Hacker sentenced to 18 months for peddling computer access to US national security lab

The man offered to sell an undercover FBI agent entry to Lawrence Livermore National Laboratory supercomputers

A Pennsylvania man who hacked into multiple corporate, university and government computer networks and tried to sell access to them, including supercomputers from a U.S. national security laboratory, has been sentenced to 18 months in prison.

Andrew Miller, 24, pleaded guilty in August to one count of conspiracy and two counts of computer fraud for actions committed between 2008 and 2011, when he was part of the Underground Intelligence Agency hacking group, the U.S. Department of Justice said Thursday. Miller was sentenced Wednesday.

Miller asked an undercover FBI agent in 2011 for US$50,000 in exchange for access to two supercomputers at the Lawrence Livermore National Laboratory, according to the DOJ.

The Oakland, California, lab is focused on national and global defense and its work includes biosecurity, counterterrorism, nuclear energy, intelligence and military weapons. The supercomputers Miller claimed he had accessed were part of the lab's National Energy Research Scientific Computing Center (NERSC).

According to court documents, the FBI never "bought" the access credentials for the lab, but it did obtain from Miller proof that he had accessed two supercomputers that provide computing resources for the U.S. Department of Energy. He told the FBI got the access after breaking into a Japanese university with connections to the NERSC.

The FBI did buy from Miller access to computer servers from RNKTel.com, a Massachusetts telecommunications provider. Miller also sold to the undercover agents access to servers from Colorado ad agency Crispin Porter and Bogusky which hosted websites, databases and email servers from a variety of merchants, including from Domino's Pizza.

The FBI also bought from Miller what court documents describe as a "massive database of thousands of log-in credentials into hundreds of computer networks" which he said he obtained by hacking into servers from Layered Tech, a Texas Internet service provider.

Miller's modus operandi consisted of breaking into computer networks via a variety of methods, including targeting specific authorized network users and infecting their computers with malware, which allowed him to steal their log-in information.

Then, once inside the network, he would look for valuable information, such as log-in information from other users, and he would install "backdoors" with his own passwords. This allowed him to return to the networks while bypassing security and to potentially sell access to them to cybercriminals.

In computer chats with the undercover agents, Miller claimed to have hacked into servers from American Express, Yahoo, Google, Adobe, Wordpress, Cisco, Harvard University and the University of California at Davis. He also claimed to have accessed very sensitive U.S. government networks from agencies including NASA, Los Alamos National Laboratory, Oak Ridge National Laboratory and Argonne National Laboratory.

In a filing with the court in November, Massachusetts U.S. Attorney Carmen Ortiz called Miller's actions "widespread, persistent and pernicious hacking" and said he was aware he was breaking the law, but she also said it's not clear how much actual damage he caused.

"Likewise, he did not successfully monetize his hacking activities," Ortiz wrote, adding that the government is only aware of a $500 sale completed before the undercover agent got in touch with Miller.

Ortiz recommended an 18-month sentence, three years of supervised release and monetary penalties of about $16,000 to U.S. District Judge Mark Wolf of the District of Massachusetts.

However, in letters to the court, Miller and members of his family, including his mother and father, pleaded for him to be spared jail time, saying he was very sorry for his actions, is seeing a psychiatrist for depression, and is needed at home to help care for his mother, who is very ill.

Miller faced a maximum penalty of 15 years in prison and $500,000 in fines for the three counts in his indictment that he pleaded guilty to. He had previously been convicted in 2004, when he was a minor, of being involved in writing malicious software, according to Ortiz's filing.

Juan Carlos Perez covers enterprise communication/collaboration suites, operating systems, browsers and general technology breaking news for The IDG News Service. Follow Juan on Twitter at @JuanCPerezIDG.

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags cybercrimelegalintrusionU.S. Department of JusticeCriminal

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Juan Carlos Perez

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Tom Pope

Dynabook Portégé X30L-G

Ultimately this laptop has achieved everything I would hope for in a laptop for work, while fitting that into a form factor and weight that is remarkable.

Tom Sellers

MSI P65

This smart laptop was enjoyable to use and great to work on – creating content was super simple.

Lolita Wang

MSI GT76

It really doesn’t get more “gaming laptop” than this.

Jack Jeffries

MSI GS75

As the Maserati or BMW of laptops, it would fit perfectly in the hands of a professional needing firepower under the hood, sophistication and class on the surface, and gaming prowess (sports mode if you will) in between.

Taylor Carr

MSI PS63

The MSI PS63 is an amazing laptop and I would definitely consider buying one in the future.

Christopher Low

Brother RJ-4230B

This small mobile printer is exactly what I need for invoicing and other jobs such as sending fellow tradesman details or step-by-step instructions that I can easily print off from my phone or the Web.

Featured Content

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?