it was nothing to worry about. "Remember," he reminded Patrick as they helped themselves to the vial of LSD. "It's not what they know, it's what they can prove."
Albert was arrested in May 2008 by a team of federal agents. They found him holed up in the National, a luxury hotel in South Beach, with a gorgeous six-foot-tall volleyball player he'd been seeing on the side. Also in the hotel room were a Glock 27, two laptops and $22,000 in cash. Buried in the backyard of his parents' house, agents found a barrel with $1.1 million in cash wrapped in plastic bags.
The feds had been tipped off after Maksym Yastremskiy, Albert's Ukrainian card-hawker, was arrested outside a Turkish nightclub in July 2007. When agents got a look at Yastremskiy's laptops, they found millions of stolen card numbers, a program used to hack into corporate retailers — and logs of encrypted chats with Albert. Once they cracked the code, investigators were able to tie Yastremskiy and Albert, along with an Estonian hacker nicknamed "Jonny Hell," to the siphoning of 5,000 card numbers from a Dave & Buster's, a security breach that cost the restaurant chain $600,000 to repair. Ironically, it was this relatively small hack — not the cybercrime of the century — that Albert originally found himself busted for a year later. But once the feds opened up his computers and began connecting the dots, they were astounded by the scope of the operation their trusted informant was running. The government indicted 11 members of Green Hat Enterprises from five countries, accusing Albert of reaping $1.6 million from his worldwide enterprise. Prosecutors estimated that the scheme cost its corporate victims, banks and insurers $200 million, but they maintain that the economic damage is likely far greater. "The magnitude of the loss is enormous," says Stephen Heymann, a U.S. attorney who prosecuted the case. "Because of the impact on so many thousands of businesses and banks and millions of people, it's impossible to quantify the full vastness of the crime."
The morning of Albert's arrest, Patrick Toey woke up at the Miami condo with half a dozen agents pointing tactical weapons at him. He started cooperating even before speaking with a lawyer. "I don't feel good about it," he says, sitting in his mother's house in Virginia Beach days after his sentencing in April. "It's not something I really wanted to do. Albert was one of my best friends. From my perspective, he still is. But taking the rest of my life into consideration, it was kinda something I had to do." For his cooperation, which the government cited as crucial in bringing down Albert's operation, Patrick received a prison sentence of five years, after facing a maximum of 22. Under the terms of his pre-prison release, he is forbidden from using a computer for any reason — not even to e-mail his fiancee, whom he had met online. "I don't know if Albert understands," he says quietly. "Even though if it was me, I definitely wouldn't forgive me for what I did."
Stephen Watt pleaded guilty to writing the sniffer code that proved key to Albert's operation but continues to insist that he never knew it was being used for illegal purposes, noting that he made no money from Albert's crimes. (The uncompensated nature of his devotion stunned investigators; questioning his motives, they asked Patrick whether Stephen and Albert were lovers.) The prosecution argued that Stephen must have known what Albert was up to: After all, the two spoke or IM'd daily, sharing "all their exploits: sexual, narcotic and hacking," and openly discussed Albert's sale of stolen card data. The judge agreed, sentencing Stephen to two years in prison and ordering him to pay a share of the $172 million restitution.
A few weeks after the judge's ruling, stomping around the Manhattan apartment he owns with his new wife, a real estate agent, Stephen bristles at the suggestion that he is anything other than a black-hat hacker. His motives, he insists, are ideological, not financial. "I'm a computer criminal, not a thief," he says. "That's my statement, and I'm sticking to it." For the next five hours, he offers a complete tour of the alarmingly neat apartment — books arranged by subject, clothes lined up by color — pausing only to snort ketamine off the top of his bookshelf, where he keeps a minipharmacy of pills, powders and vials. He shows off credit-card offers he's been getting on Albert's behalf — "Albert Gonzalez, you have been pre-approved!" — ever since Stephen added him as a secondary cardholder on his AmEx.
"I walked a dangerous line," Stephen says, coming precariously close to a confession. "I did things I shouldn't have, and honestly, I had no problem participating in or enjoying the spoils of Albert's game. Am I morally responsible? Do I bear some guilt in this? Yes. Do I have any apologies to make?" He gives a derisive snort. "Uh, the answer is definitely no."
Albert, ever the realist, pleaded guilty and cooperated fully with the feds as soon as he realized that Patrick had turned state's witness. In return, after facing a maximum of life in prison, he was sentenced to 20 years — the longest punishment for a computer crime in U.S. history. "I never gave a thought to the millions of people whose lives I impacted," a penitent Albert told the judge at his sentencing, his dream of being a green hat replaced by olive-green prison garb. "I'm humbled by the 22 months I've spent in prison," he continued, as his parents wept in the front row. "I have no one to blame but myself."
It was a moving display of remorse. But one has to wonder if Albert was being more forthright in a letter he wrote me from prison, politely declining to share his story. "I'm fearful of what the DOJ's reaction may be if I was to go on record with the events of the past 10+ years," he wrote in his neat, spiky printing. "The motherfuckers have already proven to be untrustworthy and vindictive." Always the loyal friend, he added a concerned postscript: "Is Stephen OK? I haven't heard from him in two weeks."
To prepare Stephen for jail, Albert sent his friend a six-page typewritten letter explaining in detail how prison works: how the different races interact, how to properly climb onto a top bunk without offending your cellmate, even how to fart without stinking up the cell. He called it, with simple pragmatism, "A Guide to Being Successful in Jail." "Think Switzerland," Albert wrote. "When you're like Switzerland you have no loyalty to anyone or any group. Your loyalty should be to yourself, and your motto should be Google's: Don't do evil." The key, he added, is to show other prisoners that "we're str8 shooters who are highly intelligent. For some reason, people respect you if your IQ is over 130. You'll know you've reached this point when someone turns to you and says, 'Yo Stephen, when was JFK assassinated?' "
Even behind bars, Albert was still studying the angles, calculating the odds, figuring out how to hack the system to his advantage. "I hate the first couple of weeks when you arrive at a new facility, because it reminds me of the first couple weeks of school," Albert continued in his letter to Stephen. "You don't know anyone, and if you're anything like I was in school, anti-social, it's not enjoyable. The good thing is, we're one of the coolest motherfuckers on the planet, so we don't have a hard time meeting people once we're confident of our surroundings."
Then Albert's new surroundings forced him to cut his letter short. "I'm being rushed to finish because it's last call to get into the showers," he told Stephen. "Keep your head up and don't fear this. It's really not that hard. Remember, Switzerland."
From The Archives Issue 1106: June 10, 2010


