<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:wfw="http://wellformedweb.org/CommentAPI/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
     xmlns:georss="http://www.georss.org/georss"
     xmlns:geo="http://www.w3.org/2003/01/geo/wgs84_pos#"
     xmlns:media="http://search.yahoo.com/mrss/">
    <channel>
        <title><![CDATA[computer-hacker - Law Offices of William W. Bruzzo]]></title>
        <atom:link href="https://www.bruzzolaw.com/blog/tags/computer-hacker/feed/" rel="self" type="application/rss+xml" />
        <link>https://www.bruzzolaw.com/blog/tags/computer-hacker/</link>
        <description><![CDATA[Law Offices of William W. Bruzzo's Website]]></description>
        <lastBuildDate>Tue, 15 Oct 2024 00:45:39 GMT</lastBuildDate>
        
        <language>en-us</language>
        
            <item>
                <title><![CDATA[Internet Extortion]]></title>
                <link>https://www.bruzzolaw.com/blog/internet-extortion/</link>
                <guid isPermaLink="true">https://www.bruzzolaw.com/blog/internet-extortion/</guid>
                <dc:creator><![CDATA[Law Offices of William W. Bruzzo]]></dc:creator>
                <pubDate>Thu, 08 Jul 2010 15:21:00 GMT</pubDate>
                
                    <category><![CDATA[Uncategorized]]></category>
                
                
                    <category><![CDATA[computer-hacker]]></category>
                
                    <category><![CDATA[Luis-Mijangos]]></category>
                
                    <category><![CDATA[Penal-Code]]></category>
                
                
                
                <description><![CDATA[<p>A computer hacker did more than steal credit card information from victims: FBI computer forensics experts found evidence of computer hacking, video voyeurism, and identity theft by Luis Mijangos. Mijangos infected other computers by using files encoded with malicious software disguised as music files. Once he could retrieve personal information, he accessed contact lists and&hellip;</p>
]]></description>
                <content:encoded><![CDATA[<div class="wp-block-image">
<figure class="alignright size-full"><img loading="lazy" decoding="async" width="320" height="233" src="/static/2022/11/computerhacker.jpeg" alt="Computer hacker" class="wp-image-1124" srcset="/static/2022/11/computerhacker.jpeg 320w, /static/2022/11/computerhacker-300x218.jpeg 300w" sizes="auto, (max-width: 320px) 100vw, 320px" /></figure></div>


<p>A computer hacker did more than steal credit card information from victims: FBI computer forensics experts found evidence of computer hacking, video voyeurism, and identity theft by Luis Mijangos. Mijangos infected other computers by using files encoded with malicious software disguised as music files. Once he could retrieve personal information, he accessed contact lists and sent those people malware. He would also search files for explicit photos or videos of the user. The police affidavit further explains that Mijangos would then tell the victims that unless they sent him more explicit material of themselves he would distribute the images and videos he was able to collect to the people in their contact list. Mijangos explains that he was requesting the information because husbands or boyfriends of the victims were trying to determine if the victims were being unfaithful. See Penal Code Sections 518, 530.5, 530.6.</p>
]]></content:encoded>
            </item>
        
    </channel>
</rss>