Jesus Diaz2003-12-05 00:00:00 UTC

Diaz, a former AS/400 computer programer at Hellmann Logistics’ IT department, was arrested by the United States Secret Service on July 10, 2003, after having broken into Hellmann’s computer system from a remote location. During the unauthorized intrusion, Diaz deleted several programs which resulted in the malfunction of several crucial applications and over $80,000.00 in damages.

Brian Salcedo2003-11-19 00:00:00 UTC

He gained unauthorized access to the Lowes corporate computer network via an open, unsecured wireless access point used by the Lowes[1][2] chain of home improvement and hardware stores. The access point was initially discovered inadvertently by his then-roommate, Paul Timmins. Months later, Botbyl and Salcedo returned to explore and exploit the network at a store located in Southfield, Michigan.[3] They then attempted to install a program that could have allowed them to capture the credit card information of customers conducting transactions through the Southfield store. Salcedo had wanted to back out but a underground criminal using the name SoupNazi tempted him with offers to buy the stolen card data, SoupNazi later turns out to be Albert Gonzals

Adam Botbyl2003-11-19 00:00:00 UTC

He gained unauthorized access to the Lowes corporate computer network via an open, unsecured wireless access point used by the Lowes[1][2] chain of home improvement and hardware stores. The access point was initially discovered inadvertently by his then-roommate, Paul Timmins. Months later, Botbyl and Salcedo returned to explore and exploit the network at a store located in Southfield, Michigan.[3] They then attempted to install a program that could have allowed them to capture the credit card information of customers conducting transactions through the Southfield store.

Paul Timmins2003-11-19 00:00:00 UTC

Timmins, who works as a network engineer, and his then-roommate Adam Botbyl, now 21, initially stumbled across the unsecured wireless network at the Southfield, Michigan Lowes in the spring of 2003, while driving around with laptop computers looking for wireless networks -- the geek sport of "wardriving."

Adam Gilmore2003-11-18 00:00:00 UTC

Accused of attacking australian ISP Pacific Internet and Cambridge University.

Jeffrey Fudge2003-11-05 00:00:00 UTC

Fudge had been an FBI employee since 1988. Specifically, the indictment charges him with eight counts of exceeding authorized access to a government computer, in violation of 18 U.S.C. § 1030a2B&C and c2Bii and two counts of making false statements, in violation of 18 U.S.C. § 1001a2&3. If convicted on all charges, Fudge faces a statutory maximum sentence of 50 years imprisonment and a $2.5 million fine. U.S. Attorney Boyle said, "Fudges actions, as described in the indictment, make clear that he has absolutely no place in federal law enforcement. I commend the DOJ-OIG and the FBI for taking strong and appropriate action upon learning of his misdeeds. His law enforcement days are over." As an investigative analyst, Fudges duties included conducting database searches using the FBI computer system, serving subpoenas, analyzing telephone records, and generally assisting FBI agents in conducting criminal and administrative investigations. The FBI computer systems he accessed included the Automated Case Support system ACS, the National Crime Information Center NCIC, the Texas Crime Information Center TCIC, the Texas Law Enforcement Telecommunications System TLETS, and the FBI Network FBINET. He was authorized to access FBI computers and FBI computer systems and programs only for official business and "need to know."

Allan Carlson2003-10-07 00:00:00 UTC

The indictment charges that Carlson, a disgruntled Philadelphia Phillies fan, hacked into computers of unsuspecting users and from those computers launched spam e-mail attacks with long messages voicing his complaints about the Phillies management. The indictment charges that when launching the spam e-mails, Carlsons list of addressees included numerous bad addresses. When those e-mails arrived at their destinations, the indictment charges that they were "returned" or "bounced" back to the person who purportedly sent them – the persons whose e-mail addresses had been "spoofed" or hijacked. This caused floods of thousands of e-mails into these accounts in a very short period of time. "Fans have the right to voice their displeasure but these were electronic attacks with serious consequences," said Meehan, who created a separate Computer Crime section in his office in 2001. "By flooding the victim computer systems with spam e-mails, those systems and the businesses they support were severely affected. You can boo, you can turn off the TV, but you cant hijack the e-mail address of an unsuspecting user and call it passion." Meehan also noted that this is the first use of an identity theft statute against an e-mail spammer.

Brett Okeefe2003-09-29 00:00:00 UTC

It is alleged in the indictment that the object of the conspiracy was for OKEEFE and his co-conspirators to gain unauthorized access to government and military computers, copy computer files and take these files to the media in order to generate public visibility for his company. This would, in turn, lead to new clients and increased profits. It is further alleged that an additional object of the conspiracy was for OKEEFE and his co-conspirators to gain unauthorized access to private sector computers to copy information. The defendant would then use this information to contact the victim companies in an attempt to solicit their business. According to the indictment, OKEEFE and his co-conspirators possessed without authorization files belonging to the following Government agencies: National Aeronautics and Space Administration NASA, United States Army, United States Navy, Department of Energy and National Institutes of Health.

