Feeds

Kimble/Schmitz gets 20 months suspended sentence

Fat fake escapes porridge

  • alert
  • submit to reddit

High performance access to file storage

German glam-hax0r Kim Schmitz (aka Kimble) has received a 20 month suspended sentence from a Munich court after being convicted of stock price manipulation designed to net him €1.2m (£750,000).

Schmitz, who was extradited from Thailand in January after a botched attempt to flee justice, was also fined €100,000 by the court after pleading guilty to insider trading of shares in Letsbuyit.com.

The fraud took place when the fat one's front company, Kimvestor, took part in a scheme to rescue Letsbyit.com from collapse.

Schmitz, readers will recall, was the founder of YIHAT (Young Intelligent Hackers Against Terrorism), an 'elite' crew of IRC kiddies determined to use their mad skillz to track down international terrorist Osama bin Laden. Schmitz has also claimed to be a master hacker himself, in addition to being a financial wizard.

In January, while he was on the run Schmitz posted a cryptic message on his site advertising plans to commit suicide - or at least his crossing "to a new world".

This proved to be a publicity stunt and visitors to the site are now informed that Schmitz wishes to be known as "King Kimble the First - Ruler of the Kimpire".

The stunt is fairly typical of Schmitz, as amply demonstrated on his Web site. He even hired a model who'd posed in Playboy to pretend to be attracted to him as he squired a cluster of pals around the Caribbean in a rented yacht he hopes we'll think he owns.

His legend of hacking proficiency is based on a little fact interlarded with a lot of juicy bits taken from media accounts and movies, as this article mirrored by Attrition makes painfully clear. ®

External Links

Heise Online's report of Schmitz's sentencing (in German)
... and Der Spiegel's report

Related Stories

Kimble/Schmitz deported
YIHAT founder Kimble/Schmitz arrested
bin Laden hackmeister 'flees' Germany
bin Laden hackers denounce founder
bin Laden hack-meister in defacement, financial debacles
Tables turns on Bin Laden 'bank crackers'
We've cracked into bin Laden's bank - UK hackers
Kimble.org offers $10m reward for arrest of bin Laden
Letsbuyit awakes from coma

High performance access to file storage

More from The Register

next story
Sorry London, Europe's top tech city is Munich
New 'Atlas of ICT Activity' finds innovation isn't happening at Silicon Roundabout
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.