Notable High-Tech Crimes That Didn't Involve Hacking
High-Tech Crimes |
When people think of high-tech crimes, they often picture hackers behind computer screens, infiltrating systems from dark rooms. However, technology can enable many types of crime beyond the digital realm. From genetic cloning to market manipulation, these high-tech crimes illustrate the vast potential for technology to be used in illicit ways. Here are ten notable examples of high-tech crimes that did not involve traditional hacking.
Cloning a Giant Sheep
Arthur "Jack" Schubarth, an 81-year-old businessman from Montana, was sentenced to six months in federal prison in 2024 for illegally importing a Marco Polo sheep with the aim of cloning it. Schubarth planned to create an even larger hybrid breed to sell to game reserves. Despite his legal team's defense, the U.S. authorities did not look kindly on his attempt to manipulate genetics, leading to his conviction and prison sentence.Crypto Mining at Work
In 2021, Christopher Naples, an IT supervisor with two decades of experience, decided to mine cryptocurrency at the Suffolk County Clerk’s Office using taxpayer-funded electricity. Over seven months, he hid 46 mining devices in various parts of the building, including under floorboards and in wall panels. The devices caused significant spikes in temperature and cost the office thousands in electricity bills. Naples was arrested and charged with several felonies, including public corruption.The Flash Crash
Navinder Sarao, a London-based trader, manipulated financial markets for years, amassing around $40 million. Using special software, he placed fake orders on the Chicago Mercantile Exchange to trick other traders into moving prices in his favor. His manipulation led to the infamous "Flash Crash" of 2010, where U.S. stock values plummeted by $1 trillion in less than an hour. Sarao was arrested five years later, after his software tricks were exposed.
These cases highlight how technology can be misused for personal gain, showing that crime isn’t always about breaking into digital systems—it can involve exploiting the power of emerging technologies for nefarious purposes.
Comments
Post a Comment