Unknown 2003-09-23 00:00:00 UTC

accused of releasing a variant of the Blaster computer worm, often described as the RPCSDBOT version of the worm, which directed infected computers to launch a distributed denial of service attack against the Microsoft Corporation.

Matthew Guerava2003-09-12 00:00:00 UTC

Accord­ing to the plea agree­ment, begin­ning in late 2000 and con­tin­u­ing until August 2001, GUE­VARA oper­ated a scheme to defraud cus­tomers of the Microsoft Net­work MSN. He first cre­ated false email accounts with the Inter­net Ser­vice Provider Hot­mail and an unau­tho­rized web­site with the address www​.msnbilling​.com through the Inter­net Ser­vice Provider Yahoo! GUE­VARA then sent MSN cus­tomers email mes­sages, pur­port­ing to come from MSN, that directed the cus­tomers to the fraud­u­lent www​.msnbilling​.com web­site and asked them to ver­ify their accounts by pro­vid­ing their name, MSN account and credit card infor­ma­tion. Each time a cus­tomer entered the infor­ma­tion, the web­site auto­mat­i­cally for­warded it to one of GUEVARA’s false Hot­mail accounts. GUE­VARA used the stolen credit card information himself and pro­vided it to another per­son as well.

Adrian Lamo2003-09-09 00:00:00 UTC

In February 2002 he broke into the internal computer network of The New York Times, adding his name to the internal database of expert sources, and using the papers LexisNexis account to conduct research on high-profile subjects.

Pavel Vladislav2003-09-08 00:00:00 UTC

Earlier this summer, a hacker with the alias Deepsy demanded $1,500 each from at least three online smut-selling firms. If the companies refused to pay, he warned, hed crash their Internet operations with distributed denial-of-service attacks. One site took as many as 745 million hits per day during what was believed to be a Deepsy-coordinated assault.

Kerry Gonzalez2003-09-01 00:00:00 UTC

Distributed advance "work print" copy of The Hulk

Jeffery Parson2003-08-29 00:00:00 UTC

knowingly developed and released onto the Internet the B variant of the Blaster computer worm

Walter Wiggs2003-08-25 00:00:00 UTC

According to the criminal complaint filed in the U.S. District Court in Los Angeles, Wiggs was previously employed as a computer technician for Technology for Business Corporation TFBC, a Manhattan Beach-based technology corporation. TFBC specializes in developing customized software including an interactive voice response system for telephone call centers. TFBC customers include numerous government agencies and private companies. Wiggs was laid off from his position as a computer technician for TFBC in June 2003. He subsequently used a computer at his home in Douglasville, Georgia to gain unauthorized access to approximately 13 computers that used TFBCs interactive voice response software including systems used by the Los Angeles County Department of Children and Family Services, City of San Diego, City of Modesto and the Orange County District Attorneys Office. In particular, Wiggs caused significant disruption to the Los Angeles County Child Protection Hotline from July 1, 2003 through July 4, 2003 by deleting critical configuration files from the system. As set forth in the complaint, the hotline is used by citizens as well as police officers, hospitals, and mental health workers to report cases of child abuse or neglect that require an immediate response. After the system was disabled, callers to the hotline were unable to speak to an agency official or the calls were significantly delayed.

Daniel Baas2003-08-12 00:00:00 UTC

Gregory G. Lockhart, United States Attorney for the Southern District of Ohio; Hamilton County Sheriff Simon Leis; James Emery, Special Agent in Charge, United States Secret Service; and Kevin Brock, Special Agent in Charge, Federal Bureau of Investigation, announced the plea entered today before United States District Judge Susan J. Dlott. Baas was charged in August with illegally accessing, or "hacking" into a protected computer and stealing customer databases from Acxiom, a Little Rock, Arkansas-based company that manages customer information for credit card issuers, banks, automotive manufacturers, retailers and others. The total cost to Acxiom of Baass intrusion and theft of data is more than $5.8 million. Baas faces a maximum penalty of five years in prison, a fine of $250,000 or twice the amount of gain or loss, and three years of supervised release. According to a statement of facts filed with the guilty plea, Baas was the computer systems administrator for a Cincinnati company that did business with Acxiom. Baas was allowed to download files set aside for his employer on Acxiom computers. "Baas committed a crime when he exceeded his authorized access, looked for and downloaded an encrypted password file, and ran a password cracking program against the file,"

Brad McGourty2003-08-01 00:00:00 UTC

warez group trading software with retail value of $1,000,000

Charles Yurek2003-08-01 00:00:00 UTC

admitted to downloading Windows XP to home computer

Joseph McElroy2003-07-10 00:00:00 UTC

First-year university student sought shared internet storage for music, games and warez. Compromised site was a US Department of Energy research lab.