Read more: http://www.rollingstone.com/culture/news/sex-drugs-and-the-biggest-cybercrime-of-all-time-20101111#ixzz3bwIaoDik
Follow us: @rollingstone on Twitter | RollingStone on Facebook

Stephen Watt

Former Morgan Stanley Coder Gets 2 Years in Prison for TJX Hack
THE TWO GREAT friends talked every day and shared information about all of their exploits — sexual, narcotic and hacking — according to prosecutors. Now another thing they’ll have to share information about is their experience in federal prison.


swattClick to Open Overlay Gallery

While accused TJX hacker kingpin Albert Gonzalez awaits a possible sentence of 17 years or more in prison, one of his best friends and accomplices was sentenced on Tuesday in Boston to two years for his role in what the feds are calling “the largest identity theft in our nation’s history.”
Stephen Watt, a 25-year-old former Morgan Stanley software engineer, pleaded guilty last December to creating a custom sniffing program dubbed “blabla” that Gonzalez and other hackers used to siphon millions of credit and debit card numbers from TJX’s network. The breach cost TJX $200 million, according to its 2009 SEC filing.
Watt’s lawyer had sought a sentence of probation.
But instead the 7-foot-tall coder who once had a bright professional future got two years in federal prison and three years of probation. A spokeswoman for the U.S. attorney’s office in Massachusetts said the judge also ordered Watt to pay restitution to TJX in the amount of $171.5 million.

According to a source familiar with the case, U.S. District Judge Nancy Gertner indicated that her sentence was based in part on the enormity of the harm that was caused to the public by the crime and Watt’s undeniable assistance in causing that harm.
“She believed in the end that a probation sentence would not be sufficient to satisfy the general deterrence to prevent harm to the public,” the source said.
His lawyer, Michael Farkas, declined to comment on the sentencing.
Farkas asserted in his court filings that Watt was a minor and peripheral player in the credit card theft ring that Gonzalez dubbed “Operation Get Rich or Die Tryin” that began in 2005 to breach numerous vulnerable national retailers and card processors.
Watt, who graduated from high school at 16 with a 4.37 grade point average, was driven by intellectual curiosity and friendship, not greed, his lawyer said, and had no idea his program would be put to criminal use.
Prosecutors never alleged that Watt received money for the software he wrote, or directly profited from the hacks. But they brandished more than 300 pages of chats the two friends exchanged that belied Watt’s stated ignorance.
“You have got to convince typedeaf to do some work for me,” Gonzalez wrote Watt in one of them, referencing the handle of another hacker. ”If he was able to hack some euro dumps we can make a fortune. I hacked a place and took ~30k euro dumps and this last week I made ~11k from only selling ~968 dumps.” (Dumps are the carding underground’s term for credit or debit card magstripe data, including account numbers.)
As Gonzalez and his accomplices hacked target after target, he sent Watt links to news stories describing a tidal wave of debit fraud spreading around the world.
Authorities found Watt’s customized code stored on a server Gonzalez leased in Latvia, as well as 16.3 million stolen card numbers. Another 27.5 million stolen numbers were found on a server in Ukraine.
They said Watt was a witness to the ill-gotten gains his code produced. He attended a $75,000 birthday party Gonzalez threw for himself, and discussed launching a nightclub with Gonzalez’s backing. Gonzalez worried that because his money was mostly in cash, it would draw suspicion to the club. He offered to produce a check for $300,000 for Watt to make the transaction appear more legitimate.
Watt and Gonzalez met online when Watt was still in high school and bonded over a shared fascination with computers. While still a teen, Farkas says, Watt worked for Florida software firm Identitech. He was hired by Morgan Stanley in New York 2004 earning $90,000 as a software engineer.
After he moved to New York, he began experimenting with drugs and frequenting clubs. He left Morgan Stanley in 2007 for a higher-paying job at Imagine Software, developing real-time trading programs for financial firms, earning about $130,000.
This is where he was working on Aug. 13, 2008, when authorities swooped in to search the premises. Watt, who is married, was fired and is now banned from working in the securities industry.
Currently unemployed, his lawyer says he’s been living in an apartment his mother paid off while awaiting sentencing.
“Watt will have to start over, and hope that his skills not only will land him on his feet,” Farkas wrote in a court filing earlier this year, “but that they will do so in a field that is at least somewhat as financially promising as the career that he has lost.”
See also
EARLY LAST WEEK, before the suspects were identified in the Boston Marathon bombings, a U.S. probation officer and his supervisor visited the Manhattan apartment of programmer Stephen Watt with a question: Did Watt happen to know anything about the attack?
“He said, ‘We want to ask you about this Boston thing. I think you know what we’re talking about. I’m talking about the attacks,'” Watt recalls. “Then he said, ‘If you know any rumors that you heard about beforehand or even afterwards, please [tell us] through your lawyer.'”
They told Watt they weren’t accusing him of anything, just that he should come forward if he had any information. Watt and his wife were shocked by the random inquiry. But in some ways, it’s part and parcel of Watt’s new life as a hacker ex-con.
Watt, a striking 7-foot-tall software engineer, oncehad a bright future coding software for a maker of real-time stock trading systems. Then a small packet-sniffing program he wrote for a friend got him embroiled in a multi-million-dollar bank card heist that netted him a two-year prison sentence and a hefty restitution judgment. Watt went from having a promising career on Wall Street to living in a grim cell in a high-rise prison in Seattle, where blacked-out windows blocked the natural light, and the absence of outdoor exercise facilities meant he didn’t breathe much fresh air for two years.
Now out of prison after serving his sentence, his former career in shambles, he’s trying to put the pieces of his life back together, while suffering the indignities that linger with newly-released prisoners.

Stephen Watt/Photo courtesy Michael FarkasClick to Open Overlay Gallery

He’s barred from working in the securities industry for life and, for the length of his three-year probation, can’t use any computer unless it’s monitored by the government — though he received special dispensation to use a computer at work for his current job as a web developer. Ten percent of his gross salary goes to pay off restitution, and with his earning ability greatly reduced, he has trouble meeting the basic living expenses for him and his wife.
Obtaining work following a felony conviction has naturally proven to be difficult. He got the web job through a friend of a friend.
“Definitely no one wants to hire me. I didn’t have a list of offers to choose from. I tried to contact some recruiters, and they had no interest in taking me on,” he tells Wired.

In the wake of the recent harsh prosecutions of Aaron Swartz and Andrew Auernheimer under the Computer Fraud and Abuse Act, Watt’s experience provides a look at life after a felony hacking conviction and what he calls the “near-impossibility of thriving in a post-conviction life.” It was these post-conviction prospects that friends of Swartz say drove him to commit suicide in January before his trial for downloading academic documents.

zen consultora

Blogger Widgets