DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

FBI arrests man for theft and attempted extortion of AIG

Posted on November 8, 2008 by Dissent

While I was travelling last month, I apparently missed an important news item. In light of this week’s reports of a significant breach and extortion attempt of Express Scripts, this earlier news release from the FBI in Indianapolis is particularly timely:

Michael S. Welch, Special Agent in Charge of the Indianapolis Office of the Federal Bureau of Investigation (FBI); Steve Carter, Indiana Attorney General; and Chief Michael Spears, Indianapolis Metropolitan Police Department jointly announced today the arrest of Kevin Michael Stewart by the FBI Cyber Crime Task Force and the Safe Streets Task Force in Indianapolis, Indiana at 12:30 a.m. this morning.

Stewart is currently facing federal charges arising from the March 31, 2006 burglary of a computer server from the Indianapolis office of Medical Excess LLC, a member company of AIG. The server contained personally identifying and health care sensitive information for over 900,000 policy holders. Stewart is also accused of extorting AIG for $208,000 under a threat to release the data onto the Internet beginning on July 23, 2008. A criminal complaint has been filed with the U.S. District Court for the Southern District of Indiana alleging violations of the extortion statute, Title 18, U.S.C. § 875 and the newly enacted Title 18 U.S.C. § 1030(a)(7)(B) and (C), which make it a federal crime to commit extortion relating to unauthorized access of, or damage to, a protected computer system and/or to impair the confidentiality of information obtained from a protected computer. “Stewart is believed to be the first person in the United States to be charged under this new criminal statute, which is designed to address the theft of large data sets from organizations and the resulting consequences,” commented Assistant U.S. Attorney Steven DeBrota.

AIG reported this matter immediately to the FBI, and worked proactively and aggressively with the multi-agency task force to solve the burglary and prevent the disclosure of sensitive customer information, said SAC Welch. He went on to say, “The stakes are high when dealing with a threat of this nature, as significant damage to our citizens and our financial infrastructure can occur with a single keystroke.”

“When a company as large as AIG is vulnerable, we know that all businesses are threatened by cyber crime,” said Attorney General Steve Carter. “The world became a smaller place with the advent of the Internet and when individuals utilize the medium for criminal purposes, there are virtually no barriers on the amount of damage that can occur. It takes coordination and specialization to effectively investigate and successfully prosecute cyber-related crimes.”

The FBI Cyber Crime Task Force is a multi-agency investigative unit with members in the FBI Indianapolis Field Office, Merrillville Resident Agency, and Evansville Resident Agency. The mission of the task force is to protect Indiana’s citizens by investigating and preventing high technology crime and neutralizing national security threats involving computer networks. This is accomplished by leveraging the resources and expertise of participating law enforcement agencies, Indiana’s higher-education institutions, and members of the U.S. Intelligence Community.

Agencies participating in the task force include the Evansville Police Department, Federal Bureau of Investigation, the Indiana Attorney General’s office, Indiana Department of Natural Resources, Indiana State Police, Indianapolis Metropolitan Police Department, United States Secret Service, and the Vanderburgh County Sheriff’s Office. Purdue University’s Center for Education and Research in Information Assurance and Security (CERIAS) and Department of Computer and Information Technology’s Cyber Forensics Lab are special partners in the task force.


Related:

  • Two U.K. teenagers appear in court over Transport of London cyber attack
  • ModMed revealed they were victims of a cyberattack in July. Then some data showed up for sale.
  • JFL Lost Up to $800,000 Weekly After Cyberattack, CEO Says No Patient or Staff Data Was Compromised
  • Massachusetts hospitals Heywood, Athol say outage was a cybersecurity incident
  • Heritage Provider Network $49.99M Class Action Settlement
  • Integris Health Agrees to $30 Million Settlement Over 2023 Data Breach
Category: Health Data

Post navigation

← Pinellas Audit Reveals Confidential Files That Missed Shredder
TX: Computer Back Up Tapes Containing Personal Information Stolen →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.