Albert Gonzalez

{{short description|American computer hacker and criminal}}

{{For|the former Attorney General of the United States|Alberto Gonzales}}

{{redirect-distinguish|Stanozlolz|Stanozolol}}

{{Infobox criminal

| image = Albert-gonzalez.jpg

| name = Albert Gonzalez

| image_size = 230px

| caption = Photo of Albert Gonzalez by U.S. Secret Service (pre-2009)

| birth_date = {{birth year and age|1981}}

| birth_place = Cuba

| death_date =

| death_place =

| alias = * 201679996

  • cumbajohny
  • j4guar17
  • kingchilli
  • segvec
  • soupnazi
  • stanozlolz
  • UIN 476747

| conviction =

| conviction_penalty = 20 years federal prison

| conviction_status = Released

| occupation =

| spouse =

| parents =

| children =

| criminal_charges = Hacking

}}

Albert Gonzalez (born 1981) is an American computer hacker, computer criminal and police informer,{{Cite news |last=Stone |first=Brad |date=2008-08-12 |title=Global Trail of an Online Crime Ring |language=en-US |work=The New York Times |url=https://www.nytimes.com/2008/08/12/technology/12theft.html |access-date=2023-01-04 |issn=0362-4331 |archive-date=2022-11-30 |archive-url=https://web.archive.org/web/20221130231403/https://www.nytimes.com/2008/08/12/technology/12theft.html |url-status=live }} who is accused of masterminding the combined credit card theft and subsequent reselling of more than 170 million card and ATM numbers from 2005 to 2007, the biggest such fraud in history. Gonzalez and his accomplices used SQL injection to deploy backdoors on several corporate systems in order to launch packet sniffing (specifically, ARP spoofing) attacks which allowed him to steal computer data from internal corporate networks.{{cite magazine | url=http://content.time.com/time/business/article/0,8599,1917345,00.html | title=Master Hacker Albert Gonzalez | date=19 August 2009 | access-date=15 January 2019 | author=Claire Suddath | magazine=Time | archive-date=8 January 2019 | archive-url=https://web.archive.org/web/20190108063555/http://content.time.com/time/business/article/0,8599,1917345,00.html | url-status=live }}

During his spree, he was said to have thrown himself a $75,000 birthday party and complained about having to count $340,000 by hand after his currency-counting machine broke. Gonzalez stayed at lavish hotels but his formal homes were modest.{{Cite news |title=From snitch to cyberthief of the century|url=https://www.newspapers.com/article/the-miami-herald-from-snitch-to-cyberthi/148309063/ |date=2009-08-23 |pages=1A, [https://www.newspapers.com/article/the-miami-herald/116713469/ 20A] |publisher=Miami Herald |via=Newspapers.com }} He, along with his team, were featured on the 5th-season episode of the CNBC series American Greed titled: "Episode 40: Hackers: Operation Get Rich or Die Tryin'".{{cite web |url= https://www.cnbc.com/id/100000036 |title= Case File: Operation Get Rich or Die Tryin' |website= CNBC |access-date= February 23, 2011 |archive-date= August 26, 2013 |archive-url= https://web.archive.org/web/20130826111629/http://www.cnbc.com/id/100000036 |url-status= live }}

Gonzalez had three federal indictments. The first was in May 2008 in New York for the Dave & Busters case (trial schedule September 2009). The second was in May 2008 in Massachusetts for the TJ Maxx case (trial scheduled early 2010). The third was in August 2009 in New Jersey in connection with the Heartland Payment case.[https://www.justice.gov/opa/pr/leader-hacking-ring-sentenced-massive-identity-thefts-payment-processor-and-us-retail "Leader of Hacking Ring Sentenced for Massive Identity Thefts from Payment Processor and U.S. Retail Networks"] {{Webarchive|url=https://web.archive.org/web/20180416200357/https://www.justice.gov/opa/pr/leader-hacking-ring-sentenced-massive-identity-thefts-payment-processor-and-us-retail |date=2018-04-16 }}, United States Department of Justice Friday, March 26, 2010 Retrieved on October 9, 2018 On March 25, 2010, Gonzalez was sentenced to 20 years in federal prison.{{cite web |author= Department of Justice: Office of Public Affairs. |date= March 26, 2010 |url= https://www.justice.gov/opa/pr/leader-hacking-ring-sentenced-massive-identity-thefts-payment-processor-and-us-retail |title= Leader of Hacking Ring Sentenced for Massive Identity Thefts from Payment Processor and U.S. Retail Networks |access-date= April 15, 2018 |archive-date= April 16, 2018 |archive-url= https://web.archive.org/web/20180416200357/https://www.justice.gov/opa/pr/leader-hacking-ring-sentenced-massive-identity-thefts-payment-processor-and-us-retail |url-status= live }}

