Feeds

Spyware creator – and his customers – indicted

Keylogging for stalkers

Securing Web Applications Made Simple and Scalable

The creator and several buyers of a keylogging software package marketed as a means of checking up on loved ones, have been indicted in the US for accessing computer systems without authorisation, the Associated Press reports.

Purchasers of the $89 “LoverSpy” software would send their target – a colleague, lover or child – a seemingly harmless electronic greeting card. When opened, the card added software to the targeted computer that would record email messages, chat room conversations, passwords and any other computer activity.

Such software is prohibited in the US under federal wiretapping laws and the Computer Fraud and Abuse Act. In the UK its use would be an offence under the Regulation of Investigatory Powers Act of 2000, better known as RIPA.

The firm behind LoverSpy was closed down in October 2003, but prosecutors have now obtained an indictment against the software’s creator, Carlos Enrique Perez-Melara, 25. His whereabouts remain unknown.

He is charged with 35 counts of “manufacturing, sending and advertising a surreptitious interception device and unauthorised access to protected computers”, according to the Associated Press.

Four purchasers of the software – John J Gannito, 49, Kevin Powell, 54, Cheryl Ann Young, 40, and Laura Selway, 34 – have also been charged by San Diego prosecutors, according to reports.

As many as 1,000 copies of the software are reputed to have been sold by Perez-Melara and investigations are continuing.

© Pinsent Masons 2000 - 2005

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.