Shannon Stafford2020-09-24 00:00:00 UTC
According to court documents and evidence presented at his four-day trial, from Jan. 5, 2004 through Aug. 6, 2015, Shannon Stafford, 50, of Crofton, Maryland, was employed in the information technology (IT) department at Business A, a global company with thousands of employees and offices around the world, including in Maryland and Washington, D.C. Stafford was employed in the Washington office and provided IT technical support to employees based at, or visiting, the Washington, McLean, Virginia, or Baltimore offices. As part of his duties, Stafford had access to the system login credentials of other employees and was authorized to use them in the course of performing his technical support duties. Stafford was also responsible for disabling company users’ network access credentials at the end of their employment. In 2014, Business A provided Stafford with a laptop to use for his work.
Ankur Agarwal2020-09-01 00:00:00 UTC
accused of installing keyloggers
Tyler King2020-08-13 00:00:00 UTC
sentenced today to 57 months in prison for computer fraud and aggravated identity theft in connection with his hacking of a New York-based technology company.
Anthony Robinson2019-12-20 00:00:00 UTC
Kristopher Ives2019-10-18 00:00:00 UTC
According to court documents, in 2008, Ives began working as a computer programmer for Gearbox Studios, a Portland-based digital marketing agency. Ives eventually became Gearbox Studio’s lead programmer for server architecture and support, a position of trust with access to the computer networks and data of both the company and the company’s clients.
David Dorsett2019-10-10 00:00:00 UTC
accused of making threats of cyber attacks to a lawyer.
Svetoslav Donchev2019-09-20 00:00:00 UTC
Police investigators were led to Donchev when they discovered an email address in computer files of convicted cyber hacker Grant West. When he was arrested in his home in Pleven, Bulgaria, where he lived with his parents, Bulgarian and Metropolitan Police investigators found folders on his computer revealing the extent of his criminal activities. They established that he had created website scripts for up to 53 UK based companies, or companies with a UK footprint. They estimated there were a potential half a million victims as a result of his criminal activity. Sarah Jennings, CPS prosecutor, said: “Donchev’s criminal activity facilitated the compromise of hundreds of thousands of victims’ personal details and banking credentials by the theft of their personal banking details. Phishing scams cause enormous stress, upset, inconvenience and loss to users and customers of websites. They also result in huge losses to the organisations and companies affected.
cameron lacroix2019-09-13 00:00:00 UTC
Following his release from custody, and while serving a term of supervised release, Lacroix obtained employment, working as a manager for a company from approximately August to November 2018 when the company discovered that Lacroix had engaged in a fraud scheme that compromised the company’s computer system. The company discovered that Lacroix used the usernames and passwords of other employees to load funds onto pre-paid credit cards, which he then used to withdraw cash at ATMs. Thereafter, the Court revoked Lacroix’s supervised release in both criminal cases. Judge Saris sentenced Lacroix to nine months for the violation and, yesterday, Judge Wolf sentenced Lacroix to 15 months in prison, to be served consecutively.
Casey Viner2019-09-13 00:00:00 UTC
In his plea, Viner admitted he argued with co-defendant Shane Gaskill while playing Call of Duty World War II online. Viner contacted co-defendant Tyler Barriss and asked him to swat Gaskill, Viner thought Gaskill lived at 1033 W. McCormick in Wichita. In fact, Gaskill gave Viner and Barriss a false address. Barriss called Wichita police and reported a hostage situation at 1033 W. McCormick. Police responded, believing they were dealing with a man who had shot his own father and was holding family members hostage. Andrew Finch, who lived at the address, did not know why police were at his home when he stepped onto the porch. When Finch made a move that startled officers, he was shot and killed.
Clinton Jean-Pierre2019-08-30 00:00:00 UTC
Jean-Pierre admitted to fraudulently accessing the Internal Revenue Service (IRS) eAuthentication online taxpayer system, which has servers located in Berkeley County, in December 2017. In order to pass IRS security protocols, Jean-Pierre admitted that he fraudulently “ported” an unknowing person’s cellular telephone number to his own phone in order to obtain the security code necessary to create an unauthorized taxpayer account. Once in the IRS eAuthentication system, Jean-Pierre admitted he gained access to a taxpayer’s tax return information which included the taxpayer’s personal identifying information.
Yanyan Lesser2019-08-21 00:00:00 UTC
attempted to hire a hitman to disable her boyfriend
Brandon Spann2019-07-23 00:00:00 UTC
accused of cyberstalking
Leiani Hillis 2019-07-10 00:00:00 UTC
Hillis used her employee issued credit card to make unauthorized purchases for her personal benefit totaling $632,718.99.
Justin Potts2019-07-09 00:00:00 UTC
accused of breaching accounts of upto 150 people and keeping their personal information.
Michael Golightley2019-07-01 00:00:00 UTC
Accused of ddosing a internet provider over a ad removal. During trial, prosecutors presented evidence that Golightley contacted an entity called DDosCity to arrange for a series of attacks on Nex-Tech’s computers.
David Tinley2019-06-23 00:00:00 UTC
Tinley intentionally inserted logic bombs into computer programs that he designed for Siemens Corporation. The logic bombs ensured that the programs would malfunction after the expiration of a certain date. As a result, Siemens was unaware of the cause of the malfunction and required Tinley to fix these malfunctions.