Mario Castillo2003-07-07 00:00:00 UTC

It alleges that between July 13, 2000 to November 12, 2002, Castillo intentionally exceeded his authority and accessed an FBI computer on six different occasions for the purpose of private financial gain. The indictment also alleges that Castillo knowingly and willfully lied to federal agents when questioned about other paid employment, financial indebtedness, providing confidential information to unauthorized persons, as well as ties and associations with a convicted felon. The second indictment charges Castillo with one count of trafficking in and using an unauthorized access device with intent to defraud. It alleges that from October 2002 to January 2003, Castillo collected more than $1,000 in money or other things of value from trafficking in and using stolen cellular telephones. The third indictment charges Castillo with one count of possession of child pornography, one count of receiving child pornography via the Internet and two counts of receipt of obscene material. On May 9, 2003, FBI agents seized a computer from Castillo’s residence. On that computer, investigators discovered several video files and more than a dozen images depicting minors engaged in sexually explicit conduct and containing obscene material. “Employees of the Department of Justice are entrusted to uphold the laws of this country, not violate them,” stated U.S. Attorney Johnny Sutton. “Those employees who commit unethical and illegal activities will be held accountable. These indictments are proof of that.” “The Department of Justice, as its name implies, expects all employees to maintain the utmost integrity and to uphold the high ethical standards set by our Attorney General. Anything less is a disservice to the general public,” stated Stephen P. Beauchamp, Special Agent in Charge, DOJ Office of Inspector General. “It is the role of the Office of the Inspector General to help safeguard that integrity and to work jointly, yet independently, to fully investigate all instances of employee wrongdoing – particularly when there is a potential compromise of confidential law enforcement information.” “The El Paso FBI is devastated by the overwhelming sense of betrayal we feel. However, I’m proud of the office for steadfastly adhering to our motto of Fidelity, Bravery and Integrity,” stated Hardrick Crawford, Jr., Special Agent in Charge, Federal Bureau of Investigation. Castillo remains in federal custody pending a detention hearing next week before U.S. Magistrate Norbert Garney. Castillo faces up to ten years in federal prison if convicted of the access device charge. Each of the remaining charges call for up to five years in federal prison upon conviction.

David Russo2003-07-01 00:00:00 UTC

Warez group trading software with retail value of $1,000,000, Tester for warez group DrinkOrDie

Lynn Htun2003-05-07 00:00:00 UTC

believed to be the brains behind the infamous Fluffi Bunni hacking group,

Albert Gonzalez2003-05-01 00:00:00 UTC

He was first arrested for hacking in 2003, but he became a government informant, helping the Secret Service find other hackers. Wired reports that Gonzalez even earned ‘$75,000 a year working undercover for the U.S. Secret Service.’ But prosecutors said that over the next five years, he hacked into the computer systems of major retailers while continuing to be an informant for the government. During that time, authorities said, he amassed $2.8 million and lived a lavish lifestyle. As part of the plea deals, Gonzalez must forfeit more than $2.7 million, plus his Miami condo, car, Rolex watches and a Tiffany ring he gave to his girlfriend. Authorities said Gonzalez and two foreign co-defendants used hacking techniques that involved “wardriving,” or cruising through different areas with a laptop computer and looking for retailers’ accessible wireless Internet signals. Once they located a vulnerable network, they installed “sniffer programs” that captured credit and debit card numbers as they moved through a retailer’s processing computers - then tried to sell the data overseas.

Patrick Murphy2003-04-02 00:00:00 UTC

stealing trade secerts

William Fitzgerald2003-04-01 00:00:00 UTC

Operated web site allowing downloads of between $40,000 and $70,000

Loren Anderson 2003-03-27 00:00:00 UTC

Loren is accused of masterminding an identity-theft operation that was used to illegally withdraw cash from ATMs on Long Island.

John Racine II2003-03-26 00:00:00 UTC

Turned himself in and pleaded guilty to obtaining access to Al administration and redirecting the website to another domain.

