INGATE

From The Sip Trunking Experts

TMCNet:  Loveland Man Pleads Guilty to Conspiracy to Commit Internet Extortion

[November 16, 2012]

Loveland Man Pleads Guilty to Conspiracy to Commit Internet Extortion

Nov 16, 2012 (JUSTICE DEPARTMENT DOCUMENTS AND PUBLICATIONS/ContentWorks via COMTEX) -- Loveland Man Pleads Guilty to Conspiracy to Commit Internet Extortion U.S. Attorney's Office November 15, 2012 Western District of Pennsylvania (412) 644-3500 PITTSBURGH--A resident of Loveland, Ohio, pleaded guilty in federal court to a charge of conspiracy to commit Internet extortion, United States Attorney David J. Hickton announced today.


Alexander Waterland, 25, of 2000 Loveland-Madeira Road, Loveland, Ohio, pleaded guilty to one count before United States District Judge Joy Flowers Conti.

In connection with the guilty plea, the court was advised that on April 25, 2012, Alexander Waterland, a resident of Loveland, Ohio, downloaded a large amount of data from the University of Pittsburgh server, which was located in the Western District of Pennsylvania. Waterland downloaded this data, which included identifying information of students and faculty, at the suggestion of Brett Hudson, who was his co-worker in Ohio, who sent him the weblink where the information could be downloaded from. The purpose of this download was to include it in an Internet threat that they would send to the University of Pittsburgh.

On or about April 26, 2012, using a YouTube account they had created in the name of AnonOperative13, the conspirators in Ohio created and posted a video onto YouTube claiming to be members of the hacking group Anonymous, which a loosely connected international network of computer hackers that have increasingly become associated with international hacktivism, usually with the goal of promoting Internet freedom and freedom of speech. The video claimed that the university's servers containing confidential student and instructor information had been compromised, that the university's Hydrogen server had been compromised with 200 gigabytes of data stolen and that unless the University of Pittsburgh altered their webpage domain to include an apology from the Chancellor of the University, such confidential information would be released. This video threat was received by the University of Pittsburgh staff in the Western District of Pennsylvania.

On or about April 26, 2012, an e-mail was sent by the conspirators in Ohio from an e-mail account they had created at anonoperative@gmail.com to the e-mail address at the University of Pittsburgh at webmaster@pitt.edu, which contained the weblink to AnonOperative13's YouTube extortionate threat.

On or about April 27, 2012, Brett Hudson set up a Twitter account in the name of AnonOperative13, which was associated with the anonoperative@gmail.com e-mail account and the AnonOperative13 YouTube account.

On or about April 28, 2012, Brett Hudson, from Ohio, posted a weblink to the April 26, 2012 YouTube video threat against the University of Pittsburgh by AnonOperative13 onto the Twitter account of AnonOperative13. This tweet was received by the administration of the University of Pittsburgh.

On or about May 2, 2012, the conspirators in Ohio posted a comment to the YouTube video of April 26, 2012, which was still up on YouTube. The comment, which was posted in response to numerous other comments posted by other viewers of YouTube who had seen the threat video against the University of Pittsburgh, stated, "We are not going to release this information unless Pitt admins don't follow our very simple request! We are giving Pitt until Monday, May 6, 2012, and should remain posted for no less than 15 days. To help determine if this threat is real or not, we have posted very little and near useless information but should prove our point. We also would like to mention that we have no ties with the current bomb threats as we do not condone violence or harm to any person. This would directly violate our rules of engagement. Enjoy the information and Pitt can stop the release of information; however, the morning of Monday." The bomb threats referenced by Hudson and Waterland in the posting were a series of high profile bomb threats which were sent over the Internet to the University of Pittsburgh administrators from March 30 until April 21, 2012. Similar to Hudson and Waterland's Internet demands of the administration of the University of Pittsburgh beginning five days later, the perpetrator of the bomb threats also extorted the administration of the University of Pittsburgh. As proof of their seriousness, the conspirators posted personal data they purported to have stolen from the University of Pittsburgh servers.

On May 6, the purported deadline, Hudson texted Waterland, stating, "Dude scan Pitt.edu we need something to post," indicating the need to download more data from the University of Pittsburgh server in order to make good on their threat.

On or about May 14, 2012, the conspirators in Ohio sent an e-mail to both police@pitt.edu and webmaster@pitt.edu, received on servers in the Western District of Pennsylvania from their e-mail account at anonoperative@gmail.com, which was entitled "proof of recent breech." The e-mail stated, "Do what's best, time is of the essence, so you have seven days to have the public apology to the students released...otherwise, usernames and passwords are next. We are anonymous. We are legion. We are your brothers and sisters. We are the students and faculty of Pitt. We are your worst nightmare. The Internet is here. You will now expect us." Again, the e-mail included attachments that purported to be personal information stolen from the University of Pittsburgh's computer servers in order to prove their credibility.

