DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Sprint-Nextel employee sentenced for improper disclosure of phone records to cocaine dealer

Posted on November 24, 2010 by Dissent

Amy Quesnel, 29, of Georgia, Vermont was sentenced yesterday to six months imprisonment to be followed by four months of home detention.

Quesnel had previously pled guilty to a violation of the Telephone Records Privacy Protection Act, which carries a maximum sentence of ten years imprisonment and a $250,000 fine. U.S. Attorney Coffin stated that this prosecution was important because it involved criminal conduct that threatened the confidentiality of law enforcement investigations and subjected cooperating witnesses to potential retaliation.

The defendant’s charge was included in a twenty-count/twenty defendant Indictment that alleges that Michael Olsen, 36, of Milton led a large cocaine conspiracy in northwestern Vermont. The Indictment alleges that Olsen owned Rizzo Bros. automobile detailing shop on Commerce Avenue in South Burlington but operated it as a front for a multi-kilogram cocaine distribution organization. The Indictment alleges that Olsen directed others, including codefendant Andrew Bullock, 29, of Essex Junction, to mail large amounts of cash (usually over $20,000) to cocaine suppliers in California and Arizona. The Government charges that kilograms of cocaine would then be sent to third party addresses in Chittenden and Franklin Counties where other coconspirators would pick it up upon Olsen’s instructions. According to allegations contained in Court documents, while Olsen’s shop was opened in August 2005, it eventually did little, if any, legitimate business and was essentially a front for selling cocaine and laundering cocaine proceeds. All twenty defendants have pled guilty and most, including Olsen and Bullock, are now awaiting sentencing.

As to Quesnel, the Government alleged that upon Olsen’s request and direction, Quesnel, who then worked at Sprint-Nextel, repeatedly (over 20 times) accessed phone logs of Drug Enforcement Administration (“DEA”) Agents and disclosed this information to Michael Olsen. The Government alleges that after Olsen determined which witnesses were in contact with DEA, Olsen discussed locating and killing one such witness. The Government also alleged that Olsen used this information to intimidate another witness he suspected of cooperating with DEA. The Government acknowledged that there was no evidence that Quesnel knew how Olsen was using this information after she disclosed it to Olsen.

Source: U.S. Attorney’s Office, District of Vermont

Related posts:

  • 25 Defendants Charged In Separate Schemes That Resulted In Thousands Of Identities Stolen And Millions Of Dollars In Identity Theft Tax Filings
  • Justice Department Announces Five Cases as Part of Recently Launched Disruptive Technology Strike Force
Category: Breach IncidentsBusiness SectorInsiderU.S.

Post navigation

← When in doubt, report
DPA fines – why ICO got it right →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ex-student charged with wave of cyber attacks on Sydney uni
  • Detaining Hackers Before the Crime? Tamil Nadu’s Supreme Court Approves Preventive Custody for Cyber Offenders
  • Potential Cyberattack Scrambles Columbia University Computer Systems
  • 222,000 customer records allegedly from Manhattan Parking Group leaked
  • Breaches have consequences (sometimes) (1)
  • Kansas City Man Pleads Guilty for Hacking a Non-Profit
  • British national “IntelBroker” charged with causing $25 million in damages; U.S. seeks his extradition from France
  • France issues press statement about arrest of ShinyHunters members
  • Patients Allege Home Delivery Pharmacy Failed to Timely Notify Them of Data Breach
  • Hackers breach Norwegian dam, open valve at full capacity

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Microsoft’s Departing Privacy Chief Calls for Regulator Outreach
  • Nestle USA Settles Suit Over Job-Application Medical Questions
  • NY Attorney General James Affirms Hospitals Must Provide Access to Emergency Abortion Care
  • How Internet of Things devices affect your privacy – even when they’re not yours
  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report