Update: HP investigator pleads guilty to ID theft, conspiracy
Bryan Wagner could face $500K in fines, seven years behind bars
IDG News Service - A private investigator charged in connection with the Hewlett-Packard Co. pretexting case appeared in U.S. Federal District Court Friday and pleaded guilty to charges filed against him on Wednesday.
Bryan Wagner had been scheduled to appear in a federal courtroom in San Jose at 11:00 a.m. local time, according to the U.S. attorney's office in San Francisco. At his court appearance, Wagner pleaded guilty to one count of conspiracy and one count of aggravated identity theft.
Judge Jeremy Fogel set sentencing for June 20.
Wagner is one of a group of people charged with crimes following revelations that HP investigators used questionable tactics to obtain the personal information of HP board members, reporters and reporters' family members during HP operations in 2005 and 2006. In October, former HP Chairman Patricia Dunn, former HP ethics counsel Kevin Hunsaker and three investigators, including Wagner, were charged by the office of California Attorney General Bill Lockyer with fraudulent wire communications, wrongful use of computer data, identity theft and conspiracy.
Kevin Ryan, the U.S. attorney for the Northern District of California, filed the new charges against Wagner Wednesday. Wagner faces up to five years in prison and a $250,000 fine for the conspiracy charge, and two years in prison and a $250,000 fine for the charge of aggravated identity theft and aiding and abetting.
Ryan charged Wagner with helping to obtain the names, addresses, Social Security numbers, telephone call logs, telephone billing records and other information of the HP board members and reporters. Wagner worked for Action Search Group, a subcontractor to Security Outsourcing Solutions, the company HP hired to help with security investigations, according to court papers filed by Ryan.
Wagner used a reporter's Social Security number to establish an online account and obtain the reporter's phone records, according to the court records.
- Big Data, Big Mess: Sound Risk Intelligence Through Complete Context This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Using Cyber Insurance and Cybercrime Data to Limit Your Business Risk This paper examines the challenges of understanding cyber risks, the importance of having the right cyber risk intelligence, and how to use this...
- 5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
- Confront consumerization with convergence Virtualization expert Elias Khnaser spotlights the security, compliance, and governance issues that arise when enterprise users "consumerize" with shadow IT and public cloud...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- NSS Labs & Cisco Present: Evaluating Leading Breach Detection Systems Today's constantly evolving advanced malware and APTs can evade point-in-time defenses to penetrate networks. Security professionals must evolve their strategy in lockstep to... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!