<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy Risk Report &#187; MLB</title>
	<atom:link href="https://privacyriskreport.com/tag/mlb/feed/" rel="self" type="application/rss+xml" />
	<link>https://privacyriskreport.com</link>
	<description></description>
	<lastBuildDate>Fri, 03 Feb 2023 16:49:49 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases</title>
		<link>https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases</link>
		<comments>https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/#comments</comments>
		<pubDate>Wed, 27 Jul 2016 15:33:52 +0000</pubDate>
		<dc:creator><![CDATA[Tressler LLP]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[astros]]></category>
		<category><![CDATA[cardinals]]></category>
		<category><![CDATA[cyber espionage]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[houston astros]]></category>
		<category><![CDATA[major league baseball]]></category>
		<category><![CDATA[MLB]]></category>
		<category><![CDATA[st. louis cardinals]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=870</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/' data-emailit-title='Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The New York Times has reported that a Texas federal judge sentenced former St. Louis Cardinals Director of Baseball Development, Christopher Correa, to 46 months in prison after pleading guilty to five counts of unauthorized access of a protected computer. The... <a class="more-link" href="https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/' data-emailit-title='Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/">Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/' data-emailit-title='Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The <em><a href="http://www.nytimes.com/2016/07/19/sports/baseball/christopher-correa-a-former-cardinals-executive-sentenced-to-four-years-for-hacking-astros-database.html?_r=1">New York Times</a></em> has reported that a Texas federal judge sentenced former St. Louis Cardinals Director of Baseball Development, Christopher Correa, to 46 months in prison after pleading guilty to five counts of <a href="https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/">unauthorized access of a protected computer</a>. The sentence includes two years of supervised release and a restitution payment of $279,038. Correa remains out on bond until he reports to prison in the next two to six weeks.</p>
<p>Under <a href="http://energy.gov/sites/prod/files/cioprod/documents/ComputerFraud-AbuseAct.pdf">18 U.S.C.A. § 1030</a>, a person found guilty of unauthorized access of a protected computer could face up to five years in prison for each count. Correa’s sentence is significant in that the punishment stretched beyond restitution to the victims, and the prison time is substantial. Cyber crime is no longer considered merely a nuisance; rather, it is prosecuted robustly at the federal level. This case sets the precedent for further cases of “cyber espionage,” and provides an understanding in the legal community as to how these types of cases may be viewed by the court.</p>
<p>During his plea, Correa admitted to hacking into “Ground Control,” the scouting database used by the Houston Astros. He told the court that he accessed the e-mail of an Astros’ employee who formerly worked for the Cardinals. Correa was able to access the e-mail because this employee used a similar password to the one he used when he worked for the Cardinals. Correa admitted to the court that he “guessed” the password, granting him access. Through the e-mail, Correa was able to gain access to two other Astros’ employee accounts, and see information in the Ground Control database. The information Correa accessed was given an estimated value of $1.7 million by the U.S. Attorney’s office.</p>
<p>This breach demonstrates that cyber security is no longer a luxury, it can happen as simply as a password being stolen, resulting in $1.7 million in damages to an entity. Even if an organization does not grant internet access to its employees, confidential corporate information can be breached simply by using an e-mail address.</p>
<p>Further, this situation is another example of a cyber incident committed by a person that does not fit the classic hacker stereotype. The common misconception of a hacker is a tech-savvy person, using cutting edge equipment to steal valuable information. This misconception is dangerous to the extent that it allows smaller targets to dismiss cyber security as being necessary for only larger, high-value targets. This situation, involving an unsophisticated tactic with a very industry-specific target, is a great reminder that significant damage can be done by those with inside access.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/' data-emailit-title='Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/">Cardinals&#8217; Exec&#8217;s Prison Sentence Sets Stage for Future “Cyber Espionage” Cases</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/cardinals-execs-prison-sentence-sets-stage-for-future-cyber-espionage-cases/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case</title>
		<link>https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=major-league-breach-baseball-provides-first-cyber-espionage-case</link>
		<comments>https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/#comments</comments>
		<pubDate>Sun, 28 Jun 2015 15:33:24 +0000</pubDate>
		<dc:creator><![CDATA[Todd Rowe]]></dc:creator>
				<category><![CDATA[Protecting Against the Risk]]></category>
		<category><![CDATA[corporate]]></category>
		<category><![CDATA[cyberliability]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hack]]></category>
