The Kids Who Hacked Xbox: From Gaming Obsession to International Cybercrime

The Kids Who Hacked Xbox: From Gaming Obsession to International Cybercrime
Photo by Kamil Switalski / Unsplash

Introduction: When Teenage Gamers Became America's Most Wanted Hackers

In 2014, a seemingly routine border crossing between Canada and the United States became the end of one of the most audacious cybercrime sprees in gaming history. David Pokora, a 22-year-old computer science student from Mississauga, Ontario, was traveling to Delaware to buy car parts when U.S. Customs officers arrested him at the Lewiston-Queenston Bridge. What they uncovered was the story of Xbox Underground – an international hacking group that had spent three years infiltrating Microsoft, major game developers, and even accidentally breaching U.S. military networks.

What started as teenage curiosity about Xbox 360 modding had escalated into a criminal enterprise that stole over $100-200 million worth of intellectual property, leaked unreleased games, built bootleg Xbox One consoles before their official release, and gained unauthorized access to military flight simulation software. This is the complete story of how a group of teenagers turned their gaming obsession into one of the most sophisticated cybercrime operations of the 2010s.

The Xbox Underground case reveals a darker side of gaming culture, where the line between harmless modding and serious cybercrime becomes dangerously blurred. It's a cautionary tale about how technical talent, when combined with poor judgment and a thrill-seeking mentality, can destroy lives and cost companies hundreds of millions of dollars.

XBox Underground (Part 1) – Darknet Diaries
This is the story about the XBox hacking scene and how a group of guys pushed the hacking a little too far.

Meet the Xbox Underground: The International Gaming Crime Syndicate

David Pokora: The Canadian Mastermind

David Pokora was the undisputed leader of Xbox Underground, a computer science student at the University of Toronto who discovered his passion for hacking at age 16. Born in 1992, Pokora grew up in Mississauga, Ontario, in a middle-class family where his parents supported his interest in technology.

Early Life and Gaming Obsession:

  • Started gaming at age 3 with first-person shooters
  • Began programming in elementary school, described as a "born programmer"
  • Learned Visual Basic during a family trip to Poland where there was no WiFi
  • Got his first Xbox and became fascinated with the console's Windows-based architecture

The Path to Cybercrime: Pokora's transformation from curious teenager to international criminal began when he acquired his first Xbox 360 development kit. He would spend countless hours hacking Halo 3, often working until 3-4 AM while his grades suffered. As one account noted: "Pokora would hack for hours, disregarding high school grades and would continue working until he crashed at around 3 or 4 am."

XBox Underground (Part 2) – Darknet Diaries
This is the story about the XBox hacking scene and how a group of guys pushed the hacking a little too far.

The Core Xbox Underground Members

Austin Alcala - 18 years old from McCordsville, Indiana

  • Youngest member of the core group
  • Participated in the physical theft at Microsoft headquarters
  • Later pleaded guilty and faced federal charges

Nathan Leroux - 20 years old from Bowie, Maryland

  • American member who helped coordinate U.S. operations
  • Part of the conspiracy from its early days

Sanadodeh Nesheiwat - 28 years old from Washington, New Jersey

  • Oldest member of the group
  • Downloaded "all private information of the video games from Epic Games onto the disc which he then parceled to Pokora"

Dylan Wheeler - Australian hacker

  • Provided information to gaming blog Kotaku
  • Fled to Czechoslovakia before he could be arrested
  • Never faced prosecution due to his escape

Justin May: The FBI Informant - The most controversial member

  • Secretly worked with the FBI to bring down the group
  • Had previously been arrested at a gaming convention in Boston for attempting to download source code
  • Later sentenced to 7 years in prison for defrauding tech companies of $3.5 million

The Genesis: How Dev Kits Changed Everything

The Recycling Center Discovery

The Xbox Underground story begins with an unlikely discovery at a California recycling center. Rowdy Van Cleve, a technology manager and member of the hacker group Team Avalaunch, was looking for cheap Xbox DVD drives when he stumbled upon something extraordinary.

