Feeds

Pedophile gets 110 years in MySpace extortion scheme

'Tools of Terror'

Intelligent flash storage arrays

A 33-year-old North Carolina man has been sentenced to 110 years in prison after pleading guilty to charges that he terrorized more than 100 underage girls by hacking into MySpace accounts and extorting nude pictures from them.

Ivory Dickerson, a civil engineer, received the maximum sentence on three counts of manufacturing child pornography, two counts of unlawful computer intrusion and one count for possession of child pornography. Members of the FBI's Innocent Images Task Force uncovered a cache of child porn dating back to 1998, including videos of Dickerson with young girls in which he boasted of drinking and having sexual encounters with them, according to court documents.

"I haven't seen a crime in 16 years on the bench quite as horrible as this one," US District Judge Anne Conway said. A federal prosecutor called Dickerson's hacking skills "tools of terror."

Dickerson stalked his victims on MySpace and then hacked into their computers, giving him remote access to their machines. He would then threaten to harm them or their family members unless they provided nude images of themselves.

He told one girl, "Are you sure you want to drive to school tomorrow?" In another instance he threatened to make a 17-year-old victim "the most well known girl at school" if she didn't comply with his wishes.

Authorities believe Dickerson didn't act alone in the scheme. FBI investigators, which still don't know exactly how many children were pressured into making porn by Dickerson, are still looking for more victims.

Additional coverage of the sentencing is available here and here. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
China is ALREADY spying on Apple iCloud users, claims watchdog
Attack harvests users' info at iPhone 6 launch
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.