Judge Conti scheduled sentencing for March 13, 2013, at 3:30 p.m. The law provides for a total sentence of five years in prison, a fine of $250,000, or both. Under the Federal Sentencing Guidelines, the actual sentence imposed is based upon the seriousness of the offenses and the criminal history, if any, of the defendant.

Pending sentencing, the court continued Waterland on bond.

On October 17, 2012, Brett Hudson entered his plea of guilty for his involvement in this matter. His sentencing is set for February 8, 2013, at 2:30 p.m.

Assistant United States Attorney James T. Kitchen is prosecuting this case on behalf of the government.

The Federal Bureau of Investigation conducted the investigation that led to the prosecution of Waterland and Hudson.

[ Back To SIP Trunking Home's Homepage ]

Loading
Subscribe here for your FREE
SIP TRUNKING enewslettter.

Featured Partner


Featured Whitepapers

SIP Security for the Enterprise
Voice over IP (VoIP) is incorporated into a variety of computer networks, both public and private, and used for everyday transactions and communications among carriers, businesses, government agencies...

Making A Broadband Purchase Decision
Businesses today have many options for broadband connectivity. Clarifying your particular business needs prior to selecting a broadband provider will ensure an optimal match of broadband service to your requirements.

Voice-Optimized Network Delivers Premier Call Experience
Customers equate call quality with business quality. Real-time communication, interpersonal interaction, and the cordial tone of a call center representative can create a positive impression of your business that no email can match.

Featured Case Studies

Business Telecom Expenses Reduced 50%
A small to medium sized company in the midwest was interested in migrating to IP Communications, but in today's economy, they were hesitant to upgrade their communication system due to their perception that the cost would outweigh the benefits.

Multi-State Company Cuts Telecom Costs 50%
A multi-site, multi-state company with extensive monthly long distance fees and toll-free charges did not have adequate broadband for Broadvox SIP Trunking requirements, nor did they have a SIP enabled telephone system.

Discover Leisure Connects Remote Users to its IP-PBX
Discover Leisure is one of the largest resellers of caravans and motor homes in the UK. With 15 branch of?ces all over the country, the company spent a great deal of money every month just on internal phone calls.

Featured eBOOKS

Internet+: The Way Toward Global Unified Communication
Connecting the telephony of the enterprise PBX or Unified Communications (UC) system using SIP trunks instead of conventional telephone lines has been very successful in recent years.

What is SIP Trunking? Edition 2
SIP trunking is becoming more of a focus for service providers. One key issue many service providers face when deploying SIP trunks is NAT, or Network Address Translation, traversal.

What is SIP Trunking? Edition 1
A vast resource for information about all things SIP - including SIP, security, VoIP, SIP trunking and Unified Communications.

Featured Videos

Broadvox VAR Testimonial VAR 1:
Part 1 of the VAR (Value Added Reseller) Partner Program Testimonials for Broadvox...

E-SBCs AS The Demarcation Point:
Ingate's Steve Johnson talks to Erik Linask about the role session border controller plays as the demarcation point at...

Demystifying DPI
How can deep packet inspection protect your SIP traffic as well as your entire network?

Featured Resources

Partner Program Overview:
Over 4,000 VARs, Master Agents, Solution Providers, and Independent IT Professionals trust Broadvox. We offer customized services and solutions to fit seamlessly into any company's business model. And when you partner with Broadvox, every member of our team stands behind you and your customers 100%...

SIP Trunk UC Summit

What's New

Presenting the New Ingate/Intertex Website:
Internet+ is an extended Internet access allowing high quality SIP (Session Initiation Protocol) based real-time person-to-person communication, everywhere and for any application. It applies to both fixed and mobile networks ...

Featured Blogs

Featured Webinars

Secure SIP Trunking:
What You Need to Know

Successfully Deploying Enterprise SIP Trunking:
Tools and Techniques for Overcoming Common Roadblocks

Featured Podcasts

Getting the Most Out of Your SIP Trunks:
Ingate's Steve Johnson and TMC's Erik Linask discuss how best practices forgetting the most out of SIP Trunking services and common pitfalls to avoid.

Featured Datasheets

Ingate SIParator E-SBCs
Adopting SIP is a simple process with the Ingate SIParator, the secure enterprise session border controller (E-SBC). The SIParator makes secure SIP communications - including VoIP,SIP trunking and more - possible while working seamlessly with your existing network firewall.

Ingate Firewalls
Everyone is talking about enterprise usage of VoIP, instant messaging and other types of realtime communications including presence and conferencing.

SIP Trunk Solutions for Service Providers
The award-winning Ingate Firewall and Ingate SIParator deliver a high quality, reliable SIP trunk connection between the customer's IP-PBX and the service provider network, and solve interoperability issues to simplify deployments and support for remote diagnosis of reported issues.