The Big Heist that Almost Worked
The Big Heist that Almost Worked
Click Here for The G Manifesto’s The Complete Guide to Burglary
Click Here for The Man Who Robbed the Pierre: The Story of Bobby Comfort
Click Here for Secrets of a Superthief by Jack MacLean
Two men have been convicted for their part in trying to pull off a £229m heist at the Sumitomo Mitsui Bank in London.
In one of the biggest attempted bank thefts in Britain, they used hi-tech equipment to try to steal money from the accounts of big businesses.
Hugh Rodley, 61, of Twyning, near Tewkesbury, Gloucestershire, and sex shop owner, David Nash, 47, from Durrington, West Sussex, were foiled only at the last minute by the complexities of inter-bank money transfers.
On the early evening of 16 September 2006, two men arrived at the reception desk of the Sumitomo Mitsui Bank in London. One asked for the bank’s security supervisor, Kevin O’Donoghue.
He had a distinctive European, possibly Belgian, accent but the receptionist thought nothing of it. After all, this was the London branch of a major Japanese merchant bank with global interests and investments.
Hugh Rodley
Hugh Rodley, involved in the heist, is a self-styled lord of the manor
What she did not know was that the two men led upstairs by security chief O’Donoghue were expert hackers – and they had come to the bank to implement the first stage of the most audacious, and potentially lucrative, cyber snatch in history.
Police do not know how long the gang had been planning the operation. And those now convicted are certainly not those behind the plan.
When questioned, Kevin O’Donoghue, 34, from Birmingham, claimed that he had been coerced into helping and that his family had been threatened. He later admitted a charge of conspiracy to steal.
CCTV images showed him laughing and joking as he showed the two Belgian cyber-thieves to a terminal in one of the trading offices.
Jan Van Osselaer from Belgium and Gilles Poelvoorde from France, who admitted a charge of conspiracy to steal, had come prepared.
They used a USB memory stick to instal “keylogger” software on various workstations that recorded every button pressed by users.
‘No kingpin’
A few days later, they returned and downloaded the data from the keylogger programmes. They now had the usernames and passwords of every bank employee who had used the infected computers.
But Kevin O’Donoghue had made some mistakes. He had tampered with some of the CCTV cameras – even cutting the wires on one – in an effort to cover the gang’s tracks. Other employees started to wonder why he had started enquiring about creating extra access badges.
Continue Reading
The Rest is Up to You…
Michael Porfirio Mason
AKA The Peoples Champ
AKA GFK
The Guide to Getting More Out of Life
http://www.thegmanifesto.com
Black Milk & Bishop Lamont – Caltroit