Former US Soldier Pleads Guilty to Extortion After Hacking AT&T and Googling 'Can Hacking Be Treason?'
TL;DR
A former US Army soldier who hacked into AT&T’s systems, accessed President Trump’s call logs, and searched online about hacking and treason has pleaded guilty to extortion. He conspired to breach telecom databases and extort at least $1 million.
Main Content
Former US Soldier’s Hacking and Extortion Scheme
In a cautionary tale about the digital footprints left by cybercriminals, a former US Army soldier has pleaded guilty to conspiring to hack into telecom firms’ databases and extort at least $1 million. The soldier reportedly breached AT&T’s systems, boasted about accessing President Donald Trump’s call logs, and then made some telling Google searches: “can hacking be treason” and “US military personnel defecting to Russia.”
This case underscores the importance of cybersecurity measures in protecting sensitive information. The soldier’s actions not only compromised telecom databases but also highlighted the potential risks of insider threats within organizations.
Key Takeaways
- Hacking Incident: The former soldier hacked into AT&T’s systems and accessed sensitive information, including President Trump’s call logs.
- Google Searches: The soldier’s online searches about hacking and treason were crucial in the investigation.
- Extortion Charges: The individual pleaded guilty to conspiring to extort at least $1 million from telecom firms.
- Cybersecurity Implications: This incident emphasizes the need for robust cybersecurity measures to protect against hacking and data breaches.
For more details, visit the full article: source
Additional Resources
For further insights, check:
- Cybersecurity and Infrastructure Security Agency (CISA)
- National Institute of Standards and Technology (NIST)
- Federal Bureau of Investigation (FBI) Cyber Crime Unit
Conclusion
This case serves as a stark reminder of the consequences of cybercrime and the importance of vigilant cybersecurity practices. As organizations continue to face evolving threats, it is crucial to implement robust security measures to safeguard sensitive data and mitigate potential risks.