Logo
    Search

    The Sunday Read: 'The Man Who Cracked the Lottery'

    enJuly 19, 2020

    Podcast Summary

    • A tale of morality and justiceProsecutor Rob Sand's unwavering morality led him to investigate a suspicious lottery ticket, ultimately uncovering the largest lottery scam in American history.

      "The Man Who Cracked the Lottery" is a captivating story about the largest lottery scam in American history, but at its core, it's a tale of morality. Rob Sand, a prosecutor for the state of Iowa, is the good guy in this story, known for his unwavering moral compass. He was given a suspicious lottery ticket worth $16.5 million to investigate, but the case was full of dead ends. The most promising evidence was on a DVD with grainy surveillance footage of a man buying a lottery ticket at a gas station. Despite the long odds of winning the jackpot, the man's distinct voice and behavior caught Sand's attention. This story highlights the importance of integrity and morality in a world where right and wrong can be blurred, and the determination of one man to bring justice to light.

    • A year-long mystery of unclaimed $1,000,000 lottery ticketDespite strict rules, some lottery winners go to great lengths to claim anonymously, causing challenges for lottery officials in verifying identities and preventing fraud.

      The winning $1,000,000 lottery ticket went unclaimed for over a year before it was finally claimed by a lawyer from Quebec, Philip Johnston. The investigation into the ticket's eventual claim involved multiple false identities and attempts to keep the winner's identity anonymous, which went against Iowa Lottery rules. The case highlights the lengths some people will go to claim lottery winnings anonymously, and the challenges lottery officials face in verifying the identities of winners and preventing fraud. Despite dealing with over 200 million-dollar winners in her career, Iowa Lottery Vice President Mary Neubauer had never seen a winning ticket go unclaimed for so long. The case ultimately involved the Iowa Attorney General's office and the Division of Criminal Investigation.

    • Iowa Lottery Scandal: From Robert Rhodes to Eddie TiptonParanoid and lonely man, Eddie Tipton, rigged lottery machines in multiple states, leading to a massive scandal and the resignation of the Iowa Lottery executive director.

      The investigation into the hot lotto winning in Iowa led to the discovery of Eddie Tipton, the information security director for the Multistate Lottery Association, who was later found to have rigged lottery machines in multiple states. Johnston, a former Iowa investigator, had initially pointed investigators towards a businessman named Robert Rhodes, but the case went cold until a voice recognition match identified Tipton from a surveillance video. Tipton, a paranoid and lonely man, had built an extravagant house in the hopes of finding a family, but instead poured his savings into the house and his job. He was eventually charged with fixing lottery machines in several states, leading to a massive scandal and the resignation of the executive director of the Iowa Lottery. The case, which had acquired a "cult like" status in the Iowa investigator's office, ultimately revealed the extent of Tipton's greed and deceit.

    • The Importance of Integrity and Thorough InvestigationsTrust can be broken by even the closest friends, highlighting the importance of maintaining ethical standards and thorough investigations to uncover the truth

      Trust can be easily broken even by those closest to us. Eddie Tipton, a longtime friend and colleague of Stephen Maurer, was seen on surveillance video buying a winning lottery ticket worth $16.5 million. Maurer and another friend, Jason Maher, were initially in denial and went to great lengths to prove it wasn't Tipton. However, after analyzing the audio and video evidence, they were forced to accept the truth. The incident served as a stark reminder of the importance of integrity and the potential consequences of deceit, no matter how deep the relationship. Furthermore, the case highlighted the significance of thorough investigations and the use of technology in uncovering the truth. Maurer and Maher's efforts to compare the voice and physical characteristics in the video with those of Tipton were crucial in identifying him as the culprit. The incident also underscored the need for strict adherence to rules and regulations, especially in sensitive areas such as lottery security. Overall, the Eddie Tipton case serves as a cautionary tale of the dangers of trusting too much and the importance of maintaining ethical standards. It also highlights the power of technology and thorough investigations in uncovering the truth, even in the most unexpected of circumstances.

    • Lottery Fraud: Eddie Tipton's Appeal and New SuspicionsInvestigator Sand's suspicion of unrelated lottery wins led to the discovery of potential white collar crime rings.

