||Oracle Tips by Burleson
Chapter 5 -
All About Cybercrime
Real World Case: Website
“In your case, the
hacker placed the profanity on your header as a signal to other
Their M.O. is
to hack a site, steal the shopping cart credit card numbers and then
alter the header to prove that they have the stolen goods.
post an offer on a chat board, offering the header as proof and then
selling the credit card numbers.
In your case,
the thief is probably stealing from the buyers, offering-up fake
Apparently there is no honor among thieves.
The FBI agent continued:
tracked these cases before, and they almost always originate in a
the matter, even when we trace the hacker it usually is a minor, and
they are very difficult to prosecute.
frustrating and we can only help victims who have suffered large
She informed him that he could continue to
pursue the matter with an attorney, and the next step would be to
obtain a subpoena from a U.S. Federal District court to get the
account name, mailing address and the telephone number used by the
He could then serve it on the Montreal ISP. A
reciprocity agreement requires Canadian citizens to comply with U.S.
court orders. Of course, the ISP could always claim that they lost
the record of entries.
He figured if the ISP knows the account holder
and the phone number that they used, he should be able to trace it
directly to the house where the attack originated! Not so fast, the
FBI agent cautioned.
likely that the hacker used an open wireless connection and the home
associated with the phone number will be an innocent third-party.”
Download your Oracle scripts now:
definitive Oracle Script collection for every Oracle professional DBA