Former HHS Cybersecurity Director Convicted on Child Porn Charges
Posted on August 27, 2014 by Kara Dunlap in Security
Following a four-day trial, a federal jury in Nebraska convicted the former acting director of cybersecurity at the United States Department of Health and Human Services (HHS) for his involvement in a child pornography enterprise, the Department of Justice announced on Tuesday.
Timothy DeFoggi, aged 56, is the sixth individual to be convicted as a result of an FBI investigation dubbed “Operation Torpedo,” which has targeted three child pornography websites. The former director has been convicted on three charges: accessing a computer with intent to view child pornography, engaging in a child exploitation enterprise, and conspiracy to advertise and distribute child pornography.
DeFoggi, who will be sentenced on November 7, 2014, is said to have signed up for a membership on an illegal website on March 2, 2012, and was an active member until authorities took down the site in December of the same year. In addition to accessing and soliciting illegal content from other members of the website, investigators said the man also exchanged private messages with other users, expressing interest in raping and murdering children.
The website on which DeFoggi registered an account was one of the three Tor-based pedophile sites owned and operated by 31-year-old Aaron McGrath, of Bellevue, Nebraska, who has been sentenced to 20 years in prison.
Documents obtained by Wired show that the FBI tracked down McGrath after his IP address was provided to the agency by the Dutch national police’s high tech crime unit, which in August 2011 started cracking down on pedo websites.
Operation Torpedo has been controversial because the FBI didn’t immediately arrest McGrath. Instead, they monitored him for a year, time during which they planted malware on the illegal websites in an effort to identify members. The drive-by download method, which the FBI calls a “network investigative technique,” has helped the agency track down the IP addresses, MACs and hostnames of at least 25 individuals, with 14 of them facing trial.
The malware, designed only to identify the computers that had visited the illegal websites, was planted based on search warrants signed by a federal judge, who also allowed the agency to delay notifying the targeted individuals for a period of 30 days. Since some of the suspects learned only well after the 30-day period about the use of malware to identify them, defense lawyers asked the court to throw out the evidence, a motion rejected by the judge.
Christopher Soghoian of the American Civil Liberties Union (ACLU) has pointed out that while the use of malware might seem justified in the case of Operation Torpedo, because it’s unlikely for innocent people to be prosecuted, the technique could prove problematic in other cases, such as campaigns targeting terrorists, whose online resources might be accessed for research purposes by individuals who have nothing to do with terrorism.
US Slaps Briton With Fresh Hacking Charges
Posted on March 1, 2014 by Kara Dunlap in Security
NEW YORK – The United States on Thursday slapped two extra charges against a British man accused of hacking into thousands of US government computer systems, officials said.
Prosecutors in New York indicted Lauri Love, 28, on one count of hacking into the Federal Reserve and one count of aggravated identity theft. If convicted on these latest charges, he faces 12 years in prison.
He was already facing up to five years in prison and and a $ 250,000 fine, or twice the gross gain or loss from the offense, on each of two counts in New Jersey. He has been charged there with hacking the computer networks of US Army, Missile Defense Agency, NASA and other agencies.
Now, prosecutors allege that Love and other computer hackers from overseas, from October 2012 to February 2013, stole and disseminated information from the Federal Reserve’s network.
The data allegedly included identifying information of military service personnel and others. Manhattan US Attorney Preet Bharara described Love as a “sophisticated hacker” who broke into Federal Reserve computers, stole and made widely available sensitive personal information.
“We place a high priority on the investigation and prosecution of hackers who intrude into our infrastructure and threaten the personal security of our citizens,” he said in a statement.
FBI assistant director-in-charge George Venizelos said Love “underestimated the level of sophistication and dedication” of the FBI cyber division to track down his alleged crimes.
In New Jersey, prosecutors had said Love and his conspirators planned and executed the attacks in online chat rooms to “disrupt the operations and infrastructure of the United States government.” Love was arrested at his home in Britain on October 25. jm/nss