SlideShare a Scribd company logo
1 of 2
Case Study: The T-Mobile Hack
Recently a hacker was able to access the wireless carrier T-
Mobile’s network and read the private emails and personal files
of hundreds of customers. The government revealed that emails
and other sensitive communications from the Secret Service
agent investigating the incident were among those obtained by
the hacker. The agent, Peter Caviccha, was apparently using his
own personal handheld computer to view emails while
travelling. His supervisors were apparently aware of this, since
they frequently directed emails to his personal email address
while he was travelling. The agency had a policy in place that
disallowed agents from storing work-related files on personal
computers. The hacker was able to view the names and Social
Security numbers of 400 T-Mobile customers, and they were
notified in writing regarding the security breach. T-Mobile has
more than 63 million customers in the United States. The
network attack occurred over a seven-month period and was
discovered during a broad investigation by the Secret Service
while studying several underground hacker organizations.
Nicolas Lee Jacobson, a computer engineer from Santa Anna,
California, was charged in the cyberattack after investigators
traced his online activities to a hotel where he was staying. He
was later arrested and then been released on a $25,000 bond.
1. What role did the culture displayed by Caviccha and his
supervisors play in the case?
2. Were additional charges warranted against the agent if
agency rules were violated?
3. Which type of culture, hierarchical or hybrid, was
displayed, and did the type of culture play a role in charges
against the agent?
4. What additional security measures are required to prevent
eavesdropping on wireless communications?

More Related Content

More from MorganLudwig40

For the last question set up and diagram an Incident Command System .docx
For the last question set up and diagram an Incident Command System .docxFor the last question set up and diagram an Incident Command System .docx
For the last question set up and diagram an Incident Command System .docxMorganLudwig40
 
For the Final Project, you provide an in-depth analysis of schizophr.docx
For the Final Project, you provide an in-depth analysis of schizophr.docxFor the Final Project, you provide an in-depth analysis of schizophr.docx
For the Final Project, you provide an in-depth analysis of schizophr.docxMorganLudwig40
 
For the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docxFor the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docxMorganLudwig40
 
For the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docxFor the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docxMorganLudwig40
 
For the assignment attached, i need 3-4 pages of material added on t.docx
For the assignment attached, i need 3-4 pages of material added on t.docxFor the assignment attached, i need 3-4 pages of material added on t.docx
For the assignment attached, i need 3-4 pages of material added on t.docxMorganLudwig40
 
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docxFOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docxMorganLudwig40
 
For Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docxFor Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docxMorganLudwig40
 
For professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docxFor professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docxMorganLudwig40
 
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docxFor Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docxMorganLudwig40
 
For more than five decades, Robin M. Williams, Jr. served as profess.docx
For more than five decades, Robin M. Williams, Jr. served as profess.docxFor more than five decades, Robin M. Williams, Jr. served as profess.docx
For more than five decades, Robin M. Williams, Jr. served as profess.docxMorganLudwig40
 
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docxFor Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docxMorganLudwig40
 
For Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docxFor Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docxMorganLudwig40
 
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docxFOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docxMorganLudwig40
 
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docxFor Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docxMorganLudwig40
 
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docxFor Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docxMorganLudwig40
 
For informed consent to occur, there must be a shared decision-makin.docx
For informed consent to occur, there must be a shared decision-makin.docxFor informed consent to occur, there must be a shared decision-makin.docx
For informed consent to occur, there must be a shared decision-makin.docxMorganLudwig40
 
For each of the four variables listed above, identify the level of m.docx
For each of the four variables listed above, identify the level of m.docxFor each of the four variables listed above, identify the level of m.docx
For each of the four variables listed above, identify the level of m.docxMorganLudwig40
 
For every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docxFor every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docxMorganLudwig40
 
For each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docxFor each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docxMorganLudwig40
 
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docxFollowing the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docxMorganLudwig40
 

More from MorganLudwig40 (20)

For the last question set up and diagram an Incident Command System .docx
For the last question set up and diagram an Incident Command System .docxFor the last question set up and diagram an Incident Command System .docx
For the last question set up and diagram an Incident Command System .docx
 
For the Final Project, you provide an in-depth analysis of schizophr.docx
For the Final Project, you provide an in-depth analysis of schizophr.docxFor the Final Project, you provide an in-depth analysis of schizophr.docx
For the Final Project, you provide an in-depth analysis of schizophr.docx
 
