DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former Sprint-Nextel employee sentenced for improper disclosure of phone records to cocaine dealer

Posted on November 24, 2010 by Dissent

Amy Quesnel, 29, of Georgia, Vermont was sentenced yesterday to six months imprisonment to be followed by four months of home detention.

Quesnel had previously pled guilty to a violation of the Telephone Records Privacy Protection Act, which carries a maximum sentence of ten years imprisonment and a $250,000 fine. U.S. Attorney Coffin stated that this prosecution was important because it involved criminal conduct that threatened the confidentiality of law enforcement investigations and subjected cooperating witnesses to potential retaliation.

The defendant’s charge was included in a twenty-count/twenty defendant Indictment that alleges that Michael Olsen, 36, of Milton led a large cocaine conspiracy in northwestern Vermont. The Indictment alleges that Olsen owned Rizzo Bros. automobile detailing shop on Commerce Avenue in South Burlington but operated it as a front for a multi-kilogram cocaine distribution organization. The Indictment alleges that Olsen directed others, including codefendant Andrew Bullock, 29, of Essex Junction, to mail large amounts of cash (usually over $20,000) to cocaine suppliers in California and Arizona. The Government charges that kilograms of cocaine would then be sent to third party addresses in Chittenden and Franklin Counties where other coconspirators would pick it up upon Olsen’s instructions. According to allegations contained in Court documents, while Olsen’s shop was opened in August 2005, it eventually did little, if any, legitimate business and was essentially a front for selling cocaine and laundering cocaine proceeds. All twenty defendants have pled guilty and most, including Olsen and Bullock, are now awaiting sentencing.

As to Quesnel, the Government alleged that upon Olsen’s request and direction, Quesnel, who then worked at Sprint-Nextel, repeatedly (over 20 times) accessed phone logs of Drug Enforcement Administration (“DEA”) Agents and disclosed this information to Michael Olsen. The Government alleges that after Olsen determined which witnesses were in contact with DEA, Olsen discussed locating and killing one such witness. The Government also alleged that Olsen used this information to intimidate another witness he suspected of cooperating with DEA. The Government acknowledged that there was no evidence that Quesnel knew how Olsen was using this information after she disclosed it to Olsen.

Source: U.S. Attorney’s Office, District of Vermont

No related posts.

Category: Breach IncidentsBusiness SectorInsiderU.S.

Post navigation

← When in doubt, report
DPA fines – why ICO got it right →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Russia Jailed Hacker Who Worked for Ukrainian Intelligence to Launch Cyberattacks on Critical Infrastructure
  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • On July 7, Gemini AI will access your WhatsApp and more. Learn how to disable it on Android.
  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.