The Holy Grail Discovery: Van Cleve found Xbox 360 motherboards that looked different from retail units. When he installed one in his console and booted it up, he discovered it was a development kit motherboard – the hardware Microsoft used exclusively for game development. "The words that Rowdy said next were 'holy shit, this is a freaking dev motherboard.'"

The Underground Market: Van Cleve convinced the recycling center manager to sell him all the Xbox equipment from bankrupted companies. He kept some for himself, sold to trusted buyers, and distributed others to friends. One of his trusted customers was 16-year-old David Pokora, who paid top dollar for these rare dev kits.

PartnerNet: The Gateway to Gaming's Inner Sanctum

With their development kits, the hackers gained access to PartnerNet – Microsoft's exclusive testing environment for Xbox Live. This was a parallel universe of gaming where developers could test unreleased games, patches, and features.

What PartnerNet Offered:

  • Access to unreleased games and beta versions
  • Early patches and downloadable content
  • Technical specifications and development tools
  • Direct connection to Microsoft's internal networks

As one hacker described it: "It was like the wild west for them. While playing games on it was fun and lasted a while, the hot new game was now to hack the dev kits and to see what you could get them to do."

The Escalation: From Modding to Major Cybercrime

Phase 1: Halo Hacking and Early Success (2007-2009)

Pokora's first major project was modifying Halo 3. He connected with Anthony Clark, an 18-year-old hacker from Whittier, California, and together they created tools that gave the game's protagonist, Master Chief, supernatural abilities like jumping into clouds and shooting experimental ammunition.

Early Recognition: When they posted their work online, they received praise from Microsoft and Bungie engineers. This positive feedback emboldened them to push further into gray areas of the law.

The First Warning: Microsoft and Bungie engineers left a message in PartnerNet: "Winners Don't Break Into PartnerNet." The hackers took this warning lightly and continued their activities.

Phase 2: JTAG Exploits and Profit (2009-2011)

The discovery of the JTAG vulnerability in Xbox 360 consoles marked Xbox Underground's transition from hobbyists to criminals. When a modchip was added to the console's motherboard, the Xbox 360's security could be completely bypassed.

Monetizing the Exploit:

  • Created "modded lobbies" in Call of Duty games
  • Charged $100 per 30 minutes for enhanced gaming experiences
  • Offered "infections" that allowed players to sabotage opponents
  • Built a lucrative business around gaming exploits

Phase 3: Corporate Network Infiltration (2011-2013)

What started as gaming modifications evolved into sophisticated corporate espionage. The group began systematically targeting major gaming companies.

Epic Games Breach: Sanadodeh Nesheiwat successfully downloaded Epic Games' private information and shared it with Pokora. This breach gave them access to the highly anticipated Gears of War 3 before its release, marking their transition into serious intellectual property theft.

The FBI Investigation Begins: When Gears of War 3 appeared online before its official release, it triggered an FBI investigation. However, the investigators initially couldn't locate the perpetrators, emboldening the group to continue their activities.

The Major Heists: Stealing Gaming's Crown Jewels

Microsoft's Crown Jewels

Between 2011 and 2013, Xbox Underground spent "hundreds of hours" infiltrating Microsoft's networks. According to the 65-page federal indictment, they systematically copied:

Stolen Assets:

  • Microsoft's source code for Xbox systems
  • Technical specifications for the unreleased Xbox One (codenamed "Durango")
  • Login credentials for thousands of Microsoft employees
  • Internal development tools and documentation
  • Pre-release copies of major games including Call of Duty: Modern Warfare 3

The Scale of Access: David Pokora boasted about his achievements in a wiretapped conversation: "Have you been listening to the [expletive] that I've done this past month? I have [expletive] to the U.S. military. I have [expletive] to the Australian Department of Defense ... I have every single big company – Intel, AMD, Nvidia – any game company you could name, Google, Microsoft, Disney, Warner Bros., everything."

The Physical Heist: Breaking into Microsoft Headquarters

In September 2013, Xbox Underground executed their most audacious crime – a physical theft at Microsoft's Redmond headquarters. Austin Alcala and David Pokora used stolen access credentials to enter the secure building.

