Siddhesh Joshi (Editor)

Justin Tanner Petersen

Updated on
Edit
Like
Comment
Share on FacebookTweet on TwitterShare on LinkedInShare on Reddit
Name
  
Justin Petersen


Justin Tanner Petersen httpswwwsoldierxcomsystemfileshdbagentst

Died
  
2010, Los Angeles, California, United States

Justin Tanner Peterson (July 28, 1960 Washington, D.C. – March 2010 Los Angeles, California) was an American hacker, concert promoter, sound engineer, private investigator and an informant for the Federal Bureau of Investigation. While tasked with helping to catch other hackers and fugitives wanted by the FBI, he continued to commit serious crimes.

Contents

Life

Justin Petersen, born on July 28, 1960 in Washington D.C., started hacking computers in 1978. In 1984, he moved to Los Angeles. It was there he found an affinity for Los Angeles night life, with the Sunset Strip being a major focal point. In 1989, Petersen, using the handle Agent Steal and the alias Eric Heinz that he had been living under since his departure from the East, cracked the computers of the Pacific Bell Telephone Company in California and used his access to intercept the telephone lines of several local FM radio stations. With this access, he and a couple of associates were able to ensure that they were the only callers who could get through during on-air contests, and thus the only winners. Although the associates remain officially unknown, strong rumors persist that Kevin Poulsen (aka Dark Dante), and Ronald Austin were involved. Their winnings included $50,000 in cash, several trips to Hawaii and two Porsches. Realizing he was being pursued by the FBI, Petersen moved to Texas, where he then hacked into a national credit reporting agency, ordered fraudulent credit cards using the information he found, and used them freely.

After receiving a tip, Petersen was arrested in Texas in 1991. In an FBI affidavit, Petersen admitted to physically and electronically conducting illegal telephone taps and breaking into Pacific Bell's COSMOS and other companies' computer systems to check telephone numbers and determine the location of telephone lines and circuits. A grand jury in Texas returned an eight-count indictment, accusing Petersen of assuming false identities, accessing a computer without authorization, possessing stolen account IDs and fraudulently obtaining and using credit cards. Petersen also faced several other charges pertaining to national security: one charge regarded his supposed compilation and documentation of U.S. Federal Government wire taps of persons currently under surveillance. Under a plea bargain the charge was dropped after a debriefing by unknown law enforcement entities (presumably the FBI or US Secret Service), according to Littman.

The case was ultimately transferred to California. Petersen eventually pleaded guilty to six counts, including the aforementioned rigging of a radio station contest to win a $20,000 prize. He faced a sentence of up to 40 years in prison and a $1.5 million fine, but sentencing was delayed several times as Petersen became an informant for the FBI for almost two years. He had said that the FBI paid him monthly, plus free rent, computers and other unspecified resources "to help them set up hackers," including Kevin Mitnick (aka Condor), and Kevin Poulsen (aka Dark Dante), and others.

On 18 October 1993, 15 months after entering his first guilty plea, Petersen was confronted inside a federal courthouse by David J. Schindler, Assistant US Attorney for the prosecution (who is now a private attorney for the Church of Scientology,) who asked if he had committed any crimes while free on bail. Petersen asked to have a conference with his attorney, according to Schindler. Petersen met briefly with his attorney, then escaped from the federal courthouse becoming a fugitive once again. Attorney Richard Sherman, who represented a friend of Kevin Mitnick's in another computer crime case, accused the FBI of not only using Petersen as an informant, but also of turning a blind eye to alleged computer and credit-card crimes Petersen committed during his time cooperating.

Petersen also claims the FBI refused to allow him to work with or on computers afterward. Given his physical limitations resulting from an accident in 1985, and legal restrictions imposed by the FBI, Petersen claimed he had little choice but to briefly turn back to hacking since he was unable to get a job.

While still a fugitive, Petersen allegedly hacked into the computers of Heller Financial, a commercial lending company. An unnamed associate phoned in two bomb threats to the bank. While the building was being evacuated, Petersen allegedly initiated a wire transfer of $150,000 from Heller Financial to Union Bank, by way of Mellon Bank. The transfer was discovered before his associate could withdraw the money.

In November 1995, Peterson was sentenced to 41 months (3.4 years) in U.S. federal prison and three years of probation, and payment of restitution of $40,000. It is rumored that Petersen worked for the Central Intelligence Agency in Amsterdam, although details are unclear.