For the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docxFor the final Portfolio Project, create a presentation about an even.docx
For the final Portfolio Project, create a presentation about an even.docx
 
For the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docxFor the final Portfolio Project, write a paper about an event in a p.docx
For the final Portfolio Project, write a paper about an event in a p.docx
 
For the assignment attached, i need 3-4 pages of material added on t.docx
For the assignment attached, i need 3-4 pages of material added on t.docxFor the assignment attached, i need 3-4 pages of material added on t.docx
For the assignment attached, i need 3-4 pages of material added on t.docx
 
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docxFOR SKYESSAYSFor the Final Project, you will assume the role of .docx
FOR SKYESSAYSFor the Final Project, you will assume the role of .docx
 
For Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docxFor Professor2013DetailsCombine all elements completed in previ.docx
For Professor2013DetailsCombine all elements completed in previ.docx
 
For professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docxFor professor2013DetailsCombine all elements completed in pre.docx
For professor2013DetailsCombine all elements completed in pre.docx
 
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docxFor Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
For Prof. Stewart OnlyChpt 12200 word minimum for each questio.docx
 
For more than five decades, Robin M. Williams, Jr. served as profess.docx
For more than five decades, Robin M. Williams, Jr. served as profess.docxFor more than five decades, Robin M. Williams, Jr. served as profess.docx
For more than five decades, Robin M. Williams, Jr. served as profess.docx
 
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docxFor Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
For Part 2 of your MAP Clearly describe the desired outcome(s) from.docx
 
For Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docxFor Prof. Goodman!Global Economic Environment Course A.docx
For Prof. Goodman!Global Economic Environment Course A.docx
 
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docxFOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
FOR PROF. ANN ONLYConsider Case 4.13 involving Tyco Internationa.docx
 
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docxFor Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
For Kim Woods OnlyAssignment 2 LASA 1 – Letters f.docx
 
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docxFor Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
For Kim Woods OnlyAssignment 2 Ethical (Moral) Relati.docx
 
For informed consent to occur, there must be a shared decision-makin.docx
For informed consent to occur, there must be a shared decision-makin.docxFor informed consent to occur, there must be a shared decision-makin.docx
For informed consent to occur, there must be a shared decision-makin.docx
 
For each of the four variables listed above, identify the level of m.docx
For each of the four variables listed above, identify the level of m.docxFor each of the four variables listed above, identify the level of m.docx
For each of the four variables listed above, identify the level of m.docx
 
For every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docxFor every historical figure known for making significant, if not rev.docx
For every historical figure known for making significant, if not rev.docx
 
For each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docxFor each module’sActiveLearningDiscu.docx
For each module’sActiveLearningDiscu.docx
 
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docxFollowing the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
Following the Case Study 1 Malpractice Action brought by Yolanda Pi.docx
 

Case Study The T-Mobile HackRecently a hacker was able to acc

  • 1. Case Study: The T-Mobile Hack Recently a hacker was able to access the wireless carrier T- Mobile’s network and read the private emails and personal files of hundreds of customers. The government revealed that emails and other sensitive communications from the Secret Service agent investigating the incident were among those obtained by the hacker. The agent, Peter Caviccha, was apparently using his own personal handheld computer to view emails while travelling. His supervisors were apparently aware of this, since they frequently directed emails to his personal email address while he was travelling. The agency had a policy in place that disallowed agents from storing work-related files on personal computers. The hacker was able to view the names and Social Security numbers of 400 T-Mobile customers, and they were notified in writing regarding the security breach. T-Mobile has more than 63 million customers in the United States. The network attack occurred over a seven-month period and was discovered during a broad investigation by the Secret Service while studying several underground hacker organizations. Nicolas Lee Jacobson, a computer engineer from Santa Anna, California, was charged in the cyberattack after investigators traced his online activities to a hotel where he was staying. He was later arrested and then been released on a $25,000 bond. 1. What role did the culture displayed by Caviccha and his supervisors play in the case? 2. Were additional charges warranted against the agent if agency rules were violated? 3. Which type of culture, hierarchical or hybrid, was displayed, and did the type of culture play a role in charges
  • 2. against the agent? 4. What additional security measures are required to prevent eavesdropping on wireless communications?