Feeds

How the Feds shook hands with an internet pedophile

Crime and punishment in the digital age

  • alert
  • submit to reddit

High performance access to file storage

Editor's Note added on April 8, 2010

On March 17, 2010, almost 13 months after this article was published, Michael Johnson, one of the individuals quoted in this article, contacted The Register to recant claims he made about Ryan Goldstein.

"It was a false and fabricated account, which was created because the pressure from the community to discredit Mr Goldstein," he wrote in an email. "I was out to harm Ryan Goldstein, not to ruin his life. However, i can't say the same for others, which is maybe what [sic] they are adamant that their statement is infact [sic] a true account."

Johnson declined to elaborate on the pressure he allegedly received or to provide support for those claims. In order to alert our readers to this development, The Register is adding this editor's note and striking a line through the 55-word passage that contains Johnson's account.

As former moderators for an internet relay channel dedicated to hacking, Francine Campbell and Sterlin Ward have seen some of the net's darker quarters. But nothing prepared them for their group's encounter with an internet pedophile who called himself Digerati.

After the hacker repeatedly propositioned channel members as young as 13 to engage in graphic webcam sex, Campbell and Ward alerted the FBI and officials at the University of Pennsylvania, where Digerati attended classes and got his internet access. Digerati - whose real name is Ryan Goldstein - was eventually prosecuted, but the experience left the channel elders - and some law-enforcement experts - critical of what they characterize as a Faustian deal

In exchange for Goldstein's help prosecuting seven cases involving botnets, federal prosecutors agreed to charge him with a single misdemeanor hacking charge for damage he inflicted on a University of Pennsylvania server. In October, he received just three months in prison despite being caught with about 1,000 images of child pornography.

For Francine Campbell, Sterlin Ward, and others on the #ssgroup IRC channel, it was a bitter lesson in the vagaries of crime and punishment in the digital age.

"I think protecting kids would be way more important than monetary damages to a server," says Ward, a 35-year-old networking analyst who took an early stand against Goldstein's online grooming of underage members. "I felt that he was going to eventually find a kid that was close enough for a meetup."

Ronald Levine, a Philadelphia-based attorney representing Goldstein, issued the following statement: "Mr. Goldstein denies this allegation. He admitted the misdemeanor computer intrusion conduct with which he was charged; he received a probationary sentence; and he is committed to moving forward with his life productively."

But Goldstein's former online associates stand by the accusations, and they presented emails and chat logs that appeared to back them up. In their minds, the episode shows the sometimes misplaced priorities of law enforcement and university administrators.

High performance access to file storage

Next page: Enter Digerati

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Parent gabfest Mumsnet hit by SSL bug: My heart bleeds, grins hacker
Natter-board tells middle-class Britain to purée its passwords
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.