The Heist Details:

  • Used stolen employee credentials to gain building access
  • Walked through Microsoft's offices undetected
  • Stole three non-public Xbox One development kits
  • Exited the building without triggering any alarms

This physical theft represented the pinnacle of their criminal enterprise – not only had they infiltrated Microsoft's digital networks, but they had also breached the company's physical security.

The Accidental Military Breach

Perhaps the most serious aspect of their crimes was the inadvertent access to U.S. military systems. Through their breach of Zombie Studios, a Seattle-based game developer, they gained access to something they should never have touched.

The Apache Simulator: Zombie Studios was working with the U.S. Army on the AH-64D Apache Simulator – flight simulation software used to train military helicopter pilots. When Xbox Underground breached the company's network, they stumbled upon this classified military software.

National Security Implications: This breach gave foreign nationals (including the Canadian Pokora) unauthorized access to U.S. military training systems. The hackers maintained access to the Army network for approximately two months in late 2012 before the breach was discovered.

The Underground Economy: Profiting from Digital Crime

Building Bootleg Xbox Ones

One of Xbox Underground's most ambitious projects was manufacturing counterfeit Xbox One consoles before Microsoft's official release. Using stolen technical specifications and development kits, they attempted to create functional gaming systems.

The Bootleg Operation:

  • Used stolen Xbox One technical specifications
  • Assembled systems using development hardware
  • Attempted to sell consoles on underground markets
  • Generated significant profits from pre-release gaming hardware

The Gaming Black Market

Xbox Underground operated within a broader ecosystem of gaming-related cybercrime:

Revenue Streams:

  • Selling access to unreleased games and beta versions
  • Providing cheating services for online games
  • Trading stolen development hardware
  • Selling login credentials and corporate access

Digital Currency: As Pokora noted, they could "sell them for bitcoins that are not tracked with the right approach. There are fifty thousand [customers]."

The Investigation: How the FBI Caught Xbox Underground

The Confidential Informant

The FBI's investigation into Xbox Underground began in January 2011 when they were contacted by a confidential informant. According to FBI officials, this informant provided crucial intelligence about the group's activities and helped law enforcement understand the scope of their crimes.

The Informant's Role:

  • Provided real-time intelligence about hacking activities
  • Helped FBI understand the group's structure and capabilities
  • Assisted in gathering evidence for prosecution
  • Later revealed to be Justin May, a group member

Justin May: The Inside Betrayal

The most shocking revelation about Xbox Underground was that one of their own members, Justin May, was working with the FBI. May had been placed on pre-trial probation for an earlier offense involving data theft, and his agreement required him to stay off Xbox Live.

May's Background:

  • Previously arrested at a gaming convention in Boston for attempting to download source code
  • Made a deal with prosecutors to avoid prison time
  • Required to report any cybercrime activities
  • Used his position within Xbox Underground to gather evidence

The Investigation Deepens: In 2017, the FBI seized a new BMW coupe and $38,595 in cash hidden throughout May's home, indicating he was continuing criminal activities even while serving as an informant.

International Cooperation

The Xbox Underground investigation required unprecedented cooperation between law enforcement agencies across multiple countries:

International Scope:

  • FBI coordinated with Canadian authorities for Pokora's arrest
  • Australian law enforcement sought Dylan Wheeler (who fled)
  • Multiple simultaneous arrests across different jurisdictions
  • Extradition proceedings for foreign nationals

David Pokora's Arrest

On March 28, 2014, David Pokora made what he thought would be a routine trip to Delaware to buy car parts. Instead, it became the end of his criminal career. U.S. Customs officers arrested him at the Lewiston-Queenston Bridge, making him the first foreign hacker ever to be sentenced on U.S. soil for stealing trade secrets.

