Swatters tricked AT&T while making fake 911 calls
Group alleged to lack social skills, may yet make good guests... of the state
IDG News Service - A Cleveland, Ohio man has pled guilty to participating in a scheme that involved using AT&T employee passwords and identities to place false 911 calls to emergency dispatch centers.
Stuart Rosoff is facing as much as five years in prison and a $250,000 fine after pleading guilty to charges of harassing people by tricking 911 operators into dispatching police SWAT (Special Weapons And Tactics) teams to the homes of their unsuspecting victims. Rosoff was part of a group of about 15 to 20 people who met in chat rooms and telephone party lines to exchange information on how to conduct their attacks, according to court documents.
Rosoff is considered the lead defendant in a federal case against members of the group. Two other members have pled guilty, and two others, Jason Trowbridge and Chad Ward, are still facing trial.
Virtually unknown until recently, swatting gained national attention last month when 19year-old Randall Ellis was arrested after allegedly dispatching a SWAT team to the home of an unsuspecting couple in Orange County, California. That incident cost county officials nearly $20,000. On Friday, Ellis plead not guilty to charges stemming from the March 29 incident. He is not believed to be connected with Rosoff or his group.
The Rosoff group has been connected to about 60 incidents, including one in January 2007, according to Detective Larry Cole with the Snohomish County Sherriff's Office in Washington State. In that case, a Rosoff's co-conspirator named Guadalupe Santana Martinez ended up dispatching 35 county employees, including the SWAT team to a Snohomish County home in the middle of the night. "He built enough information and called 911 and faked that he was committing a serious crime at the time," he said. "When our patrols responded, nobody answered the door, so it ended up being an activation of our SWAT team."
In a June 12, 2006 incident, Martinez is alleged to have called 911, saying that he was high on hallucinogenic drugs, had shot and killed family members and was holding hostages.
Martinez used a spoof card to conceal his identity in this case, according to court filings, but in the Snohomish County incident he used an even simpler technique: he blocked his caller ID and simply gave 911 operators his victim's number, according to Cole. "Even with our 911 system if you use some blocked numbers for privacy reasons it's hard for our 911 system to read them," he said.
Martinez and Angela Roberson, and another group member, have since pleaded guilty to swatting charges.
Court documents state that he and other group members used social engineering techniques against telephone companies such as AT&T.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Gartner Report: A Guide to Gartner's Enterprise Mobile Security Self-Assessment Gartner introduces a model and a Toolkit intended to help mobility and security IT leaders assess their enterprise mobility programs from a security...
- Gartner Report: Containing Mobile Security Risks With the 80/20 Rule IT planners can deliver better mobile protection with higher user satisfaction by segmenting users into risk groups before committing to specific management or...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts