Blind phone hacker gets 11-year sentence
The teenager harassed a Verizon investigator who was building a case against him
IDG News Service - A blind Boston-area teenager was sentenced to more than 11 years in prison Friday for hacking into the telephone network and harassing the Verizon investigator who was building a case against him.
Matthew Weigman, 19, was part of a group of telephone hackers that met up on telephone party lines and was associated with more than 60 "swatting" calls to 911 numbers across the country. Weigman, known as "Little Hacker," became involved in telephone hacking around age 14 and continued to operate until last year.
Swatters make prank 911 calls, but they use spoofing technology to make it appear as though the call is being made from a victim's house. The idea is to harass their targets, preferably by having police show up at their door, guns drawn.
Most of the members in the group have already been sentenced, and Weigman was given the longest sentence. He was arrested in May 2008, shortly after showing up at the home of a Verizon investigator who had been building a case against Weigman and the other swatters. Weigman, his brother, and another swatter named Sean Benton drove nearly 70 miles to the investigator's house in order to "intimidate and frighten him," the U.S. Department of Justice (DoJ) said in a statement Monday.
But the gang saved their really frightening swatting for others. On June 12, 2006, for example, another swatter, Guadalupe Martinez, dialed 911 using a spoof card to make it look as though he was calling from an Alvarado, Texas, phone number and told dispatchers that he was holding hostages and had killed family members with an AK47 while high on hallucinogenic drugs.
A single SWAT (special weapons and tactics) incident can eat up tens of thousands of dollars in emergency services costs, and it can be dangerous too, when victims suddenly have to deal with armed police officers.
Weigman used his skills to target "employers, landlords, families and friends of multiple party line participants," often in the hope that they would be fired or evicted from their homes, the DoJ said. Sometimes he and his group would cut phone lines, or listen in on victims' conversations.
Weigman and his crew used a variety of tricks to hack the phone system. They would trick phone company workers with "pretexting" calls, where they pretended to be employees or customers in order to obtain information; they would try war-dialing -- using a computer to dial thousands of phone numbers in hopes of gaining access to a system; and they would also trade passwords and information with other telephone hackers, known as "phreakers."
Benton received an 18-month sentence on Friday in U.S. District Court for the Northern District of Texas. Weigman, of Revere, Massachusetts, was sentenced to 135 months. Another codefendant in the case, Carlton Nalley, has pled guilty, but didn't show up for sentencing.
Last year, another swatter named Randall Ellis was sentenced to three years in prison for dispatching a SWAT team to an unsuspecting Orange County family. Authorities say Ellis made about 200 such calls.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts