Translate

12/04/2013

REVIEW 2013: Members of the LulzSec Hacker Club Sentenced to Prison Terms

LulzSec Logo
British members of the LulzSec Blackhat Hacker Club were sentenced for a series of global cyber-attacks in 2011. Two of the "Hacktivists" have received prison terms, one will be sent to a young offenders’ institution and another received a suspended sentence.

Ryan Ackroyd, Jake Davis, Mustafa Bassam and Ryan Cleary had all pleaded guilty to hacking offenses prior to sentencing at the Southwark Crown Court on Thursday.

Cleary, 21, who also pleaded guilty to possession of images showing child abuse, was sentenced to 32 months, of which he will serve half. He also pleaded guilty to hacking and multiple counts of launching cyber-attacks against organizations, including the CIA and the UK’s Serious Organized Crime Agency (SOCA), as well as hacking into US Air Force computers at the Pentagon.

From left to right: Cleary, Ackroyd, Bassam, Davis

Ackroyd, 26, who used the online persona of a 16-year-old girl named Kayla, was sentenced to a 30 month sentence of which he is expected to serve 15 months. The former soldier pleaded guilty to one charge of conducting an unauthorized act to hinder the operation of a computer, contrary to the Criminal Law Act 1977.

Davis, 20, was sentenced to two years in a young offenders’ institute for hacking and cyber-attack related offenses. He was also reportedly in charge of media relations for LulzSec.

Jake Davis
Bassam, 18, was still in school when the attacks were carried out and was handed down a 20 month sentence which was suspended for two years, as well as 300 hours of community service. The judge presiding over the case  is said to have taken Bassam's age into account when deciding to give him a suspended sentence.

Lulzsec, whose name is a combination of the acronym Lol - laugh out loud - and security, emerged as a splinter group from the hacking collective Anonymous two years ago. However, unlike Anonymous, the group appeared to be less motivated by politics.

In many of the attacks, the gang of "modern day pirates" stole a high amount of personal information, including Passwords, Emails and credit card details, which they later posted on the LulzSec website and file-sharing sites. They also carried out distributed denial of service (DDoS) attacks on many victims' Websites, causing them to crash. The FBI, News International, Nintendo and Sony were among many of the other high-profile targets the group targeted in their spree.

Sandip Patel
"It's clear from the evidence that they intended to achieve extensive national and international notoriety and publicity," the UK Independent cites Prosecutor Sandip Patel. "They saw themselves as latter-day pirates."

He added: "This is not about young immature men messing about. They are at the cutting edge of a contemporary and emerging species of criminal offender known as a cyber-criminal."


Hector Monsegur
LulzSec was only in operation for several months in 2011 before the main members were arrested between June and September of 2011, the court heard. In that brief period of time, they managed to attract a huge international audience, attracting 355.000 Twitter followers by July of that year.

Their arrests came after the group's apparent leader, Hector Monsegur – known online as "Sabu" – turned informant after being caught by the FBI.

Source: rt.com

SEE ALSO: The Sealed Indictment

Keine Kommentare:

Kommentar veröffentlichen