Serious handicappers betting on ponies know they’re always bucking the odds.
But the rigging of the Pick Six payoff at the Breeder’s Cup championship showed how trusted insiders can manipulate networks to steal from unsuspecting bettorslong before the horses get to the gate.
The million-dollar fiasco is not an isolated problem. The truth is, any company that handles financial transactions or valuable information electronically runs the risk of being fleeced by its own technology staffor users. Just in the last couple of months, Columbia University undergraduates got caught using digital photography and wireless transmission to cheat on graduate school entrance exams; and, thieves succeeded in stealing the credit histories of 30,000 people thanks to help from a low-level technology insider who had easy access to the information.
In the horse racing case, a 29-year-old software developer confessed last month to masterminding a plot to use his position as a senior technology staff member at Autotote Systems to alter bets placed by a co-conspirator. The plan was to collect more than $3 million by picking six winners in Breeder’s Cup races.
Autotote executives say the staffer, Chris Harn, had “the highest level” of accesssometimes referred to as a “super-user”to Autotote’s network, and was actually responsible for monitoring and maintaining the network from the company’s Delaware headquarters.
“You have to understand that this individual was one of, if not the most trusted member of our (IT) team,” says Rhonda Barnat, a spokeswoman for Autotote. “That someone you trust so much would do something like this is just devastating.”
Neuroscientist reveals a new way to manifest more financial abundance
Breakthrough Columbia study confirms the brain region is 250 million years old, the size of a walnut and accessible inside your brain right now.