Rodney Phipps2019-06-18 00:00:00 UTC
According to allegations in the Indictment, from in or around August 2015 through August 2017, Phipps placed swatting calls from Delaware to police departments and emergency dispatch centers across the country, including calls to Harrison, New Jersey; Opelousas, Louisiana; Russel County, Kentucky; Pasco County, Florida; and Forsyth County, Georgia. Those swatting calls included false reports that murder, shooting incidents, arson, and a hostage situation had taken place or would take place.
Muftau Adamu2019-06-07 00:00:00 UTC
accused of connection with a fraud scheme based in the Republic of Ghana (“Ghana”) involving the theft of over $10 million through business email compromises and romance scams that targeted elderly victims from at least 2014 through 2018.
Christopher Zamarripa2019-05-20 00:00:00 UTC
Zamarripa caused substantial emotional distress to his victims by altering photographs of their faces he downloaded from the Internet and placing them onto photographs of bodies engaged in explicit sexual activities, which he then uploaded to online pornographic websites. Zamarripa also uploaded to the same online pornographic websites unaltered images of two child victims.
Mark Bieniek2019-05-17 00:00:00 UTC
Between January 25, 2018, and February 19, 2018, Bieniek resided in North Richland Hills, Texas, while Victim 1 resided in Erie County, NY. In violation of the order of protection during this period, the defendant sent several hundred electronic messages to Victim 1 with the intent to kill, injure, harass, intimidate, or cause substantial emotional distress to Victim 1 or to place Victim 1 in reasonable fear of the death of or serious injury to herself or her partner, Victim 2. Among the messages:
Rita Alielnour2019-04-30 00:00:00 UTC
According to documents in the case, Alielnour participated in an email compromise and account takeover scheme that obtained over $335,000 during a two-day period in April 2017. As part of the scheme, Alielnour opened a bank account in the name of a non-existent business to receive fraudulent wire transfers. A victim in the Northern District of Indiana was tricked into wiring $282,000 for a down payment on a home into Alielnour’s bank account after members of the scheme spoofed the escrow officer’s email address and provided false wire instructions. A victim in Texas was tricked into wiring nearly $25,000 into Alielnour’s account believing it was payment of a business invoice. A second victim in Texas had his bank account compromised, and an unknown person wired money into Alielnour’s account.
James Alger2019-04-29 00:00:00 UTC
from 2016 to 2018, he messaged over 1,000 women he found through social media in an effort to obtain sexually explicit videos and pictures of them.
Lucson Appolon2019-04-16 00:00:00 UTC
According to the indictment, the defendants accessed victims’ personal identifying information, including names, Social Security numbers, dates of birth, and addresses on the “dark web” and then used the information to open credit cards in the victims’ names. The defendants then subscribed to Informed Delivery using the victims’ personal identifying information and a fraudulent email address created to track the delivery of credit cards to the victims’ residential mailboxes. The defendants subsequently intercepted the credit cards at the victims’ mailboxes before the victims could receive them and used those credit cards at ATMs and to purchase gift cards and other items for resale at retail establishments. The defendants traveled to states across the East Coast in furtherance of the fraud, including New Hampshire, Maine and Massachusetts.
Kristian O’Hara2019-04-03 00:00:00 UTC
According to court documents and statements made in open court, O’Hara engaged in an eighteen-month course of conduct, which occurred in Delaware, New Jersey, and New York, and which involved the harassment and intimidation of a former classmate of O’Hara’s, as well as the classmate’s parents and classmate’s romantic partner. O’Hara further admitted that he also engaged in cyberstalking conduct against other victims throughout this period, including former high school classmates, office co-workers, and others who rejected his advances.
Ryan Gustafson2019-03-22 00:00:00 UTC
International Counterfeit Currency Operation Headquartered in Uganda
Andrew Simet2019-02-28 00:00:00 UTC
Accused of using social media to make threats to law enforcement and judges.
Sergiy Usatyuk2019-02-27 00:00:00 UTC
According to the criminal information, Sergiy P. Usatyuk, 20, combined with a co-conspirator to develop, control and operate a number of booter services and booter-related websites from around August 2015 through November 2017 that launched millions of DDoS attacks that disrupted the internet connections of targeted victim computers, rendered targeted websites slow or inaccessible, and interrupted normal business operations. For instance, as of Sept. 12, 2017, ExoStresser advertised on its website (exostress.in) that its booter service alone had launched 1,367,610 DDoS attacks, and caused targeted victim computer systems to suffer 109,186.4 hours of network downtime.
Tanya English2019-02-27 00:00:00 UTC
accused of operating a large wire fraud scheme from 2013 till caught in 2017
Vishwanath Akuthota2019-02-22 00:00:00 UTC
In pleading guilty, Akuthota admitted that on February 14, 2019, he inserted a “USB Killer” device into 66 computers, as well as numerous computer monitors and computer-enhanced podiums, owned by the college in Albany. The “USB Killer” device, when inserted into a computer’s USB port, sends a command causing the computer’s on-board capacitors to rapidly charge and then discharge repeatedly, thereby overloading and physically destroying the computer’s USB port and electrical system.
Ruiyang Li2019-02-15 00:00:00 UTC
accused of selling counterfeit computer parts