And how did Monsegur do that? Well, on the internet Monsegur didn’t call himself “Hector” or “Xavier”. Instead, he styled himself as “Sabu” – a prominent mouthpiece for the hacktivist community.
He was regularly seen tweeting – encouraging hacktivists to attack websites and goading the authorities on their inability to determine his true identity.
And what those hacktivists didn’t know (until his arrest was made public in 2012) was that Sabu was really working for the FBI.
Wired reports that Monsegur is due to be sentenced later today, and that because he was an “extremely valuable and productive cooperator” the authorities are calling for a federal court to sentence Monsegur to time already served – a mere seven months.
According to documents acquired by Wired, Monsegur provided information which resulted in the arrest and eventual conviction of members of the notorious LulzSec gang including Ryan Ackroyd (aka “Kayla”), Jake Davis (aka “Topiary”), Mustafa Al-Bassam (aka “T-Flow”), Darren Martyn (aka “pwnsauce”).
In addition, Monsegur helped the authorities identity and bring to justice Jeremy Hammond (aka “Anarchaos”), Ryan Cleary and Donncha O’Cearrbhail (aka “palladium”).
Prosecutors claim that Monsegur’s evidence also led them to another individual, Matthew Keys, who is currently charged in California with allegedly conspiring with Anonymous to attack the computer systems of Tribune Company, his former employer.
The moral of the story?
Well, if you’re a hacker be very careful who you trust on the internet. It could be that the people who you think are on your side, have really been convinced by the Feds to help them instead.
And if you’re a hacker who happens to be caught by the authorities. The lesson here is to co-operate with them – after all it might reduce your sentence and make life an awful lot more comfortable in the future.
The real moral of course is very simple. Don’t break the law in the first place.
Found this article interesting? Follow Graham Cluley on Twitter to read more of the exclusive content we post.