April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

January 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Twin brothers sentenced for wire fraud, conspiring to hack into U.S. Department of State and private company

Muneeb and Sohaib Akhter

October 2 - Twin brothers Muneeb and Sohaib Akhter, 23, of Springfield, Virginia, were sentenced today for conspiracy to commit wire fraud, conspiracy to access a protected computer without authorization and conspiracy to access a government computer without authorization.  Muneeb Akhter was also sentenced for accessing a protected computer without authorization, making a false statement and obstructing justice.  Muneeb Akhter was sentenced to 39 months in prison and Sohaib Akhter was sentenced to 24 months in prison.  Each man was also sentenced to three years of supervised release.

“The Akhter brothers’ misuse of their computer skills harmed numerous individuals and companies, and their efforts to gain clandestine access to State Department systems represented a threat to national security,” said U.S. Attorney Dana J. Boente for the Eastern District of Virginia.  “Electronic barriers are no less real, or legitimate, than physical ones.  This prosecution sends a clear message to anyone else attempting to weaken the cybersecurity of institutions or use computers to commit crimes.”

The Akhter twins were indicted by a federal grand jury on April 30, 2015, and pleaded guilty on June 26, 2015.  According to court documents, beginning in or about March 2014, Muneeb Akhter hacked into the website of a cosmetics company and stole thousands of its customers’ credit card and personal information.  The Akhter brothers and co-conspirators used the stolen information to purchase goods and services, including flights, hotel reservations and attendance at professional conferences.  Muneeb Akhter also provided stolen information to an individual he met on the “dark net,” who sold the information to other dark-net users and gave Akhter a share of the profits.

In a separate scheme, the Akhter brothers and co-conspirators engaged in a series of computer intrusions and attempted computer intrusions against the U.S. Department of State to obtain sensitive passport and visa information and other related and valuable information about State Department computer systems.  In or around February 2015, Sohaib Akhter used his contract position at the State Department to access sensitive computer systems containing personally identifiable information belonging to dozens of co-workers, acquaintances, a former employer and a federal law enforcement agent investigating his crimes. 

Sohaib Akhter later devised a scheme to ensure that he could maintain perpetual access to desired State Department systems.  Sohaib Akhter, with the help of Muneeb Akhter and co-conspirators, attempted to secretly install an electronic collection device inside a State Department building.  Once installed, the device could have enabled Sohaib Akhter and co-conspirators to remotely access and collect data from State Department computer systems.  Sohaib Akhter was forced to abandon the plan during its execution when he broke the device while attempting to install it behind a wall at a State Department facility in Washington, D.C.

Furthermore, beginning in or about November 2013, Muneeb Akhter was performing contract work for a private data aggregation company located in Rockville, Maryland.  He hacked into the company’s database of federal contract information so that he and his brother could use the information to tailor successful bids to win contracts and clients for their own technology company.  Muneeb Akhter also inserted codes onto the victim company’s servers that caused them to vote for Akhter in an online contest and send more than 10,000 mass emails to students at George Mason University, also for the purpose of garnering contest votes.

In or about October 2014, Muneeb Akhter lied about his hacking activities and employment history on a government background investigation form while successfully obtaining a position with a defense contractor.  Furthermore, in or about March 2015, after his arrest and release pending trial, Muneeb Akhter obstructed justice by endeavoring to isolate a key co-conspirator from law enforcement officers investigating the conspirators’ crimes.  Among other acts, Muneeb Akhter drove the co-conspirator to the airport and purchased a boarding pass, which the co-conspirator used to travel out of the country to the Republic of Malta.  When the co-conspirator returned to the United States, Muneeb Akhter continued to encourage the co-conspirator to avoid law enforcement agents.

U.S. Attorney Dana J. Boente for the Eastern District of Virginia; Acting Chief Security Officer Charles R. Taylor for Department of Homeland Security (DHS); Assistant Secretary Gregory B. Starr for the U.S. Department of State’s Bureau of Diplomatic Security; and Assistant Director in Charge Paul M. Abbate of the FBI’s Washington Field Office, made the announcement after sentencing by U.S. District Judge T.S. Ellis, III.

This case was investigated by the Internal Security and Investigations Division of the Office of the Chief Security Officer, DHS Headquarters; the U.S. Department of State’s Bureau of Diplomatic Security, and FBI’s Washington Field Office.  Special Assistant U.S. Attorneys John Taddei and Jennifer Clarke prosecuted the case.


Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...