For years, John Steele has been half of a criminal enterprise masquerading as a copyright law firms, "Prenda Law," whose owners, clients and employees were a mix of lies, impersonations, and crumbs of reality. In a guilty plea, John Steele admitted that the whole thing was a con, that they stole $6,000,000 from innocent internet users by threatening them with draconian copyright lawsuits, and then laundered the money.
Steele also implicated his business partner Paul Hansmeier, who is awaiting trial.
Steele and Hansmeier created pornographic movies, uploaded them to file-sharing sites, then spied on the downloads and abused copyright law to uncover the identity of the downloaders in order to send them copyright threats. They repeatedly lied to judges about what they were doing, and forged documents implicating people in their circle, from a hapless handyman to a housekeeper to Steele's own mother-in-law.
The saga of Prenda's trolling lasted for more than half a decade, during which thousands of people had their lives turned upside-down by these fraudsters.
Steele will be sentenced by US District Judge Joan Ericksen of the District of Minnesota. The sentencing hasn't been scheduled yet.
His alleged co-conspirator, Paul Hansmeier, was also arrested and charged at the same time as Steele. Hansmeier's case hasn't yet been resolved. Hansmeier lost his law license last year after legal regulators accused him of the same types of activity that the FBI and IRS have investigated.
It’s finally over: Mastermind behind Prenda Law porn trolls pleads guilty
[Joe Mullin/Ars Technica]
Denuvo bills itself as the best-of-breed in games DRM, the most uncrackable, tamper-proof wrapper for games companies; but its reputation tells a different story: the company's products are infamous for falling quickly to DRM crackers and for interfering with game-play until you crack the DRM off the products you buy.
Locking bootloaders with trusted computing is an important step towards protecting users from some of the most devastating malware attacks: by allowing the user to verify their computing environment, trusted computing can prevent compromises to operating systems and other low-level parts of their computer's operating environment.
The Yokohama Board of Education has posted scans of six fantastic catalogs from Hirayama Fireworks and Yokoi Fireworks, dating from the early 1900s. The illustrated catalogs are superb, with minimal words: just beautiful colored drawings depicting the burst-pattern from each rocket.
A picture can be worth a heck of a lot more than just a thousand words. If you’ve squinted for ages trying to get just the right photo, you might have the right passion for a career behind the camera. You might even have the right equipment, but do you have the know-how? The Beginner-To-Expert […]
In case you hadn’t noticed from the sleigh bell-heavy music and the hues on your Starbucks cup, the holiday season hasn’t shown any more patience this year. But that doesn’t need to be a bad thing, especially if you’re hoping to get a jump on your shopping. Retailers aren’t waiting til Black Friday to dish […]
What do you get for the techie who has everything? How about giving them a Raspberry Pi and letting them make pretty much anything. Or better yet, do it for yourself with the Ultimate Raspberry Pi eBook Bundle. This trove of ideas and education unlocks the unlimited potential of this mini-computer, whose affordability and versatility […]