      Eddie Tipton, a Multistate Lottery Association employee, was found guilty of trying to illegally buy lottery tickets and claim the prize through fraudulent means in 2015. The prosecution presented evidence, including a distinct voice recognized on video and cell phone records, that Tipton had fixed the lottery using a rootkit. However, Tipton's defense argued that the focus on the complicated rootkit theory was a red herring, and the jury should focus on the near impossible coincidence of the lottery security chief buying a winning ticket and passing it to his friend. Despite being sentenced to 10 years in prison, Tipton appealed, and the case was sent back to district court. After the trial, Sand, the investigator, remained suspicious and received a call about Tipton's brother, Tommy, who had won the lottery about 10 years prior. Renison, an FBI agent, also had an old case involving Tom Bargus, who had offered to swap large amounts of cash for the justice of the peace's money. While these cases seemed unrelated, Sand believed white collar criminals don't usually get caught on their first attempt, and these suspicious lottery wins deserved further investigation.

    • A Bigfoot hunter's lottery winnings and suspicious friendshipsAn Iowa justice of the peace, Eddie Tipton, was under investigation for swapping worn bills. The case led to the discovery of lottery winnings in other states, friendships with potential suspects, and a complex web of illicit lottery ticket claims.

      The case of Eddie Tipton, a justice of the peace in Iowa, involved him swapping worn bills for crisp ones in a suspected case of public corruption. However, the investigation led to some unexpected twists. The man, who claimed to be a Bigfoot hunter, had won the lottery in Colorado and had asked a friend to claim it for him. The friend, Alexander Hicks, was later found to have died of cancer. Investigators then discovered that Tipton's best friend, Robert Rhodes, had claimed a large lottery prize in Wisconsin in 2008, on the same day as Tipton's Iowa winning numbers were drawn three years later. Additionally, a Facebook friend of Tipton named Kyle Khan was identified as a potential suspect based on phone records. The case uncovered a web of illicit lottery ticket claims and friendships, leading to multiple investigations.

    • Former lottery employee manipulated random number generators for personal gainA former lottery employee exploited the system, inserting malicious code to manipulate random number generators, resulting in friends winning large lottery prizes. Insider threats and system security are crucial.

      Eddie Tipton, a former employee of the Multi-State Lottery Association, manipulated the random number generators in several states to create winning lottery numbers, which he then gave to his friends. This scheme came to light when investigators discovered that two winning Kansas Lottery tickets worth $15,402 each were purchased on the same day Tipton was driving through Kansas and had been claimed by his friends. The forensic analysis of the computer hardware from Wisconsin revealed Tipton's malicious code, which was small and not hidden, but required specific knowledge to find. Tipton's actions were not part of a mob-related scheme, but rather a computer nerd's attempt to exploit the system for personal gain. He had planted the idea years ago and, during a slow period, inserted the code into the system. This case highlights the importance of securing computer systems and the potential risks of insider threats.

    • Former IT employee manipulated lottery numbers based on holidays for personal gainA former lottery association employee manipulated random number generators, reducing potential winning numbers during his vacations, creating the largest lottery scam in American history

      Eddie Tipton, a former IT employee of the Multi-State Lottery Association, manipulated the random number generators to predict winning numbers based on specific criteria. He did this by diverting the system to a predetermined seed number, which significantly reduced the pool of potential winning numbers. Tipton chose these dates based on holidays when he was often on vacation. This allowed him to provide his brother with a "cheat sheet" of potential winning numbers, reducing the number of combinations they needed to play. Tipton saw himself as a kind of Robin Hood, taking from the lottery and helping those in need. However, the court saw him as a common thief who took advantage of a system vulnerability. The scale of his actions made it the largest lottery scam in American history.

    • A single person's actions led to a major lottery scamA computer security expert's unchecked power and unethical actions led to millions in winnings, significant financial damage, and eventual capture, highlighting the importance of ethical behavior.

      The actions of a single person with knowledge of computer security led to a major lottery scam, causing significant financial damage and leaving a trail of guilt and regret. Eddie Tipton, the perpetrator, inserted a code into gaming software and was surprised by its success, leading to millions in winnings and eventual capture. Despite his initial pride, Tipton came to regret his actions and expressed remorse at sentencing. The case highlighted the intellectual challenge of solving complex white-collar crimes and the limitations of the justice system in rectifying past wrongs. Sand, the investigator, felt a deep sense of satisfaction in solving the puzzle but grew weary of dealing with criminals and went on to run for state auditor. The case underscores the potential consequences of unchecked power and the importance of ethical behavior.

    • Prosecutor's relief from complex case completionA complex case brings a prosecutor satisfaction and liberation, providing a sense of accomplishment and relief from work pressures.

      Sand, a prosecutor, found completing a complex case to be not only satisfying but also liberating. This case involved investigating government waste, abuse, and fraud. Sand's determination to see it through to the end was so strong that he couldn't consider leaving his position before finishing it. The sense of accomplishment he felt upon completing the case was a relief from the pressures and challenges of prosecution. This account was shared in an audio story available on the Autumn app, which offers various audio content from publishers like the New York Times.

    Recent Episodes from The Daily

    'Animal,' Episode 5: Wolves

    'Animal,' Episode 5: Wolves

    In a broken world, what can we gain by looking another animal in the eye? "Animal" is a six-part, round-the-world journey in search of an answer. In Episode 5, the writer Sam Anderson travels to an obscure memorial in rural Japan: the statue of the last Japanese wolf.

    For photos and videos of Sam's journey to Japan, visit nytimes.com/animal

    The Daily
    enJune 30, 2024

    A Brutal Debate for Biden

    A Brutal Debate for Biden

    In the first debate of the 2024 race, President Biden hoped to make the case that Donald J. Trump was unfit to return to the White House. Instead, Mr. Biden’s weak performance deepened doubts about his own fitness for the job.

    Astead W. Herndon, who covers politics for The Times, explains what happened.

    Guest: Astead W. Herndon, a national politics reporter for The New York Times and the host of the politics podcast “The Run-Up.”

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 28, 2024

    The Doping Scandal Rocking the Upcoming Olympics

    The Doping Scandal Rocking the Upcoming Olympics

    A new doping scandal is rocking the world of competitive swimming, as the Paris Olympics approach. These allegations are raising questions about fairness in the sport and whether the results at the summer games can be trusted.

    Michael S. Schmidt, one of the reporters who broke the story, explains the controversy and what it reveals about the struggle to police doping in sports.

    Guest: Michael S. Schmidt, an investigative reporter for The New York Times.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 27, 2024

    France’s Far Right at the Gates of Power

    France’s Far Right at the Gates of Power

    The far right in France had a big win this month, crushing the party of President Emmanuel Macron in elections for the European Parliament. But the results did not affect France’s government at home — until Mr. Macron changed that.

    Roger Cohen, the Paris bureau chief for The Times, discusses the huge political gamble Mr. Macron has taken, which has brought the far right closer than ever to gaining real power in France.

    Guest: Roger Cohen, the Paris bureau chief for The New York Times.

    Background reading: 

    • Battered by the far right in voting for the European Parliament, Emmanuel Macron called for new elections in France.
    • The president has challenged voters to test the sincerity of their support for the far right. Were the French letting off steam in the European elections, or did they really mean it?

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 26, 2024

    The Plan to Defeat Critics of Israel in Congress

    The Plan to Defeat Critics of Israel in Congress

    A powerful group supporting Israel is trying to defeat sitting members of Congress who have criticized the country’s deadly war against Hamas.

    Nicholas Fandos, who covers New York politics for The Times, explains why it appears that strategy may work in today’s Democratic primary in New York.

    Guest: Nicholas Fandos, who covers New York politics and government for The New York Times.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 25, 2024

    The Army of Poets and Students Fighting a Forgotten War

    The Army of Poets and Students Fighting a Forgotten War

    Warning: this episode contains descriptions of injuries.

    Myanmar is home to one of the deadliest, most intractable civil wars on the planet. But something new is happening. Unusual numbers of young people from the cities, including students, poets and baristas, have joined the country’s rebel militias. And this coalition is making startling gains against the country’s military dictatorship.

    Hannah Beech, who covers stories across Asia for The Times, discusses this surprising resistance movement.

    Guest: Hannah Beech, a Bangkok-based reporter for The New York Times, focusing on investigative and in-depth stories in Asia.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 24, 2024

    'Animal,' Episode 4: Ferrets

    'Animal,' Episode 4: Ferrets

    In a broken world, what can we gain by looking another animal in the eye? "Animal" is a six-part, round-the-world journey in search of an answer. In Episode 4, the writer Sam Anderson soothes his anxiety by visiting a convention center in Ohio.

    For photos and videos of Sam's adventure with manatees, visit nytimes.com/animal.

    The Daily
    enJune 23, 2024

    America’s Top Doctor on Why He Wants Warning Labels on Social Media

    America’s Top Doctor on Why He Wants Warning Labels on Social Media

    Warning: This episode contains mentions of bullying and suicide.

    A rising tide of mental health problems among teenagers has sent parents, teachers and doctors searching for answers. This week, the U.S. surgeon general, Dr. Vivek H. Murthy, offered one: social media.

    Today, Dr. Murthy discusses his proposal to require platforms such as YouTube, TikTok and Instagram to include warning labels, like those that appear on tobacco and alcohol products.

    Guest: Dr. Vivek H. Murthy, the U.S. surgeon general.

    Background reading: 

    For more information on today’s episode, visit nytimes.com/thedaily. Transcripts of each episode will be made available by the next workday.