The Arrest:

  • Pokora was traveling with his father to meet Justin May
  • U.S. authorities had been monitoring the group's communications
  • Border arrest ensured he was on U.S. soil for prosecution
  • Triggered a coordinated series of arrests worldwide

David Pokora - 18 months in federal prison

  • First foreign hacker sentenced on U.S. soil for trade secret theft
  • Pleaded guilty to conspiracy to commit computer fraud and copyright infringement
  • Released in July 2015
  • Required to pay restitution

Austin Alcala - Federal prison sentence

  • Pleaded guilty to conspiracy to commit computer intrusions and criminal copyright infringement
  • Admitted to personally hacking Microsoft and Zombie Studios
  • Transmitted database containing 11,266 stolen login credentials

Sanadodeh Nesheiwat - 18 months in federal prison

  • Sentenced on June 11, 2014
  • Cooperated with authorities during investigation

Nathan Leroux - Federal charges

  • Part of the 18-count superseding indictment
  • Faced charges related to the conspiracy

Dylan Wheeler - Fled prosecution

  • Escaped to Czechoslovakia before arrest
  • Never faced trial for his crimes
  • Provided information to gaming blogs about the group's activities

Justin May - 7 years in federal prison (separate case)

  • Sentenced in June 2021 for defrauding tech companies of $3.5 million
  • Exploited warranty policies to receive replacements that were sold online
  • Continued criminal activities even while serving as FBI informant

Financial Impact

Total Damage:

  • Estimated $100-200 million in stolen intellectual property
  • Additional costs for victims' incident response and security improvements
  • FBI seized over $620,000 in cash and proceeds related to the crimes

Technical Analysis: How Xbox Underground Operated

Initial Access Methods

Hardware Exploitation:

  • Used Xbox 360 development kits to access PartnerNet
  • Exploited JTAG vulnerabilities in retail consoles
  • Reverse-engineered Xbox hardware and firmware
  • Used stolen dev kits to maintain persistent access

Network Infiltration:

  • Gained initial access through gaming networks
  • Escalated privileges using stolen credentials
  • Moved laterally between connected corporate networks
  • Maintained persistence through multiple compromise methods

Advanced Persistent Threat Tactics

Xbox Underground demonstrated many characteristics of advanced persistent threat (APT) groups:

Persistence:

  • Maintained access to Microsoft networks for over two years
  • Established multiple pathways into target networks
  • Used legitimate dev kits to blend in with authorized users

Stealth:

  • Operated primarily through legitimate development channels
  • Avoided detection by using authorized hardware and software
  • Minimized suspicious activities that might trigger security alerts

Data Exfiltration:

  • Systematically copied source code and intellectual property
  • Stole login credentials for future access
  • Obtained technical specifications for unreleased products

Social Engineering Elements

While primarily technical, Xbox Underground also used social engineering:

Community Infiltration:

  • Integrated into legitimate Xbox development communities
  • Built relationships with industry insiders
  • Leveraged trust within gaming forums and chat rooms

Information Gathering:

  • Used public information to target specific companies
  • Researched corporate structures and development processes
  • Identified high-value targets within gaming companies

The Broader Impact: How Xbox Underground Changed Cybersecurity

Microsoft's Response

Immediate Actions:

  • Revoked access to compromised PartnerNet accounts
  • Implemented additional security measures for development networks
  • Enhanced monitoring of development kit usage
  • Improved physical security at corporate facilities

Long-Term Changes:

  • Complete overhaul of developer authentication systems
  • Enhanced network segmentation for development environments
  • Stricter controls on development hardware distribution
  • Improved incident response procedures

Industry-Wide Security Improvements

Gaming Industry Changes:

  • Enhanced security for pre-release content
  • Better protection of development networks
  • Improved vendor security requirements
  • Industry-wide sharing of threat intelligence

Development Community Impact:

  • Stricter vetting of development partners
  • Enhanced security training for developers
  • Better protection of source code and technical specifications
  • Improved physical security for development hardware

International Cybercrime Law:

  • First foreign national sentenced in U.S. for trade secret theft
  • Established precedent for international cybercrime prosecution
  • Demonstrated effectiveness of cross-border law enforcement cooperation

Corporate Security Responsibilities:

  • Highlighted duty to protect intellectual property
  • Emphasized importance of insider threat detection
  • Established liability for inadequate security measures

Lessons Learned: What Xbox Underground Teaches Us

The Gaming-to-Cybercrime Pipeline

The Xbox Underground case illustrates how innocent gaming interests can evolve into serious cybercrime:

Progression Stages:

