DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Gonzalez sentenced to 20 years for TJX hack

Posted on March 25, 2010 by Dissent

Albert Gonzalez was sentenced today to 20 years in prison for the TJX hack and breaches involving retailers, a new record in sentencing for hacking.* He faced up to 25 years. He has yet to be sentenced in the Heartland Payment Systems breach, but that sentencing is expected tomorrow, and the sentences are expected to run concurrently under a plea agreement struck between the defense and prosecutors.

Kim Zetter reports:

The sentence for the largest and costliest computer-crime case ever prosecuted is the longest ever imposed in a hacking or identity-theft case. And it is among the longest imposed for a financial crime. It beats out a sentence recently imposed on hacker Max Ray Vision, who received 13 years in prison for similar crimes and was ordered to pay $27.5 million in restitution.

Gonzalez, 28, who dubbed his criminal enterprise “Operation Get Rich or Die Tryin’,” argued in court that his only motive was technical curiosity and an obsession with conquering computer networks. But chat logs the government obtained showed Gonzalez confiding in one of his accomplices that his goal was to earn $15 million from his schemes, buy a yacht and then retire.

Read more on Threat Level.

*So far, the record I’ve seen for sentencing in cases involving ID theft is the 309 year sentence handed out to Robert Thompson.

Category: Breach IncidentsBusiness SectorHackID TheftOf NoteU.S.

Post navigation

← DHEC employee fired after SLED inquiry
(follow-up) DHEC employee fired after SLED inquiry →

1 thought on “Gonzalez sentenced to 20 years for TJX hack”

  1. Golde says:
    March 25, 2010 at 7:29 pm

    This makes me want to p%#*k. With time served, good behavior, and plea bargaining- he’ll be out in 10-12 years. And still be hacking via his co-hoerts while in prison. If ANYONE thinks prison will stop this man or any other hacker, they need to pull their heads out of the sand. Cybercrime is the smart way to steal and thieves are moving toward it like moths to a light. Why steal my credit card when I can takeover a commercial account online that has $500,000 in operating money in the bank. WAKE UP. This is the tip of the digital age and the tip of the crime. The thieves has just started to build their malicious attack skill set. In five years, no one will be safe UNLESS we get smart now and work to stop them. ENCRYPTION- ever heard about it? Tiered permissions- ever set it up on a business computer? Why do they not protect our information like their precious work product that is not yet patented? Cause we are just little folks. OPEN YOUR MOUTH- remember Network? WE AREN”T GOING TO TAKE IT ANY MORE? STOP ASKING FOR THE SSN IF YOU AREN”T GOING TO PROTECT IT. These card payment services got a slap on the wrist. All are back in business. If you screwed up that bad, would you even still have a job much less be entrusted with the same valued information? It just goes to show- thieves think smart, we are in elementary school, out for recess, compared to them.

Comments are closed.

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.