    The Daily
    enJune 21, 2024

    Related Episodes

    Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track

    Sarah Edwards - Ubiquity Forensics - Your iCloud and You - 101 Track

    Materials Available here: https://media.defcon.org/DEF%20CON%2023/DEF%20CON%2023%20presentations/DEFCON-23-Sarah-Edwards-Ubiquity-Forensics.pdf

    Ubiquity Forensics - Your iCloud and You
    Sarah Edwards Test Engineer, Parsons Corporation & Author/Instructor, SANS Institute

    Ubiquity or "Everything, Everywhere” - Apple uses this term describe iCloud related items and its availability across all devices. iCloud enables us to have our data synced with every Mac, iPhone, iPad, PC as well as accessible with your handy web browser. You can access your email, documents, contacts, browsing history, notes, keychains, photos, and more all with just a click of the mouse or a tap of the finger - on any device, all synced within seconds.

    Much of this data gets cached on your devices, this presentation will explore the forensic artifacts related to this cached data. Where is the data stored; how to look at it; how is it synced; and what other sensitive information can be found that you may not have known existed!

    Sarah is an digital forensic analyst who has worked with various federal law enforcement agencies. She has performed a variety of investigations including computer intrusions, criminal, counter intelligence, counter-narcotic, and counter terrorism. Sarah's research and analytical interests include Mac forensics, mobile device forensics, digital profiling, and malware reverse engineering. Sarah has presented at many industry conferences including; Shmoocon, CEIC, various Bsides, DEF CON, and the SANS DFIR Summit. Sarah is author and instructor of the SANS Mac Forensic Analysis Course - FOR518.

    Jason Healey - Saving the Internet (for the Future)

    Jason Healey - Saving the Internet (for the Future)

    Slides Here: https://defcon.org/images/defcon-22/dc-22-presentations/Healey/DEFCON-22-Jay-Healey-Saving-the-Internet-UPDATED.pdf

    Saving the Internet (for the Future)
    Jason Healey DIRECTOR, CYBER STATECRAFT INITIATIVE, ATLANTIC COUNCIL
    Saving the Internet (for the Future): Last year, the Dark Tangent wrote in the DC XXI program that the "balance has swung radically in favor of the offense, and defense seems futile." It has always been easier to attack than to defend on the Internet, even back to 1979 when it was written that "few if any security controls can stop a dedicated" red team. We all accept this as true but the community rarely ever looks at the longer term implications of what happens to the internet if one side has a persistent advantage year after year, decade after decade. Is there a tipping point where the internet becomes no longer a Wild West but Somalia, a complete unstable chaos where the attackers don't just have an advantage but a long-term supremacy? This talk will look at trends and the role of hackers and security researchers.

    Jason Healey is the Director of the Cyber Statecraft Initiative of the Atlantic Council, focusing on international cooperation, competition and conflict in cyberspace, and the editor of the first history of conflict in cyberspace, A Fierce Domain: Cyber Conflict, 1986 to 2012. He has worked cyber issues since the 1990s as a policy director at the White House, executive director at Goldman Sachs in Hong Kong and New York, vice chairman of the FS-ISAC (the information sharing and security organization for the finance sector) and a US Air Force intelligence officer. He is a board member of Cyber Conflict Studies Association, lecturer in cyber policy at Georgetown University and author of dozens of published essays and papers. Just in 2013 presented or spoke in Brussels, Rome, Istanbul, Reykjavik, London, Tallinn, Stockholm, Munich, Seoul, Bali, New York, New Orleans, Las Vegas, San Francisco, and Washington, DC.

    Joanna Rutkowska & Alexander Tereshkin: IsGameOver(), anyone?

    Joanna Rutkowska & Alexander Tereshkin: IsGameOver(), anyone?
    We will present new, practical methods for compromising Vista x64 kernel on the fly and discuss the irrelevance of TPM/Bitlocker technology in protecting against such non-persistent attacks. Then we will briefly discuss kernel infections of the type II (pure data patching), especially NDIS subversions that allow for generic bypassing of personal firewalls on Vista systems.

    A significant amount of time will be devoted to presenting new details about virtualization-based malware. This will include presenting various detection methods that could be used to either detect the presence of a hypervisor or find the malware itself. We will also discuss why each of these approaches cannot be used to build a practical detector, either because they could be fully defeated by virtualization based malware or because they are very impractical. This will include demonstration of how virtualization based malware can avoid timing-based detection, even if a detector uses trusted time source. We will also discuss detection approaches based on exploiting CPU bugs. The conclusion of this part is that we still do not have any good way to detect virtualization based malware...

