Feeds

How the Feds shook hands with an internet pedophile

Crime and punishment in the digital age

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

The Feds

Michael Levy, a federal prosecutor who is chief of computer crimes in the US Attorney's office for Philadelphia, defended the decision not to prosecute Goldstein for child porn offenses. He said Goldstein provided valuable assistance in important criminal probes against botmasters.

"One of the big problems on the internet today are botnets, and he was clearly helping in botnet investigations," Levy says. "You need to write about all the cooperation the kid gave to us, which certainly goes into a decision about what he's charged with and how he's charged."

Levy declined to detail the investigations, except to say there were seven of them and one involved Akill, who in July was ordered to pay $10,800 after pleading guilty to six cybercrime offenses. (Levy wouldn't say whether Goldstein aided investigators in cracking down on Dshocker, the 17-year-old Massachusetts hacker who in November confessed to a three-year crime spree that included DDoS attacks, bomb threats and Swatting, which uses fraudulent emergency 911 calls to cause enemies to be raided by heavily armed police teams).

Levy also says the sentence, which calls for Goldstein to be on probation for five years, will prevent the student from carrying out any illegal activity online since a probation officer will be closely monitoring his computer usage.

But not everyone is as comfortable with the decision not to prosecute the child porn offenses.

One of them is Douglas Berman, a professor of law at Ohio State University and an expert in federal sentencing guidelines. He says Congress specifically designed child porn statutes to crack down harder on offenders who make contact with their victims.

"Absolutely, Congress wants prosecutors to be tougher on somebody who's not simply click, click, click, downloading, but being more proactive in the nature of their criminal activity with this kind of soliciting," he told The Register. "It's not just he downloaded dirty pictures but actively used chatrooms to encourage this behavior. In light of the description of the case facts, it seems like he got quite a sweetheart deal."

Mark Rasch, a former federal cyber prosecutor who is now a computer crimes specialist in Bethesda, Maryland, won't go quite that far, but the facts of the case, combined with the allegations laid out by Goldstein's former channel mates, lead him to believe sentencing guidelines would have called for Goldstein to receive from 135 months to 168 months had he been convicted for the illegal images.

Federal prosecution rules require cooperating witnesses to reveal the entire scope of their crimes before a plea agreement can be made, he says. That means either prosecutors knew of Goldstein's chatroom behavior and chose not to file charges or Goldstein hasn't been as forthcoming as he should have been.

"What this demonstrates is how much the government needs both insiders in these rings and people with technical expertise in order to successfully make these cases, so much so that they're willing to overlook some rather serious crimes," Rasch said. "Because you need these people and you need their skill sets, you're willing to bargain for them, and this may have been ultimately a bad bargain for the government." ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.