Some new details here from Michael S. Schmidt of the New York Times on the F.B.I.'s investigation into the hacking of the Astros’ database.
The focus of the investigation is a small group of Cardinals employees who worked in the areas of statistical analysis and computer programming. The breaches were tracked to a computer near the team’s complex in Jupiter, Florida during spring training in 2014. How did they discover this? Well, the Cardinals’ hackers weren’t very good at the whole hacking thing:
Whoever gained access to the Astros’ network tried to take some measures used by experienced hackers to disguise their location. But, law enforcement officials said, the intruders were not adept.
“They tried to mask themselves like an experienced hacker and failed,” said a person briefed on the investigation. “It’s clear they weren’t very good at what they were trying to do.”
It’s believed that whoever hacked into the Astros’ database did so using the password of general manager Jeff Luhnow or director of decision sciences Sig Mejdal, who both worked for the Cardinals at one point. While the hackers’ incompetence led investigators to a single computer, pinning down exactly who accessed the Astros’ database has proven “very difficult,” as multiple people could have used the computer at different times. However, Schmidt hears that at least four members of the Cardinals’ baseball operations staff have hired criminal defense lawyers.
Evan Drellich of the Houston Chronicle reports that Luhnow was back with the Astros today for the first time since the story broke last week, but he refused to comment on situation. That’s to be expected, as the federal investigation is ongoing.