Audio By Carbonatix
A US man has pleaded guilty to hacking into the email accounts of stars such as Scarlett Johansson and sending nude photos to celebrity websites.
Christopher Chaney, 35, from Jacksonville, Florida, admitted nine charges including unauthorised access to a computer and wiretapping.
Prosecutors said Mr Chaney had accessed the emails of more than 50 celebrities.
He was ordered to be held in custody until sentencing on 23 July where he could face up to 60 years in prison.
Under a plea bargain, Mr Chaney could also pay a fine of up to $2.2m (£1.65m) and must pay restitution to his victims, ranging from $15,000 (£11,000) to $400,000 (£300,000).
Mr Chaney, who initially pleaded not guilty to the charges, was arrested in October 2011 as part of a year-long FBI investigation of celebrity hacking that authorities dubbed "Operation Hackerazzi".
Other victims included Friends With Benefits star Mila Kunis, singer Christina Aguilera and High School Musical actress Vanessa Hudgens.
Mr Chaney admitted he hacked into the personal emails of his targets by clicking on the "forgot password" feature of their accounts and answering security questions by using publicly available information about celebrities that he found on the internet.
'Justice will prevail'
Once in control of the accounts, he obtained private photos, business contracts, scripts, and other documents.
He also went through contacts lists to find other victims and sometimes posed as friends to request more private photos.
Mr Chaney then forwarded many of the images he found, including nude photos of Johansson, to gossip websites which posted them online.
Johansson told Vanity Fair in December that the photos were meant for her ex-husband Ryan Reynolds.
"I have confidence that justice will prevail and that the court will set a precedent for a 'no tolerance policy' in regards to identity theft, computer hacking and invasion of privacy," the actress said in a statement to the Associated Press.
Prosecuting lawyer Andre Birotte said: "Today's guilty pleas shine a bright light on the dark underworld of computer hacking.
"This case demonstrates that everyone, even public figures, should take precautions to shield their personal information from the hackers that inhabit that dark underworld."
DISCLAIMER: The Views, Comments, Opinions, Contributions and Statements made by Readers and Contributors on this platform do not necessarily represent the views or policy of Multimedia Group Limited.
Tags:
DISCLAIMER: The Views, Comments, Opinions, Contributions and Statements made by Readers and Contributors on this platform do not necessarily represent the views or policy of Multimedia Group Limited.
Latest Stories
-
Minority welcomes security recruitment increase but calls for proper funding
18 minutes -
Luv FM Primary Schools Quiz: Manna International School books semi-final slot
21 minutes -
Court of Appeal dismisses stay application in Bissue case
22 minutes -
KMA force arrests 4 persons over sale of illegal drugs
26 minutes -
Unemployed graduates with disabilities threaten nationwide protest on March 24 if gov’t fails to act on job crisis
32 minutes -
Zambia opens market doors for Ghanaian products, highlights demand for Shea butter and Fugu
33 minutes -
Top US counterterrorism official resigns over Trump’s Iran war, says Iran posed ‘no imminent threat’ to US
33 minutes -
Ghana School Feeding Programme completes nationwide training to improve quality of school meals
46 minutes -
Gender Ministry trains staff to strengthen fight against human trafficking
49 minutes -
Minority calls on gov’t to settle UK scholarship fees to avert student deportation
59 minutes -
‘Wikipedia Highlife @ 100 Project’ launched to document a century of highlife music
60 minutes -
World Bank urges skills revolution to unlock jobs for Africa’s youth
1 hour -
We don’t have the infrastructure to take large numbers – Emmanuel Kotin
1 hour -
Loss of indigenous languages could erase cultural knowledge – Historian cautions
1 hour -
I stand by ‘retrogression’ comment on Stonebwoy – Tilly Akua Nipaa
1 hour