Scientology

Author Jonathan Littman in his book, linked Petersen's sealed Texas court case with the Church of Scientology via a private investigator (in Beverly Hills, California) named Shlomi Michaels and former FBI Special Agent in Charge Ted Gunderson. The firm he worked for contracted him to eavesdrop on the Aznarans, who were high-ranking ex-Scientologists living in the state of Texas. The Aznarans were at the time cooperating with Richard Behar in the writing of the highly critical 1991 Time magazine cover story. Vicki and Richard Aznarans left the church under circumstances that they describe as involving duress. They filed a complaint against Scientology alleging false imprisonment, intentional infliction of emotional distress and other tortious conduct.

Death

Peterson was found dead in his Los Angeles apartment on March 12, 2010.

List of books referencing Petersen

  • Adams, James (2001). The Next World War: Computers Are the Weapons and the Front Line Is Everywhere. Simon and Schuster. pp. 156–157. ISBN 978-0-7432-2380-5. Retrieved 2008-12-16. 
  • Amoroso, Edward G. (1999). Intrusion Detection. p. 218. ISBN 978-0-9666700-7-3. Retrieved 2008-12-16. 
  • Barrett, Neil (2006). The Binary Revolution. p. 304. ISBN 978-0-297-84738-0. 
  • Clark III, Champ; Larry Chaffin; Anton Chuvakin; Seth Fogie; Craig Schiller; Scott Paladino; Colby DeRodeff; Dan Dunkel; Michael Gregg (2007). Infosecurity 2008 Threat Analysis. p. 480. ISBN 978-1-59749-224-9. Retrieved 2008-12-15. 
  • Corley, Eric, ed. (2010). Dear Hacker. Letters to the Editor of 2600. p. 8. ISBN 978-0-470-62006-9. Retrieved October 3, 2010. 
  • Edgar, Stacey L. (2003). Morality and Machines. p. 522. ISBN 978-0-7637-1767-4. 
  • Gissel, Richard (2005). Digital Underworld: Computer Crime and Resulting Issues. MacroTech Press. p. 113. ISBN 978-1-4116-4423-6. Retrieved 2008-12-16. 
  • Grabosky, Peter N.; Russell G. Smith; Gillian Dempsey (2001). Electronic Theft: Unlawful Acquisition in Cyberspace. Cambridge University Press. p. 39. ISBN 978-0-521-80597-1. Retrieved 2008-12-16. 
  • Gregg, Michael; Stephen Watkins (2006). Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure Network. Syngress. p. 369. ISBN 978-1-59749-109-9. Retrieved 2008-12-16. 
  • Hafner, Katie; John Markoff (1995). Cyberpunk: Outlaws and Hackers on the Computer Frontier. Simon and Schuster. p. 353. ISBN 978-0-684-81862-7. Retrieved 2008-12-16. 
  • Knittel, John; Ryan P. Randolph; Michael Soto (2002). Everything You Need to Know about the Dangers of Computer Hacking. The Rosen Publishing Group. ISBN 978-0-8239-3764-6. Retrieved 2008-12-16. 
  • Littman, Jonathan (1997). The Fugitive Game. p. 416. ISBN 978-0-316-52869-6. Retrieved 2008-12-16. 
  • Mitnick, Kevin; William L Simon (2011). Ghost in the Wires. ISBN 978-0-316-03770-9. Retrieved August 15, 2011. 
  • Mizell, Louis R. (1996). Masters of Deception. p. 253. ISBN 978-0-471-13355-1. 
  • Richards, James R. (1998). Transnational Criminal Organizations, Cybercrime, and Money Laundering. CRC Press. pp. 70–71. ISBN 978-0-8493-2806-0. Retrieved 2008-12-16. 
  • Shimomura, Tsutomu; John Markoff (1996). Takedown. p. 528. ISBN 978-0-7868-8913-6. 
  • Taylor, Paul A. (1999). Hackers: Crime in the Digital Sublime. Routledge. p. 3. ISBN 978-0-415-18072-6. Retrieved 2008-12-16. 
  • Thomas, Douglas (2003). Hacker Culture. University of Minnesota Press. p. 185. ISBN 978-0-8166-3346-3. Retrieved 2008-12-16. 
  • Anonymous (1997). Maximum Security. Sams Publishing. p. 885. ISBN 978-1-57521-268-5. 
  • References

    Justin Tanner Petersen Wikipedia