Student who hacked Bill O'Reilly gets 30 months
IDG News Service - A 23-year-old Bellevue, Ohio, man has been sentenced to 30 months in prison following a 2007 online crime spree in which he used a network of hacked computers to attack and knock offline websites belonging to conservative pundits Bill O'Reilly and Ann Coulter.
Mitchell Frost must also pay US$40,000 in restitution to O'Reilly and $10,000 to the University of Akron, where he was enrolled at the time of the hacking. He had pleaded guilty to the charges in May.
Frost was a first-year student at the university at the time of the attacks. He used the school's computer network to control a botnet he'd built up between August 2006 and March 2007, and launched denial of service (DOS) attacks against Rudy Giuliani's Joinrudy2008.com website, Billoreilly.com and Anncoulter.com. He attacked the Bill O'Reilly site five times, ultimately forcing it offline.
The University of Akron was disrupted too, when Frost knocked its network offline for eight-and-a-half hours while trying to DOS-attack a gaming server hosted by the university. That happened on March 14, 2007. Frost's dorm room was raided two weeks later. He wasn't charged, however, until May of this year.
Prosecutors asked the court for a tough sentence after Frost lied to his probation officer about an online business he'd set up following his arrest. In a letter to the court, Frost said he set up the Discountjwh.com website earlier this year after quitting his job as a Stanley Steemer carpet cleaning technician. JWH is a form of synthetic cannabis that is legal for sale in some U.S. states, including Ohio.
Frost said he was selling the product as a bonsai plant fertilizer and never meant for it to be consumed by humans. He said that he lied to his probation officer in a moment of panic.
"I thought that if they see I am making this money through my online business [and] if I were to go away to prison they would want it all as a penalty," he wrote in his letter.
Frost was sentenced Thursday by Judge Lesley Wells of the Northern District of Ohio. He must serve three years' probation after his 30-month sentence.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts