Jump to content

Hector Monsegur

From Wikipedia, the free encyclopedia

Hector Xavier Monsegur
Born1983 (age 41–42)
Other namesSabu
OccupationCybersecurity
Known forFounder of LulzSec

Hector Xavier Monsegur (born 1983),[1] known also by the online pseudonym Sabu (pronounced Sə'buː, Sæ'buː),[2] is an American computer hacker and co-founder of the hacking group LulzSec.[3] Monsegur became an informant for the FBI, working with the agency for over ten months to aid them in identifying the other hackers from LulzSec and related groups while facing a sentence of 124 years in prison.[4][5] LulzSec intervened in the affairs of organizations such as News Corporation, Stratfor, UK and American law enforcement bodies and Irish political party Fine Gael.[6]

Sabu featured prominently in the group's published IRC chats,[7][8] and claimed to support the "Free Topiary" campaign. The Economist referred to Sabu as one of LulzSec's six core members.[9]

Early life, family and formal education

[edit]

Hector Monsegur was born in New York to a 16-year-old father who raised him with his 40-year-old grandmother. Following the arrest of his father and his aunt for selling heroin, Monsegur moved to the Riis Houses (also known as the projects) in New York City with his grandmother.[10][11]

At a young age, Monsegur became interested in computers.

While attending Washington Irving High School, Monsegur was reprimanded by a security guard for bringing a screwdriver to school to help fix their computer system. Feeling insulted, he sent several complaints to the school administration. His complaints were deemed "threatening," and he was expelled. After this incident, he discontinued his formal education.[1][10][12]

Hacking career

[edit]

An early experience with hacking was at age 14 when a Puerto Rican person was accidentally killed by the Marine Corps when they started bombing outside the test range on the island of Vieques, Puerto Rico. In response, Monsegur defaced various websites with messages protesting the US government's treatment of Puerto Ricans. On one site he included the line "Hello, I am Sabu, no one special for now."[10]

In 2010, following the death of his grandmother, he became the foster parent to his two female cousins whom he was unable to support financially, so he began hacking. Committing mostly credit card fraud, he targeted large corporate bank accounts. Although he was at first only interested in hacking for profit, over time he became interested in hacktivism, and this renewed interest coincided with the rise of the political hacker group Anonymous, which he joined under the moniker "Sabu". .[10]

Sabu became the leader of a new hacking group formed by six Anonymous members. This new group was named Lulz Security (often abbreviated as LulzSec). LulzSec performed some hacks with political motives, but most of the hacks done by LulzSec were primarily motivated by a style of humor that they described as "the lulz". LulzSec was only active during a period that they referred to as the "50 days of lulz". In this time, their targets included News Corporation, Sony, and the CIA's official website.[13][14]

Sabu was identified by rival hacker group Backtrace Security as "Hector Montsegur" [sic] on March 11, 2011, in "Namshub," a PDF publication (named after the Sumerian word for "incantation").[15][16] Backtrace Security was a group of ex-Anonymous members who had grown critical of vigilante hacktivism. One member of the group explained their motives by stating, "One cannot fight for justice and democracy by using unjust, anti-democratic tactics."[17][18] Backtrace Security had found his identity through an IRC chatlog in which Sabu accidentally posted a link to his personal website.[12]

Arrest and guilty plea

[edit]

Federal agents arrested Monsegur on June 7, 2011. The following day, Monsegur agreed to become an informant for the FBI and to continue his "Sabu" persona.[19] A few days after that bail hearing, Monsegur entered a guilty plea to 12 criminal charges, including multiple counts of conspiracy to engage in computer hacking, computer hacking in furtherance of fraud, conspiracy to commit access device fraud, conspiracy to commit bank fraud and aggravated identity theft. He faced up to 124 years in prison.[19]

Activity as an informant for the FBI

[edit]

As an informant, Monsegur provided the FBI with details enabling the arrest of five other hackers associated with the groups Anonymous, LulzSec and AntiSec.[20][21] The FBI provided its own servers for the hacking to take place.[20] Information Monsegur provided also resulted in the arrest of two UK hackers: James Jeffery and Ryan Cleary.[22] The FBI attempted to use Monsegur to entrap Nadim Kobeissi, author of the secure communication software Cryptocat, but without success.[23]

Monsegur maintained his pretense until March 6, 2012, even tweeting his "opposition" to the federal government until the very last minute.[20] On March 6, 2012, the FBI announced the arrests of five male suspects: two from Britain, two from Ireland and one from the U.S. Anonymous reacted to Sabu's unmasking and betrayal of LulzSec on Twitter, "#Anonymous is a hydra, cut off one head and we grow two back".[24]

A court filing made by prosecutors in late May 2014 revealed Monsegur had prevented 300 cyber attacks in the three years since 2011, including planned attacks on NASA, the U.S. military and media companies.[25]

Monsegur served 7 months in prison after his arrest but had been free since then while awaiting sentencing. At his sentencing on May 27, 2014, he was given "time served" for co-operating with the FBI and set free under one year of probation.[26]

Post-prison career

[edit]

After his release from prison, Monsegur worked as a white hat hacker doing pentesting.[27]

References

[edit]
  1. ^ a b Kleinfield, N. R.; Sengupta, Somini (March 8, 2012). Archived from the original on November 20, 2019. Retrieved February 27, 2017.
  2. ^ Biddle, Sam (March 6, 2012). the original on March 6, 2012.
  3. ^ Olson, Parmy (2012). We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency. Little, Brown. p. 248. ISBN 978-0-316-21354-7.
  4. ^ Archived from the original on April 18, 2019. Retrieved December 11, 2018.
  5. ^ Archived from the original on January 30, 2020. Retrieved June 21, 2018.
  6. ^ Arthur, Charles; Sabbagh, Dan; Laville, Sandra (March 7, 2012). Archived from the original on July 1, 2020. Retrieved December 17, 2016.
  7. ^ Arthur, Charles; Gallagher, Ryan (June 24, 2011). Archived from the original on June 26, 2011. Retrieved December 17, 2016.
  8. ^ Cook, John; Chen, Adrian (March 18, 2011). the original on August 14, 2011.
  9. ^ Archived from the original on July 13, 2017. Retrieved February 20, 2020.
  10. ^ a b c d Fishman, Steve (June 11, 2018). Archived from the original on July 21, 2020. Retrieved April 10, 2013.
  11. ^ Sengupta, Somini (March 7, 2012). Archived from the original on July 21, 2020. Retrieved February 27, 2017.
  12. ^ a b Coleman, E. Gabriella (2015). Hacker, hoaxer, whistleblower, spy: the many faces of Anonymous. Politics (First published in paperback ed.). London, New York: Verso. ISBN 978-1-78168-983-7.
  13. ^ Weisenthal, Joe. Archived from the original on June 19, 2023. Retrieved June 19, 2023.
  14. ^ Archived from the original on June 19, 2023. Retrieved June 19, 2023.
  15. ^ Roberts, Paul (March 7, 2012). Archived from the original on January 10, 2014. Retrieved January 9, 2014.
  16. ^ "Splinter Group Says Document Outs Anonymous Members". threatpost.com. Retrieved December 19, 2022.
  17. ^ Greenberg, Andy. Archived from the original on December 25, 2022. Retrieved June 19, 2023.
  18. ^ "Backtrace Security". Federal Bureau of Investigation. October 3, 2011 – via archive.org.
  19. ^ a b Bray, Chad (March 9, 2012). Archived from the original on August 11, 2017. Retrieved August 3, 2017.
  20. ^ a b c Ball, James (March 6, 2012). Archived from the original on July 21, 2020. Retrieved December 17, 2016.
  21. ^ Bonderud, Douglas (March 15, 2012). the original on March 17, 2012.
  22. ^ Thomson, Iain (August 23, 2012). Archived from the original on May 27, 2020. Retrieved August 29, 2017.
  23. ^ Sengupta, Somini (March 12, 2012). Archived from the original on August 12, 2012. Retrieved July 29, 2012.
  24. ^ Covert, Adrian (March 6, 2012). the original on December 11, 2018. Retrieved September 9, 2017.
  25. ^ Archived from the original on May 27, 2014. Retrieved May 26, 2014.
  26. ^ Neumeister, Larry (May 27, 2014). the original on May 27, 2014. Retrieved May 27, 2014.
  27. ^ Greenberg, Andy. Archived from the original on March 5, 2022. Retrieved March 20, 2022.

Follow Lee on X/Twitter - Father, Husband, Serial builder creating AI, crypto, games & web tools. We are friends :) AI Will Come To Life!

Check out: eBank.nz (Art Generator) | Netwrck.com (AI Tools) | Text-Generator.io (AI API) | BitBank.nz (Crypto AI) | ReadingTime (Kids Reading) | RewordGame | BigMultiplayerChess | WebFiddle | How.nz | Helix AI Assistant