Case Study John Brennan

Improved Essays
1. Introduction
Last year on October 12, Director of Central Intelligence of America (CIA) John Brennan’s American On-Line (AOL) e-mail account was hacked by a probable high school student. News of the incident was first reported by the New York Post after the teenager established communication with the newspaper the week before. Data breach activity took place against Brennan by the teenager who was social engineering to take control of Brennan’s AOL e-mail account. The hacker wasn’t working alone there were two other people helped him on the breach. Pretending to be a Verizon (A GSM operator company in the US) technical worker, they tricked another Verizon worker in order to get Brennan’s some personal data such as last four digits of the bank card number. With the information they obtained from Verizon, they did not have any difficulties resetting the AOL e-mail account password. It was a shocking, disturbing and annoying event experienced
…show more content…
After they found out that he was using Verizon, they advanced the second phase: Social Engineering. One of them posed as a Verizon technician and called Verizon company to reach more detailed information about Brennan’s account. He told them he works for Verizon and he has a customer on scheduled callback. Adding that he was unable to access Verizon’s customer database on his own because “ tools were down.”After that, Verizon company representative asked for vCode(a code which is assigned each of employees of Verizon), and the hacker gave them a made up code. Then, Verizon provided the data easily as they were seeking for: “four digits PIN, AOL e-mail address,the backup mobile number on the account and the last four digits of bank card.” That was the greatest vulnerability which hackers exploited on that occasion. It was done just for a vCode. Verizon should have authenticated the caller to give personal

Related Documents

  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The source stated that “Comerford had people arriving at his home at odd hours, and he would come and go in the middle of the night.” The source provided the FBI with Comerford’s cell phone number and wireless provider. The FBI decided to corroborate the anonymous tip. The investigation made use of recently purchased surveillance technology known as “the Chum” that captures the IMSI of cellphones. IMSI-catching technology, such as the Chum, enables its users to obtain data from cell phones that reveals a phone’s location.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    New technologies are putting more pressure on the boundaries of privacy. New ways are emerging that aid in tracking private information on individuals. No matter what new technology emerges, individual privacy rights should be respected at all levels. Americans are concerned of how to maintain an equilibrium between their personal privacy rights and the need for government to track potential terrorist threats since Edward Snowden leaked National Security Agency's (NSA) documents which included collections of information regarding data from cellphone and internet of millions of Americans. Freedom, privacy and safety are the rights of Americans and should not be compromised to confirm safety from terrorism.…

    • 542 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Case Study: J. W.

    • 180 Words
    • 1 Pages

    Case Study Prompt: J.W. is a 40-year-old man who presents to his doctor's office for a checkup. J.W. is 5'11" tall and weighs 305 lbs. His blood pressure is 140/90 mm Hg. He complains of frequent fatigue and headaches. 1.…

    • 180 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Christopher Pittman Case In February 2005, Christopher Pittman was convicted in Chester country, South Coralina, of the November 2001 murders of his grandparents. Pittman ended up admitted to the crime, that was undeniably violent and brutal. Pittman had fired on both grandfather and grandmother with his father's shotgun as they were laying down sleeping in their beds. After he shoots them he then set their home on fire and fled the scene in his grandfather's truck with some cash and weapons.…

    • 381 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    As Palfrey’s lawyer, Montgomery Blair Sibley, mounted his defense in the case, he was granted permission to identify 5,902 phone numbers that showed up in Palfrey’s records. As part of her defense, they offered to expose the clientele by releasing phone records. Verizon Wireless aided…

    • 578 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Case Study: Don Marshall

    • 263 Words
    • 2 Pages

    Plaintiff Don Marshall, who is filing a medical malpractice claim, is suing defendants John Smith M.D. and Pat Jones P.A.C. The plaintiff sustained a work injury and came to the ER at Laskey County Memorial Hospital; there he was prescribed three days worth of tramadol. He then visited Smith & Smith Medical Center for treatment. P.A. Jones prescribed him more tramadol and followed up with an appointment eight days later, Mr. Marshall described a 50% improvement with his symptoms. At that appointment a Flector patch was applied to reduce acute pain.…

    • 263 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Hi Cindy, Connie had some additional questions regarding James Watson. The scope of work in the contract does not match the MOU or what the pipeline is doing. In the current contract, James Watson is only providing medical services. How was James Watson selected and by who? Connie needs to confirm the next steps whether this would be a RFP or a sole source.…

    • 65 Words
    • 1 Pages
    Decent Essays
  • Great Essays

    Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement…

    • 2196 Words
    • 9 Pages
    Great Essays
  • Superior Essays

    Government Surveillance in America On September 11, 2001, the United States was attacked by terrorist groups in New York City by a terrorist group that cost thousands of lives. The acts of terrorism that happened in 2001 were followed by the U.S House writing an act that would be called “Provide Appropriate Tools Required to Intercept and Obstruct Terrorism” or “The Patriot Act”. This act was eventually passed and put into effect. It being passed gave government intelligence agencies the power to intrude into personal lives of Americans.…

    • 1122 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    With super crunching and data analysis physicians have more access to data than they ever had before. However perhaps due to old traditions and habits dying hard physicians are reluctant to truly follow the analysis and data that super crunching brings. One significant example the book brings up on Super crunching helping the medical field is with Don Berwick and his campaign to save 100,000 lives. Don Berwick based his campaign on the use of “evidence-based machine” (EBM). The idea was that the treatment given should be the best treatment, the best treatment would be determined from past data analysis.…

    • 1249 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Case Study Tommy Murphy

    • 751 Words
    • 4 Pages

    Tommy Murphy is a nine-year-old boy who has been medically diagnosis of AD/HD and he takes medication for. Tommy is in the 4th grade and attends Parkview Elementary School. He currently has an Individual Educational Plan because of a learning disability. He also receives speech services at school twice a week. Tommy is currently placed in a Special Day Class (SDC)…

    • 751 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Case Study: J. M

    • 1614 Words
    • 6 Pages

    J.M is a 65 year-old, White American, German descent, upper-middle class male. He is married and father of three (three boys and a daughter; ages 30 33 and 35). He got married three times, and he has been married with his last wife for five years. He was born and raised in Wisconsin, and never lived in another place. He enrolled a couple of universities and departments, but he finally decided to go to the Milwaukee School of Engineering.…

    • 1614 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Introduction The most powerful and prominent force in the world has without a doubt has been, the rapid advancement of technology following the industrial revolution. From the introduction of the steam engine by James Watt to the mass expansion of railway lines, technological advancement has increased productivity and globalization exponentially. By breakthroughs in communication, transportation, and information technology, the world in which we reside has become unrecognizable to what it was 200 years ago. This essay encompasses these three ways in which technological advancement has completely restructured and revamped the world of as we know it. Cementing itself as the most powerful force on the planet.…

    • 1516 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays