Blind phone hacker gets 11-year sentence
The teenager harassed a Verizon investigator who was building a case against him
IDG News Service - A blind Boston-area teenager was sentenced to more than 11 years in prison Friday for hacking into the telephone network and harassing the Verizon investigator who was building a case against him.
Matthew Weigman, 19, was part of a group of telephone hackers that met up on telephone party lines and was associated with more than 60 "swatting" calls to 911 numbers across the country. Weigman, known as "Little Hacker," became involved in telephone hacking around age 14 and continued to operate until last year.
Swatters make prank 911 calls, but they use spoofing technology to make it appear as though the call is being made from a victim's house. The idea is to harass their targets, preferably by having police show up at their door, guns drawn.
Most of the members in the group have already been sentenced, and Weigman was given the longest sentence. He was arrested in May 2008, shortly after showing up at the home of a Verizon investigator who had been building a case against Weigman and the other swatters. Weigman, his brother, and another swatter named Sean Benton drove nearly 70 miles to the investigator's house in order to "intimidate and frighten him," the U.S. Department of Justice (DoJ) said in a statement Monday.
But the gang saved their really frightening swatting for others. On June 12, 2006, for example, another swatter, Guadalupe Martinez, dialed 911 using a spoof card to make it look as though he was calling from an Alvarado, Texas, phone number and told dispatchers that he was holding hostages and had killed family members with an AK47 while high on hallucinogenic drugs.
A single SWAT (special weapons and tactics) incident can eat up tens of thousands of dollars in emergency services costs, and it can be dangerous too, when victims suddenly have to deal with armed police officers.
Weigman used his skills to target "employers, landlords, families and friends of multiple party line participants," often in the hope that they would be fired or evicted from their homes, the DoJ said. Sometimes he and his group would cut phone lines, or listen in on victims' conversations.
Weigman and his crew used a variety of tricks to hack the phone system. They would trick phone company workers with "pretexting" calls, where they pretended to be employees or customers in order to obtain information; they would try war-dialing -- using a computer to dial thousands of phone numbers in hopes of gaining access to a system; and they would also trade passwords and information with other telephone hackers, known as "phreakers."
Benton received an 18-month sentence on Friday in U.S. District Court for the Northern District of Texas. Weigman, of Revere, Massachusetts, was sentenced to 135 months. Another codefendant in the case, Carlton Nalley, has pled guilty, but didn't show up for sentencing.
Last year, another swatter named Randall Ellis was sentenced to three years in prison for dispatching a SWAT team to an unsuspecting Orange County family. Authorities say Ellis made about 200 such calls.
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts