Cyber Thief Given Eight Years
Seems like a light sentence to me for breaking into a system that houses such critical information. I think this highlights a problem that data and commercial systems are not classified by sensitivity- meaning that crimes against more sensitive data would be given harsher sentences that those against non-critical systems. I wonder what this hacker did with his data? From CNET here:
A bulk e-mailer who looted more than a billion records with personal information from a data warehouse has been sentenced to eight years in prison, federal prosecutors said Wednesday.
Scott Levine, 46, was sentenced by a federal judge in Little Rock, Ark., after being found guilty of breaking into Acxiom’s servers and downloading gigabytes of data in what the U.S. Justice Department calls one of the largest data heists to date. Acxiom, based in Little Rock, says it operates the world’s largest repository of consumer data, and counts major banks, credit card companies and the U.S. government among its customers.
In August 2005, a jury convicted Levine, a native of Boca Raton, Fla., and former chief executive of a bulk e-mail company called Snipermail.com, of 120 counts of unauthorized access to a computer connected to the Internet. The U.S. government says, however, there was no evidence that Levine used the data for identity fraud.
Prosecutors had asked for a longer sentence, but expressed satisfaction with an eight-year prison stay. “This sentence reflects the seriousness of these crimes,” said U.S. Attorney Bud Cummins of the Eastern District of Arkansas. It also includes a $12,300 fine; restitution has not yet been determined.
According to court documents, Levine and others broke into an Acxiom server used for file transfers and downloaded an encrypted password file called ftpsam.txt in early 2003. Then they ran a cracking utility on the ftpsam.txt file, prosecutors said, discovered 40 percent of the passwords, and used those accounts to download even more sensitive information.
In early 2003, the most common vulnerabilities on servers that would house this type of information were SQL Injection bypasses, or probable backdoors leftover from the Code Red/Nimda worms. Regardless, the thief took a sam file from the server.
When it was in operation, Snipermail.com drew fire from antispam advocates for falsely claiming to operate only “opt-in” lists. The company’s now-defunct domain shows up on the Register of Known Spam Operations compiled by the Spamhaus Project, and dozens of sightings of spam from Snipermail.com appear on Usenet’s news.admin.net-abuse.sightings discussion group.
Acxiom has said that after the 2003 intrusion, it improved its intrusion detection, vulnerability scanning and encryption systems.
This is not the first prosecution to arise out of poor security practices on Acxiom’s file transfer protocol server (FTP). An Ohio man named Daniel Baas previously pleaded guilty to illegally entering Acxiom’s FTP site. That investigation led federal police–including the FBI and Secret Service–to Levine, according to the Justice Department.
On Axciom’s website, they have a special Cyber Security Statement Here. It says,
Acxiom maintains security procedures to help ensure that information will not be made available to any unauthorized person or business. We use a variety of multi-level security systems to control access to our services and information products. All users at client locations, as well as all Acxiom associates, must have the appropriate access codes and be expressly authorized to access certain data and applications.
Nothing assures someone more than locking the barn doors after the horses have escaped.