		<category><![CDATA[MLB]]></category>

		<guid isPermaLink="false">https://privacyriskreport.com/?p=98</guid>
		<description><![CDATA[<div class="e-mailit_top_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/' data-emailit-title='Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>On June 16, 2015, the New York Times reported on what is being referred to as “the first known case of corporate espionage” involving hacking and cybersecurity. The article states that the FBI and Justice Department are investigating allegations that front-office... <a class="more-link" href="https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/">Continue Reading &#8594;</a>
<div class="e-mailit_bottom_toolbox">
<div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/' data-emailit-title='Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div>
</div>
</div>
<p>The post <a rel="nofollow" href="https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/">Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></description>
				<content:encoded><![CDATA[<div class="e-mailit_top_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/' data-emailit-title='Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>On June 16, 2015, the <a href="http://www.nytimes.com/2015/06/17/sports/baseball/st-louis-cardinals-hack-astros-fbi.html?_r=0" target="_blank">New York Times</a> reported on what is being referred to as “the first known case of corporate espionage” involving hacking and cybersecurity. The article states that the FBI and Justice Department are investigating allegations that front-office personnel for the St. Louis Cardinals hacked the Houston Astros’ computer network to access information related to players, trades, statistics and scouting reports. While the employees under investigation have not been identified, officials are gathering evidence that “the hacking was executed by vengeful front office employees for the Cardinals hoping to wreak havoc on the work of Jeff Luhnow, the Astros’ general manager,” who had previously been with the Cardinals. Other sources indicate <a href="http://www.si.com/mlb/2015/06/16/cardinals-astros-hacking" target="_blank">the hack may have been used to embarrass the Astros</a> rather than steal confidential information.</p>
<p>The Astros contacted the FBI when confidential information stored on their networks was posted online last year. Investigators found information indicating the origin of the hack was the home of Cardinal&#8217;s personnel.</p>
<p><strong>The Data </strong></p>
<p>Luhnow used statistics to provide insight on player development and training. This statistical method being used in baseball has been referred to as “Moneyball.” While at St. Louis, Luhnow developed a software program called “Redbird” to store information concerning St. Louis’ operations. He created a similar program for the Astros called “Ground Control” which stored the Astros’ “collective baseball knowledge.” Beyond merely storing the data, the program also “took a series of variables and weighted them ‘according to the values determined by the team’s statisticians, physicist, doctors, scouts and coaches.”</p>
<p><strong>The Intrusion</strong></p>
<p>It appears the cyber attack/theft was unsophisticated and carried out by guessing the passwords for the Astros&#8217; network. Investigators are looking into allegations that Cardinals personnel, concerned the Astros may have used the program developed for the Cardinals, used passwords used by Luhnow while at St. Louis to gain access to the Astros’ network.  There are <a href="http://www.si.com/mlb/2015/06/16/cardinals-astros-hacking">reports</a> that this information was taken with the intention of embarrassing the Astros and Luhnow.</p>
<p><strong>Hacks Used For Corporate Espionage</strong></p>
<p>Based on the allegations against the Cardinals, corporate espionage is now added to the list of cyber security concerns. Further, hacks by competitors may cause more damage to the extent it may take longer to discover the hack. The large data breaches at Target or the federal government required people stealing information and selling it to other criminals that would use the information. Of course, a number of red flags are raised when hackers need to find buyers for the information they have taken. It is alleged that the Cardinals took the information for their own use and the breach was not discovered until the Astros saw their confidential information posted online. The information had value for the Cardinals without buyers and there is a chance the Astros would not have known about the hack if the information did not end up on the internet.</p>
<div class="e-mailit_bottom_toolbox"><div class="e-mailit_toolbox square size32 " data-emailit-url='https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/' data-emailit-title='Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case'>
<div class="e-mailit_btn_Facebook"></div>
<div class="e-mailit_btn_Twitter"></div>
<div class="e-mailit_btn_Send_via_Email"></div>
<div class="e-mailit_btn_Pinterest"></div>
<div class="e-mailit_btn_LinkedIn"></div>
<div class="e-mailit_btn_EMAILiT"></div></div>
</div><p>The post <a rel="nofollow" href="https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/">Major League Breach: Baseball Provides First &#8220;Cyber Espionage&#8221; Case</a> appeared first on <a rel="nofollow" href="https://privacyriskreport.com">Privacy Risk Report</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://privacyriskreport.com/major-league-breach-baseball-provides-first-cyber-espionage-case/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