    Were also going to talk about malware that fully supports nested virtualization (like e.g. our New Blue Pill does) and how this might be a challenge for OSes that would like to provide their own hypervisors in order to prevent Blue Pill-like attacks.

    People say that once an attacker gets into the kernel, the game is over and we should reinstall the whole system from scratch. In this presentation we show that sometimes we cannot know that the game is actually over, so we do not even know when to stop trusting our systems. In order to change this we need something more then just a bunch of patches!

    Joanna Rutkowska is a recognized researcher in the field of stealth malware and system compromises. Over the past several years she has introduced several breakthrough concepts and techniques on both the offensive and defensive side in this field. Her work has been quoted by the international press and she is a frequent speaker at security conferences around the world. In April 2007 she founded Invisible Things Lab, a consulting company dedicated for cutting-edge research into operating systems security.

    Alexander Tereshkin, aka 90210, is a seasoned reverse engineer and expert into Windows kernel, specializing in rootkit technology and kernel exploitation. He presented several sophisticated ideas for rootkit creation and personal firewall bypassing in the past few years. During the last year, when working for COSEINC Advanced Malware Labs, he has done significant work in the field of virtualization based malware and kernel protection bypassing.

    122: Lisa

    122: Lisa
    In this episode we hear some insider threat stories from Lisa Forte. Sponsors Support for this show comes from Axonius. Securing assets — whether managed, unmanaged, ephemeral, or in the cloud — is a tricky task. The Axonius Cybersecurity Asset Management Platform correlates asset data from existing solutions to provide an always up-to-date inventory, uncover gaps, and automate action. Axonius gives IT and security teams the confidence to control complexity by mitigating threats, navigating risk, decreasing incidents, and informing business-level strategy — all while eliminating manual, repetitive tasks. Visit axonius.com/darknet to learn more and try it free. Support for this show comes from Varonis. Do you wonder what your company’s ransomware blast radius is? Varonis does a free cyber resilience assessment that tells you how many important files a compromised user could steal, whether anything would beep if they did, and a whole lot more. They actually do all the work – show you where your data is too open, if anyone is using it, and what you can lock down before attackers get inside. They also can detect behavior that looks like ransomware and stop it automatically. To learn more visit www.varonis.com/darknet. Support for this show comes from Snyk. Snyk is a developer security platform that helps you secure your applications from the start. It automatically scans your code, dependencies, containers, and cloud infrastructure configs — finding and fixing vulnerabilities in real time. Create your free account at snyk.co/darknet. Attribution Darknet Diaries is created by Jack Rhysider. Editing by Damienne. Assembled by Tristan Ledger. Sound designed by Andrew Meriwether. Episode artwork by odibagas. Mixing by Proximity Sound. Theme music created by Breakmaster Cylinder. Theme song available for listen and download at bandcamp. Or listen to it on Spotify. Learn more about your ad choices. Visit podcastchoices.com/adchoices

    David Byrne: Intranet Invasion With Anti-DNS Pinning

    David Byrne: Intranet Invasion With Anti-DNS Pinning
    Cross Site Scripting has received much attention over the last several years, although some of its more ominous implications have not received much attention. Anti-DNS pinning is a relatively new threat that, while not well understood by most security professionals, is far from theoretical. This presentation will focus on a live demonstration of anti-DNS pinning techniques. A victim web browser will be used to execute arbitrary, interactive HTTP requests to any server, completely bypassing perimeter firewalls.

    This is NOT a Jickto knockoff. Jickto relies on using a proxy or caching site like Google to place both sites in the same domain. This does not allow for full interaction with dynamic pages, or any interaction with internal web sites. This demonstration allows full interaction with arbitrary web servers in the intranet environment. No browser bugs or plug-ins are required to accomplish this, only JavaScript.

    The presenter will demonstrate an automated attack process that provides an HTTP proxy service for the attacker?s browser after scanning the internal network for web servers. New requests are retrieved from the attack server by using the width and height of truncated images (only 66 bytes) as a covert channel.*** This bypasses the browser DOM normal behavior of allowing data to be requested only from the server that provided the HTML.

    Before demonstrating the tool, anti-DNS pinning will be explained in a way that anyone familiar with the basics of DNS and HTTP will understand. The presenter will describe the presentation environment and attack components, then walk through the steps in an attack. Once the foundation concepts have been established, the live demonstration will be performed.

    Towards the end, the presentation will also briefly cover suggested defenses, including changing pinning behavior in browsers, better intranet security, gateway behavioral scanners, increased granularity for IE security zones, and introduction of security zones into Mozilla and other browsers.