DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Former UCM student sentenced for stealing student and faculty info

Posted on June 19, 2013 by Dissent

Following up on the indictment of two former University of Central Missouri students for stealing faculty and student information for commercial gain, the U.S. Attorney’s Office for the Western District of Missouri issued a press release today that one of the defendants has been sentenced to three years in prison plus restitution:

Tammy Dickinson, United States Attorney for the Western District of Missouri, announced that a former student of the University of Central Missouri was sentenced in federal court today for his role in a computer hacking conspiracy.

Joseph A. Camp, 29, of Kansas City, Mo., was sentenced by U.S. District Judge Brian C. Wimes to three years in federal prison without parole. The court also ordered Camp to pay $61,500 in restitution.

Camp has been in state or federal custody since his prior arrest in a New York investigation in December 2009. Federal charges are still pending in the Western District of New York.

On April 12, 2013, Camp pleaded guilty to an unlawful computer hacking scheme at UCM from March 2009 to March 2010. Camp, who had been a student at UCM in the fall semester of 2009, conspired with Daniel J. Fowler, 23, of Kansas City, Mo., a student and community advisor at UCM. Fowler pleaded guilty to his role in the conspiracy on June 22, 2011 and awaits sentencing. In addition to the computer hacking conspiracy, Fowler also pleaded guilty to one count of computer intrusion causing damage (computer hacking).

Camp and Fowler gained unlawful and unauthorized access to the UCM computer network, which allowed them to view and download large databases of faculty, staff, alumni and student information. They were also able to transfer money to their student accounts and attempted to change grades.

Camp and Fowler developed a computer virus, which they used to infect UCM computers,  including an attempt to infect the computer used by the university’s president. They used several strategies to infect computers, such as offering to show vacation photographs on a thumb drive that contained the virus. They successfully distracted and misled at least one UCM administrator and were able to use a thumb drive to download their virus onto his UCM computer. They monitored the administrator’s computer activity and captured his username and password. They used their remote access of this administrator’s computer to remotely turn on the webcam to watch and photograph the administrator sitting at his desk in his office and to download his e-mails. They also obtained the username and password of a residence hall director and used that information to exploit the university’s computer system to conduct financial transactions in an attempt to unlawfully credit their student accounts with UCM funds.

Camp and Fowler successfully used the identities of fellow students, along with their university computer network permissions, to gain access to various portions of the computer network to which they would otherwise not have access. This also enabled them to mask their activities and mislead university authorities as to the identities of those conducting the attacks on the computer network.

Camp and Fowler manually installed the virus on several UCM computers in public areas, such as computer labs and the library. Once the virus was successfully installed on a computer, Camp and Fowler could obtain remote access to the computer, capture a user’s keystrokes, download any of the user’s files and remotely turn on the user’s webcam to watch and photograph the user of the infected computer.

Camp also admitted that he and Fowler obtained access to the affidavit used in support of a search warrant on Camp’s room. Camp used the information in that affidavit to make posts on Facebook.com to communicate threats and harass potential witnesses against them.

Camp was arrested when he traveled to New York in December 2009. After learning that Camp had been arrested in New York, Fowler encrypted and destroyed computer evidence that he thought could be used against him.

This case was prosecuted by Assistant U.S. Attorney Matthew P. Wolesky. It was investigated by the University of Central Missouri Police Department and the FBI.

(h/t, St. Louis Post-Dispatch)

Category: Education SectorMalware

Post navigation

← NZ: Woman posted wrong patient's medical records
San Jose IT Consultant Charged With Identity Theft →

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Masimo Manufacturing Facilities Hit by Cyberattack
  • Education giant Pearson hit by cyberattack exposing customer data
  • Star Health hacker claims sending bullets, threats to top executives: Reports
  • Nova Scotia Power hit by cyberattack, critical infrastructure targeted, no outages reported
  • Georgia hospital defeats data-tracking lawsuit
  • 60K BTC Wallets Tied to LockBit Ransomware Gang Leaked
  • UK: Legal Aid Agency hit by cyber security incident
  • Public notice for individuals affected by an information security breach in the Social Services, Health Care and Rescue Services Division of Helsinki
  • PowerSchool paid a hacker’s extortion demand, but now school district clients are being extorted anyway (3)
  • Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The App Store Freedom Act Compromises User Privacy To Punish Big Tech
  • Florida bill requiring encryption backdoors for social media accounts has failed
  • Apple Siri Eavesdropping Payout Deadline Confirmed—How To Make A Claim
  • Privacy matters to Canadians – Privacy Commissioner of Canada marks Privacy Awareness Week with release of latest survey results
  • Missouri Clinic Must Give State AG Minor Trans Care Information
  • Georgia hospital defeats data-tracking lawsuit
  • No Postal Service Data Sharing to Deport Immigrants

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.