Feeds

Hacker stalked Linkin Park frontman

Musical discord

The essential guide to IT transformation

A former US government lab worker has admitted stalking Linkin Park lead singer Chester Bennington after using computing hacking tactics to obtain data on her target.

Devon Townsend, 28, from Albuquerque, New Mexico, confessed to using government computers to break into the email account of the singer and hacking into the website of his mobile provider in order to obtain his number. She also used a work computer to illegally obtain data on Bennington's wife, Talinda.

The fixated fan was able to view family photos, monitor Bennington's travel plans, and snoop on business correspondence between January 2006 and November 2006. She also illicitly monitored the couple's mobile phone messages. At one point, Townsend threatened Talinda Bennington by phone.

"On at least one occasion, knowing that Chester Bennington was in Arizona, I travelled to Arizona solely for the purpose of trying to see him," Townsend admitted as part of a plea bargaining agreement, the BBC reports.

"While I was there, I monitored Chester Bennington's voicemails as a means of trying to locate where he might be eating."

Investigators found pictures of Townsend with Bennington along with other Linkin Park memorabilia when they raided her Albuquerque home following her arrest.

Townsend pleaded guilty to charges including stalking, computer hacking, and trafficking in music recordings at a sentencing hearing in Albuquerque, New Mexico, on Friday. The former Sandia National Laboratories employee faces up to five years imprisonment and fines of up to $250,000 for each offence. ®

5 things you didn’t know about cloud backup

More from The Register

next story
Goog says patch⁵⁰ your Chrome
64-bit browser loads cat vids FIFTEEN PERCENT faster!
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
KER-CHING! CryptoWall ransomware scam rakes in $1 MEEELLION
Anatomy of the net's most destructive ransomware threat
NIST to sysadmins: clean up your SSH mess
Too many keys, too badly managed
Scratched PC-dispatch patch patched, hatched in batch rematch
Windows security update fixed after triggering blue screens (and screams) of death
Researchers camouflage haxxor traps with fake application traffic
Honeypots sweetened to resemble actual workloads, complete with 'secure' logins
prev story

Whitepapers

Gartner critical capabilities for enterprise endpoint backup
Learn why inSync received the highest overall rating from Druva and is the top choice for the mobile workforce.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.