  1. Curiosity Phase: Interest in how games and consoles work
  2. Modification Phase: Beginning to alter software and hardware
  3. Community Phase: Joining online hacking communities
  4. Skill Development: Learning advanced technical skills
  5. Boundary Testing: Pushing legal and ethical limits
  6. Criminal Phase: Engaging in clearly illegal activities
  7. Escalation Phase: Increasing sophistication and impact

Psychological Factors

Risk Perception:

  • Teenagers often fail to understand long-term consequences
  • Gradual escalation makes serious crimes seem normal
  • Group dynamics encourage increasingly risky behavior
  • Gaming culture can normalize rule-breaking behavior

Motivation Evolution:

  • Started with technical curiosity and gaming passion
  • Evolved to include profit motives and social status
  • Developed into competition and thrill-seeking
  • Eventually became addiction to power and access

Prevention Strategies

For Organizations:

  • Implement robust insider threat detection
  • Monitor development hardware and software usage
  • Enhance physical security for sensitive facilities
  • Provide security awareness training for all employees

For Parents and Educators:

  • Understand the difference between healthy technical curiosity and potentially criminal behavior
  • Monitor children's online activities and communities
  • Educate about legal and ethical boundaries in technology
  • Provide constructive outlets for technical interests

For Young Hackers:

  • Understand that curiosity can lead to serious legal consequences
  • Seek legitimate channels for technical exploration
  • Consider careers in cybersecurity and ethical hacking
  • Understand that "everyone else is doing it" is not a legal defense

The Human Cost: Lives Destroyed by Digital Crime

David Pokora's Downfall

Pokora's journey from curious teenager to convicted felon illustrates the personal cost of cybercrime:

Academic Destruction:

  • Grades suffered as gaming obsession took over
  • Computer science studies derailed by criminal investigation
  • Future career prospects permanently damaged

Legal Consequences:

  • 18 months in federal prison
  • Permanent criminal record
  • Difficulty finding employment in technology sector
  • Ongoing restitution payments

Personal Impact:

  • Family shame and embarrassment
  • Loss of friends and professional relationships
  • Psychological trauma from imprisonment
  • Difficulty rebuilding life after release

The Ripple Effects

Families:

  • Parents faced legal costs and public shame
  • Siblings affected by family notoriety
  • Long-term financial impact from legal fees and restitution

Victims:

  • Microsoft employees whose credentials were stolen
  • Game developers whose work was leaked
  • Military personnel whose training systems were compromised
  • Gaming community trust damaged

Modern Implications: Xbox Underground's Lasting Legacy

Current Threat Landscape

Evolution of Gaming Cybercrime:

  • Increased sophistication of gaming-related attacks
  • Growth of underground markets for gaming exploits
  • Expansion into mobile gaming and cloud platforms
  • Integration with traditional cybercrime networks

Corporate Security Challenges:

  • Protecting intellectual property in gaming industry
  • Securing development environments and pre-release content
  • Managing insider threats in creative industries
  • Balancing security with developer productivity

Parallels to Modern APT Groups

Xbox Underground's tactics share similarities with today's advanced persistent threats:

Nation-State Comparisons:

  • Long-term persistence in target networks
  • Systematic intellectual property theft
  • Use of legitimate credentials and tools
  • Multi-year operations with clear objectives

Criminal Organization Parallels:

  • International membership and coordination
  • Specialization of roles within the group
  • Monetization of stolen digital assets
  • Use of cryptocurrency for transactions

Defense Strategies for Today

Technical Controls:

  • Zero-trust network architecture
  • Enhanced monitoring of privileged accounts
  • Behavioral analytics for anomaly detection
  • Micro-segmentation of development networks

Human-Centric Security:

  • Insider threat awareness programs
  • Regular security training for developers
  • Psychological screening for sensitive positions
  • Clear reporting mechanisms for suspicious activity

Legal and Compliance:

  • Clear policies on acceptable use of company resources
  • Regular audits of access controls and permissions
  • Incident response plans for intellectual property theft
  • Coordination with law enforcement agencies

Conclusion: The Enduring Legacy of Xbox Underground

The Xbox Underground case stands as one of the most significant cybercrime investigations of the 2010s, not because of sophisticated malware or nation-state attacks, but because it demonstrated how ordinary teenagers with gaming interests could cause extraordinary damage to major corporations and national security.