Christopher Phill2003-03-14 00:00:00 UTC

The Complaint alleges that Phillips wrote and executed a computer program that permitted him to gain unauthorized access to a database at the University of Texas at Austin and to download tens of thousands of names and social security numbers. On March 5, 2003, Secret Service agents carried out search warrants at Phillips residences in Austin and Houston and seized several computers. On a computer found in his Austin residence, agents recovered downloaded names and social security numbers and the computer program used to access the UT database. U.S. Attorney Johnny Sutton commended the efforts of the United States Secret Service, The University of Texas at Austin, and the Texas Attorney Generals Internet Bureau for its handling of this case. Upon learning about the unauthorized computer access, the University immediately contacted law enforcement and cooperated fully in the investigation. The Secret Service, in turn, with the assistance of the Internet Bureau and UT Police Department, responded swiftly to pinpoint the source of the unauthorized accesses, obtain and execute search warrants, identify the suspect, and recover the stolen data as quickly as possible. The University subsequently moved promptly to inform the public and those whose Social Security numbers may have been included in this data theft.

Adil Shakour2003-03-13 00:00:00 UTC

According to court documents, during an ongoing investigation, investigators with the Sacramento Valley Hi-Tech Crimes Task Force and the FBI Sacramento Office determined that defendant Shakour committed a series of unauthorized computer intrusions into four separate computer systems inside and outside of California. Additionally, defendant Shakour obtained credit card and personal information from one of the unauthorized computer intrusions and used the information to commit credit card fraud concerning individuals from around the country. After pursuing investigative leads, on October 8, 2002 a federal search warrant was executed at defendant Shakours Los Angeles residence which confirmed the unauthorized intrusions and credit card fraud along with other evidence. Computer Intrusion at Pro Systems, Inc. and Credit Card Fraud According to the plea agreement, between August 2001 and May 10, 2002, and also on June 22, 2002, and September 10, 2002, defendant Shakour hacked into a computer of, located in Mathews, North Carolina, which is a subsidiary of Pro Systems, Incorporated. Defendant Shakour gained unauthorized access with the intent to obtain the credit card and personal information from the website, which he then used to purchase items for his personal use. The credit card victims were located around the country, including in Austin, Texas; Granada Hills, California; Colchester, Connecticut; Rockford, Illinois; Lenexa, Kansas; and Rockhill, South Carolina. The fraudulent credit card purchases totaled approximately $7,167. Some of the items purchased included a ring valued at approximately $2,000; a bracelet worth about $1,500; and a necklace worth approximately $500; six two-way pagers; a Sony Playstation 2; and miscellaneous computer parts including ten Network Interface Cards and two routers. Law enforcement officials contacted each victim who indicated the charges were not authorized. Other Computer Intrusions at Eglin Air Force Base in Florida, Accenture in Chicago, Illinois, and Sandia National Laboratories in Livermore, California According to court documents, on April 26 and 27, 2002, and May 3 and 6, 2002, defendant Shakour made a series of unauthorized computer intrusions into a server at Eglin Air Force Base, a federal military base in Florida. The objective of the intrusion was to compromise the integrity of the system, obtain root-level administrator access to the system, and to deface the web site. Shortly after the intrusion, the Web page hosted by the computer was defaced. The text of the defacement denounced the Israeli advancement into Palestine and gave credit to "Anti India Crew" AIC for the defacement. The defendants defacement of the web site and unauthorized access resulted in losses preliminarily estimated to be approximately $75,000. On May 5, 2002, defendant Shakour made an unauthorized computer intrusion from California into the computers of Accenture, a management consulting and technology services company, based in Chicago, Illinois. The defendants unauthorized access, which compromised the system, resulted in losses preliminarily estimated to be approximately $15,200. On May 6, 2002, defendant Shakour made an unauthorized computer intrusion from California into an unclassified network computer at the Sandia National Laboratories in Livermore, California. The defendants unauthorized access, which compromised the system, resulted in losses preliminarily estimated to be approximately $2,732.36. According to Assistant U.S. Attorney Mark L. Krotoski, who is prosecuting the case, defendant SHAKOUR faces a maximum penalty of five years and a fine of up to $250,000 for committing fraud and related activity in connection with computers. On the credit card fraud charge, the maximum sentence is ten years and a fine of $250,000. Krotoski added that in the plea agreement, the defendant agreed to make total restitution for his conduct, which is estimated to be approximately $100,000, and will be determined during the sentencing process

Charmaine Northern2003-03-10 00:00:00 UTC

During the plea hearing, NORTHERN admitted that during the period from January 22, 2001 through October 26, 2002, while she was employed as a member service representative of Schools Federal Credit Union in Sacramento, California, she used the credit union computer to obtain customer account information, including names, social security and drivers license numbers and addresses, to open accounts in the names of others and incur unauthorized charges. Some of the credit card accounts were opened on the Internet. After the credit cards were established in the names of other customers, defendant NORTHERN used the credit cards to make numerous purchases. The estimated amount of the fraudulent transactions is approximately $53,376.