Internet Domain Registry

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Wednesday, 22 October 2008

Ryan Goldstein: Digerati Faces ?Justice?

Posted on 06:19 by Unknown
This will be brief. I promise.

You'll recall my frustration when New Zealander hacker, Owen Thor Walker, AKA "AKILL", was indicted as a "super hacker" back in April (see AKILL Convicted Are We Safer Now?, and my even greater frustration when he got off with no jail time and only having to pay $11,000 in restitution (which was only about 1/5th of what we could PROVE he had stolen!)

I'm back in frustration mode over the sentencing of Ryan Goldstein. Goldstein was finally sentenced yesterday in the East District of Pennsylvania, after being indicted more than eleven months ago (November 1, 2007) for "18 USC 371 - Conspiracy to Commit Computer Fraud".

Ryan traded favors such as "an undetected, unreleased bifrost beta with 100% antivirus and firewall bypass", as well as passwords to various forums to incentive AKILL to DDOS groups which had bothered Ryan, including TAUNET, ssgroup, and others. No one probably would have noticed or cared if it weren't for the fact that Ryan decided to host a malware update on some servers at University of Pennsylvania, where he is a student. When Walker instructed his 50,000 compromised computers to update themselves with code from the UPenn server, it caused an "accidental" Denial of Service, disabling some of the network services at UPenn.

Ryan's lawyer, Ronald Levine of Post & Schell, got an extension until March 10th, but they decided to plea out, and did so on February 29th. Since then, sentencing was scheduled for June 10, August 5, August 19, and finally October 21st.

Ryan was finally sentenced yesterday to 90 days in jail, followed by 90 days in a halfway house, and 180 days of house arrest. He will also not be allowed to use a computer "other than for work or school activities" for five years.

The prosecution failed to bring any charges regarding the more than 1,000 child pornography images found on his computer. They then agreed that he could schedule the 90 days at his convenience, so as not to conflict with his class schedule. He'll probably serve them during summer vacation.

I'm not sure what kind of school wants to have a convicted computer criminal and child pornography collector as one of their students. I guess he'll get his degree and go find a job, after his brief visit to jail.

The judge apparently shared my frustration at the lack of serious charges, based on his remarks reported in the Philadelphia Inquirer yesterday. U.S. District Judge Michael Baylson completed the sentencing of Goldstein, and then turned to his next case, where he sentenced Derrick Williams to two years for possession of Child Pornography. The judge thought it worth noting that "It seems very unfair. . . . I want to note for the record that Mr. Goldstein is white and Mr. Williams is African American and that adds to my discomfort". According to the Philadelphia Inquirer, both men possessed roughly 1,000 images of child pornography.

According to the sentencing guidelines, Williams should have received an 8 to 10 year sentence.
Email ThisBlogThis!Share to XShare to Facebook
Posted in | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Happy New Year! Here's a Virus! (New Year's Postcard malware)
    I've been busy this week looking at the various defacements (see ComputerWorld , and ABC News ) and other cyber attacks (see yesterday...
  • From Russia, With Love . . . new Postcard spam spies on your PC
    Isn't it nice to have friends who send you postcards? The UAB Spam Data Mine is especially fortunate in that way. Beginning the evenin...
  • Top Brands Imitated by Malicious Spam
    WebSense recently released an InfoGraphic titled "Top Five Subject Lines in Phishing Emails." for January 1, 2013 through Septemb...
  • New Year's Waledac Card
    We haven't seen a new version of Waledac since Independence Day (July 4, 2009), but it looks like its back! I'm on vacation today, s...
  • Tempting Photo Attachments Lead to Fake AV
    One of today's largest malicious spam campaigns continued an occasional theme we've been seeing for a few weeks. A subject line, fo...
  • What about the Social Security Numbers? (The Utah Data Breach and your SSN)
    The Utah Data Breach This week the continuing saga of the Utah Medicaid Data Breach continued to unfold. If you haven't been following...
  • Stop the Rumors: Quit SMSing about WalMart Gang Initiations
    My daughter and her teenage friend were sitting on the couch watching TV today when they began getting text messages on their phone. Here...
  • Minipost: IPR Center celebrates Cyber Monday
    The National Intellectual Property Rights Center (IPR Center) announced today that in celebration of Cyber Monday, they have Seized 82 Domai...
  • ACH Spammer switches to Shortened URLs
    For many weeks now the spammers behind one particular malware family have been fighting a running battle to keep their malware-hosting domai...
  • Work at Home . . . for a Criminal?
    How do you tell if a "Work at Home" invitation is a scam? Here's a clue: It comes in your email. In today's Blog, I tho...

Categories

  • china
  • computer security careers
  • conficker
  • cyberwar
  • digital certificates
  • facebook
  • fake av
  • gumblar
  • koobface
  • law enforcement
  • malware
  • pharmaceuticals
  • phishing
  • public policy
  • spam
  • twitter
  • twitter malware
  • waledac
  • zbot

Blog Archive

  • ►  2013 (21)
    • ►  December (4)
    • ►  November (1)
    • ►  October (1)
    • ►  September (1)
    • ►  August (3)
    • ►  July (1)
    • ►  June (1)
    • ►  May (5)
    • ►  April (3)
    • ►  March (1)
  • ►  2012 (18)
    • ►  August (1)
    • ►  June (1)
    • ►  May (7)
    • ►  April (2)
    • ►  March (7)
  • ►  2011 (28)
    • ►  November (3)
    • ►  October (1)
    • ►  August (4)
    • ►  July (6)
    • ►  June (1)
    • ►  May (2)
    • ►  April (2)
    • ►  March (6)
    • ►  February (1)
    • ►  January (2)
  • ►  2010 (80)
    • ►  December (6)
    • ►  November (10)
    • ►  October (6)
    • ►  September (12)
    • ►  August (5)
    • ►  July (4)
    • ►  June (11)
    • ►  April (7)
    • ►  March (8)
    • ►  February (4)
    • ►  January (7)
  • ►  2009 (92)
    • ►  December (12)
    • ►  November (11)
    • ►  October (16)
    • ►  September (7)
    • ►  July (5)
    • ►  June (10)
    • ►  May (2)
    • ►  April (6)
    • ►  March (7)
    • ►  February (6)
    • ►  January (10)
  • ▼  2008 (101)
    • ►  December (7)
    • ►  November (17)
    • ▼  October (11)
      • LaSalle acquisition by Bank of America spreads mal...
      • First Enom Phish, now Network Solutions Phish
      • Caution: Enom Phishing continues
      • Ding Dong The Witch Is Dead! ( ICANN Pulls the Pl...
      • Tip to Phishers: First Build Site, THEN Spam
      • Operación Carrusel sets an example for fighting Ch...
      • The demise of index1.php PornTube Video Malware
      • Ryan Goldstein: Digerati Faces ?Justice?
      • FTC stops AffKing and SanCash, so is Pill Spam Gone?
      • SanCash (Affking) taken down in New Zealand
      • Need help with your debt? Ask the Panamanian Russ...
    • ►  September (10)
    • ►  August (22)
    • ►  July (12)
    • ►  June (3)
    • ►  May (7)
    • ►  April (5)
    • ►  March (2)
    • ►  February (1)
    • ►  January (4)
  • ►  2007 (31)
    • ►  December (3)
    • ►  November (9)
    • ►  October (3)
    • ►  September (2)
    • ►  August (5)
    • ►  July (5)
    • ►  January (4)
  • ►  2006 (5)
    • ►  December (2)
    • ►  October (3)
Powered by Blogger.

About Me

Unknown
View my complete profile