Key Takeaways:

Technical Skills Alone Are Not Enough: Xbox Underground had impressive technical abilities, but their lack of ethical guidance and poor decision-making ultimately led to their downfall.

Gaming Culture and Cybercrime: The case highlights the need for better understanding of how gaming communities can serve as recruiting grounds for cybercriminals.

International Cooperation Works: The successful prosecution of Xbox Underground demonstrated that law enforcement agencies can effectively coordinate across international boundaries to combat cybercrime.

Prevention Is Better Than Prosecution: While the FBI successfully dismantled Xbox Underground, the damage to victims was already done. Prevention through better security practices and ethical education is more effective than reactive law enforcement.

Personal Consequences Are Real: The human cost of cybercrime extends beyond legal penalties to include destroyed careers, damaged relationships, and lifetime consequences for poor decisions made as teenagers.

The Ongoing Challenge

As technology continues to evolve, new generations of young hackers will face the same temptations that led Xbox Underground down their path of destruction. The gaming industry, law enforcement, and society as a whole must work together to:

  • Provide legitimate outlets for technical curiosity
  • Educate young people about legal and ethical boundaries
  • Improve corporate security practices
  • Develop better methods for detecting and preventing insider threats
  • Create paths for former hackers to contribute positively to cybersecurity

The story of Xbox Underground serves as both a cautionary tale and a call to action. In our increasingly digital world, we must find ways to nurture the technical talents of young people while ensuring they understand the real-world consequences of their actions in cyberspace.

David Pokora once said, "As much as I consciously made the decisions I did, I never meant for it to get as bad as it did." This statement encapsulates the tragedy of Xbox Underground – brilliant young minds who let their curiosity and poor judgment destroy their futures and harm countless others. Their story reminds us that in the digital age, the line between harmless exploration and serious crime can be thinner than we think, and the consequences of crossing it can last a lifetime.


This article is based on publicly available court documents, FBI press releases, and journalistic investigations. The story serves as an educational resource about the risks of cybercrime and the importance of ethical behavior in technology. All technical information is presented for educational purposes only.

Sources:

[1] Wired.com - The Teens Who Hacked a Video Game Empire—and Went Too Far (2018)

https://www.wired.com/story/xbox-underground-videogame-hackers/

[2] Hackread.com - Canadian Hacker Jailed in U.S. for Hacking Military and Xbox (2015)

https://www.hackread.com/canadian-hacker-jailed-hacking-us-military-xbox/ 

[3] Se7en Sins - Tools [App] Alteration 0052 (2009)

https://www.se7ensins.com/forums/threads/app-alteration-0052.78806/

[4] The Star - Broken bumper helped break international hacking case (2014)

https://www.thestar.com/news/gta/broken-bumper-helped-break-international-hacking-case/article_dcfeb0db-0586-5d5a-b205-db1dce001911.html

[5] CBC - David Pokora, Toronto-area man, sentenced to 18 months in prison for U.S. hack (2015)

https://www.cbc.ca/news/canada/toronto/david-pokora-toronto-area-man-sentenced-to-18-months-in-prison-for-u-s-hack-1.3108938

[6] United States District Court for the District of Delaware (2014) S.15, S19, S.23, S.25, https://darknetdiaries.com/imgs/xbox-hacking-indictment.pdf

[7] Justice.gov - Four Members of International Computer Hacking Ring Indicted for Stealing Gaming Technology, Apache Helicopter Training Software (2014)

https://www.justice.gov/opa/pr/four-members-international-computer-hacking-ring-indicted-stealing-gaming-technology-apache

[8] Delaware Online - Two plead guilty in international hacker case (2014)

https://eu.delawareonline.com/story/news/local/2014/09/30/two-plead-guilty-gaming-hacker-case/16475553/

[9] Darknetdiaries - EP 45: XBox Underground (Part 1) (2019)

https://darknetdiaries.com/episode/45/

[10] Darknetdiaries - EP 46: XBox Underground (Part 2) (2019)

https://darknetdiaries.com/episode/46/

[11] CNet.com - Microsoft Xbox at 20: Looking back at the original 2001 review (2021)

https://www.cnet.com/tech/gaming/microsoft-xbox-at-20-looking-back-at-the-original-2001-review/

[12] Xenatera.com - bunnie's adventures hacking the Xbox (2017)

https://web.archive.org/web/20170702172142/http://www.xenatera.com/bunnie/proj/anatak/xboxmod.html

[13] Hackingthebox.com - (An Introduction to Reverse Engineering)      Andrew "bunnie" Huang (2017) https://web.archive.org/web/20170704093734/http://www.hackingthexbox.com/

[14] Darknetdiaries - EP 45: Xbox Underground (Part1) Transcript (2019)

https://darknetdiaries.com/transcript/45/

[15] Bungie.net - ODST Dev Kit Leaks (Aquired Through Partner Net) (2009)

https://www.bungie.net/en-US/Forums/Post/47590256?sort=0&page=0&path=1

[16] Kotaku - The Rise And Fall Of SuperDaE, A Most Unusual Aussie Game Hacker (2013)

https://www.kotaku.com.au/2013/02/the-rise-and-fall-of-superdae-a-most-unusual-aussie-game-hacker/

[17] NBC News - Playable 'Gears of War 3' game leaked to Internet (2011)

https://www.nbcnews.com/tech/tech-news/playable-gears-war-3-game-leaked-internet-flna122549

[18] Neograf.com - Warning: Gears of War 3 leaked! (2011) 

https://www.neogaf.com/threads/warning-gears-of-war-3-leaked.435976/

[19] GamePro - Gears of War 3 - Leak - Microsoft bezieht Stellung (2011)

https://www.gamepro.de/artikel/gears-of-war-3-leak-microsoft-bezieht-stellung,1970649.html

[20] IndyStar - He was arrested on federal hacking charges as an HSE senior. Now he's trying to make good. (2021)

https://eu.indystar.com/story/news/local/hamilton-county/2021/03/29/former-xbox-underground-hacker-tries-make-good-cybersecurity/4633472001/

[21] IGN - Gears of War 3 Leak & PlayStation 4 Rumor - IGN Daily Fix, 7.05.11 (2011)

https://www.youtube.com/watch?v=CKnsAeslg5g

[22] Kotaku - Suspected Game Code Thief On the Lam [Update] (2010)

https://kotaku.com/suspected-game-code-thief-on-the-lam-update-5505341

[23] Kotaku - Man Arrested Allegedly Trying To Steal Early Copy of Game At Convention (2010) https://kotaku.com/man-arrested-allegedly-trying-to-steal-early-copy-of-ga-5505347

[24] United States Attorney’s Office Eastern District of Pennsylvania - Delaware Man Sentenced to Over Seven Years for Defrauding Cisco Systems, Microsoft, Lenovo, and APC Out of More than $3.5 million in Computer Hardware (2021)

https://www.justice.gov/usao-edpa/pr/delaware-man-sentenced-over-seven-years-defrauding-cisco-systems-microsoft-lenovo-and

[25] Kotaku - The Next Xbox is Code-Named...Durango (2012)

https://kotaku.com/the-next-xbox-is-code-named-durango-5885539

[26] Winfuture.de - Microsoft XBOX Durango Development Kit (2012)

https://scr.wfcdn.de/7806/Durango-Devkit-auf-eBay-1344839955-0-0.jpg

[27] Kotaku - The Incredible Rise and Fall of a Hacker Who Found the Secrets of the Next Xbox and PlayStation—And Maybe More (2013)

https://kotaku.com/the-incredible-rise-and-fall-of-a-hacker-who-found-the-5986239

[28] Kotaku - Someone's Trying to Sell an "XBOX Durango Development Kit" on eBay [Update] (2012)

https://kotaku.com/someones-trying-to-sell-an-xbox-durango-development-ki-5933974

[29] The Verge - eBay seller claims to be auctioning a Microsoft Xbox Durango development kit (2012)

https://www.theverge.com/2012/8/12/3238444/ebay-seller-claims-to-be-auctioning-a-microsoft-xbox-durango

[30] Venturebeat.com -  Xbox Durango Ebay

https://venturebeat.com/games/xbox-durango-ebay/

[31] Gamertag Radio - Episode #373 – Podcast Exclusive Interview with SuperDAE: The Man Who Found The Next Xbox (2013)

https://www.gamertagradio.com/2013/02/episode-373-podcast-exclusive-interview-with-superdae-the-man-who-found-the-next-xbox/

[32] Gamertag Radio - Episode #373 – Podcast Exclusive Interview with SuperDAE: The Man Who Found The Next Xbox (2013)

https://www.wired.com/story/xbox-unDavid was cooperative and helpful at explaining how these exploits were used.  Prosecutors were even a little impressed with how much knowledge he had as a young man to be able to do all this.derground-video game-hackers/ 

[33] perth now - Suspected hacker Dylan Wheeler offers to return to Australia if guaranteed a ‘fair trial’ (2016)

https://www.perthnow.com.au/news/wa/suspected-hacker-dylan-wheeler-offers-to-return-to-australia-if-guaranteed-a-fair-trial-ng-89e346e0cb2a07187f07443622e29f80 

[34] The Mob Reporter - Hackers bugged by feds as they stole Call of Duty gaming data | Wiretap (2014)

https://www.youtube.com/watch?v=i74KMkOaUWM

[35] Justice.gov - Fourth Member of International Computer Hacking Ring Pleads Guilty to Hacking and Intellectual Property Theft Conspiracy (2015)

https://www.justice.gov/opa/pr/fourth-member-international-computer-hacking-ring-pleads-guilty-hacking-and-intellectual 

[36] LinkedIn - Dpokora

https://www.linkedin.com/in/dpokora/details/experience/ 

[37] IndyStar - Indiana hacker sentenced in $100 million scheme (2016)

https://eu.indystar.com/story/news/crime/2016/04/19/indiana-hacker-sentenced-100-million-scheme/83245106/ 

[38] Forbes.com - Hackers Accused Of Cheating EA Out Of Millions (2016)

https://www.forbes.com/sites/leemathews/2016/11/15/four-hackers-accused-of-cheating-ea-out-of-millions/?sh=444f22d36f88 

[39] Reddit.com - When you find out about another Trans Girl who got screwed other by a corporation and the American justice system leading to her death (details in comments) (2020)

https://www.reddit.com/r/traaaaaaannnnnnnnnns/comments/ilqvlj/when_you_find_out_about_another_trans_girl_who/

[40] The Fresno Bee - Two dead at Fresno Motel 6 in hazardous materials situation (2018)

https://www.fresnobee.com/news/local/article210526484.html

[41] Kotaku - Report: Gaming Hacker SuperDaE Facing Child Porn, Dishonesty Charges [UPDATE] (2013)

https://kotaku.com/report-gaming-hacker-superdae-facing-child-porn-disho-511993542

[42] The West Australian - Mum collapses after being jailed for helping son avoid Xbox hacking charges (2017)

https://thewest.com.au/news/crime/mum-jailed-for-helping-son-avoid-xbox-hacking-charges-ng-b88395729z

[43] Gov.uk - DAY AFTER EXPLOIT LTD (2020) 

https://find-and-update.company-information.service.gov.uk/company/11366535/filing-history

https://www.youtube.com/watch?v=V6Xjutv1Tu8  

[44] Gov.uk - Dylan WHEELER

https://find-and-update.company-information.service.gov.uk/officers/uQayGh3eq3UZap-seGrUCuJpL9A/appointments 

[45] Delaware Online - Brandywine Hundred hacker Justin May well known to federal law enforcement (2017)

https://eu.delawareonline.com/story/news/2017/06/25/justin-may-fbi-investigation/420946001/

[46] United States Attorney’s Office Eastern District of Pennsylvania - Delaware Man Sentenced to Over Seven Years for Defrauding Cisco Systems, Microsoft, Lenovo, and APC Out of More than $3.5 million in Computer Hardware (2021)

https://www.justice.gov/usao-edpa/pr/delaware-man-sentenced-over-seven-years-defrauding-cisco-systems-microsoft-lenovo-and 

Read more