Feeds

Australia's first public swatting victim a nice bloke

Cops squash claims of FBI involvement

Choosing a cloud hosting partner with confidence

An unknown online crim drew 16 armed police to raid a Sydney man's home, by way of a fake emergency call to Queensland police.

The dangerous and expensive prank, known as swatting, was believed to be Australia's first on the public record, according to senior cybercrime state and federal police speaking to Vulture South.

Arncliff resident Matt McGrath, 18, was targeted by unknown assailants believed to have sent a spoofed text message to Queensland Police claiming he had killed his mother and held his father hostage.

NSW Police superintendent David Donohue said it would take months to track the culprits.

"It's not only frustrating but it's dangerous, it's dangerous to the police responding to the people inside the house," Donohue told reporters.

"It will probably take weeks to months before we can find out through IP, servers and back-tracking the electronic footprint."

Donohue said he feared swatting may be glorified resulting in copycat attacks.

Swatting was an extremely dangerous and costly practise common in cybercrime and video game circles where perpetrators maintain anonymity by phoning in threats via number spoofing websites or official emergency phone relay services for the disabled.

Allegations of swatting in Australia exist, but none have been confirmed. It's a big problem in the United States where the FBI handles more than 400 cases a year.

A recent crackdown saw a Canadian arrested for running a swatting-for-hire business where police were called to scores of schools across North America.

In April, a frustrated US gamer sent police officers and helicopters to rival player's home after being defeated in the popular Call of Duty shooter.

McGrath had maintained an active presence on greyhat website HackForums but it is unclear if the attacker also used the site.

Claims in a post today by McGrath that the FBI was involved were quashed by Kogarah Police. The US agency did not confirm whether an independent investigation was underway by the time of publication.

McGrath said he did not know who attacked him or why, and claimed police accused him of phoning in the swat himself.

"Don't know who did it or why? I'm friendly to everyone.. even worse Australian police think I called them on my own," he wrote in a post.

"Why would I call the swat on myself?"

McGrath appears to have maintained a clean online presence, dabbling only in legal small-scale money-making operations.

HackForums users chimed in to support McGrath, stating he was a nice guy, dubbing the swatter a "real a**hole".

"I hope the person who did this to matt gets caught," one user wrote. "Matt did not deserve this at all."

Public mischief such as swatting carried a maximum penalty of a year in prison and a fine of $5500.

Perhaps the most infamous swatter was Matthew Weigman, a legally blind hacker who was serving an 11-year sentence issued in June 2009. He made some 60 swatting calls prior to his indictment and had harassed Verizon employees and investigators who were building evidence against him. ®

Beginner's guide to SSL certificates

More from The Register

next story
NASTY SSL 3.0 vuln to be revealed soon – sources (Update: It's POODLE)
So nasty no one's even whispering until patch is out
Russian hackers exploit 'Sandworm' bug 'to spy on NATO, EU PCs'
Fix imminent from Microsoft for Vista, Server 2008, other stuff
US government fines Intel's Wind River over crypto exports
New emphasis on encryption as a weapon?
To Russia With Love: Snowden's pole-dancer girlfriend is living with him in Moscow
While the NSA is tapping your PC, he's tapping ... nevermind
Forget passwords, let's use SELFIES, says Obama's cyber tsar
Michael Daniel wants to kill passwords dead
Slap for SnapChat web app in SNAP mishap: '200,000' snaps sapped
This is what happens if you hand your username and password to a 3rd-party
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Win a year’s supply of chocolate
There is no techie angle to this competition so we're not going to pretend there is, but everyone loves chocolate so who cares.
Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.