Early life and education

Gonzalez bought his first computer when he was 12, and by the time he was 14 managed to hack into NASA.{{Cite news|url=https://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html|title=The Great Cyberheist|last=Verini|first=James|date=2010-11-10|work=The New York Times|access-date=2018-03-29|language=en-US|issn=0362-4331|archive-date=2014-07-19|archive-url=https://web.archive.org/web/20140719174230/http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1|url-status=live}} He attended South Miami High School in Miami, Florida, where he was described as the "troubled" pack leader of computer nerds. In 2000, he moved to New York City, where he lived for three months before moving to Kearny, New Jersey.Meek, James Gordon; and Siemaszko, Corky. [http://articles.nydailynews.com/2009-08-19/news/17931753_1_card-numbers-hacking-stephen-watt "'Soupnazi' hacker Albert Gonzalez went from nerdy past to life of sex, guns and drugs"] {{Webarchive|url=https://web.archive.org/web/20110314065740/http://articles.nydailynews.com/2009-08-19/news/17931753_1_card-numbers-hacking-stephen-watt |date=2011-03-14 }}, Daily News (New York), August 19, 2009. Accessed March 28, 2011. "After graduation, Gonzalez moved north to Manhattan and lived on the East Side for three months in 2000 before setting up shop in Kearny, N.J., records show. It was while living there in an anonymous garden apartment with mostly senior citizens as neighbors that Gonzalez was busted for hacking in 2003."

Hacking career

=ShadowCrew=

{{main|ShadowCrew}}

While in Kearny, he was accused of being the mastermind of a group of hackers called the ShadowCrew group, which trafficked in 1.5 million stolen credit and ATM card numbers.{{cite web|author=Sharon Goudin|url=https://www.computerworld.com/article/2527161/government-informant-is-called-kingpin-of-largest-u-s--data-breaches.html|title=Government informant is called kingpin of largest U.S. data breaches|date=2009-08-18|publisher=Computer World|access-date=2021-12-03|archive-date=2021-12-04|archive-url=https://web.archive.org/web/20211204014923/https://www.computerworld.com/article/2527161/government-informant-is-called-kingpin-of-largest-u-s--data-breaches.html|url-status=live}} Although considered the mastermind of the scheme (operating on the site under the screen name of "CumbaJohnny"), he was not indicted.[http://www.usdoj.gov/usao/nj/press/files/pdffiles/firewallindct1028.pdf#search=%22firewallindct1028.pdf%22] {{webarchive|url=https://web.archive.org/web/20090117135809/http://www.usdoj.gov/usao/nj/press/files/pdffiles/firewallindct1028.pdf#search=%22firewallindct1028.pdf%22|date=January 17, 2009}} According to the indictment, there were 4,000 people who registered with the Shadowcrew.com website. Once registered, they could buy stolen account numbers or counterfeit documents at auction, or read "Tutorials and How-To's" describing the use of cryptography in magnetic strips on credit cards, debit cards and ATM cards so that the numbers could be used. Moderators of the website punished members who did not abide by the site's rules, including providing refunds to buyers if the stolen card numbers proved invalid.

In addition to the card numbers, numerous other objects of identity theft were sold at auction, including counterfeit passports, drivers' licenses, Social Security cards, credit cards, debit cards, birth certificates, college student identification cards, and health insurance cards. One member sold 18 million e-mail accounts with associated usernames, passwords, dates of birth, and other personally identifying information. Most of those indicted were members who actually sold illicit items. Members who maintained or moderated the website itself were also indicted, including one who attempted to register the .cc domain name Shadowcrew.cc.

The Secret Service dubbed their investigation "Operation Firewall" and believed that up to $4.3 million was stolen, as ShadowCrew shared its information with other groups called Carderplanet and Darkprofits. The investigation involved units from the United States, Bulgaria, Belarus, Canada, Poland, Sweden, the Netherlands and Ukraine.{{cite web |author=Dan Verton |url=https://www.computerworld.com/article/2567343/secret-service-busts-online-organized-crime-ring.html |title=Secret Service busts online organized crime rin |publisher=Computerworld |date=2004-10-28 |access-date=2021-12-03 |archive-date=2021-12-04 |archive-url=https://web.archive.org/web/20211204013422/https://www.computerworld.com/article/2567343/secret-service-busts-online-organized-crime-ring.html |url-status=live }} Gonzalez was initially charged with possession of 15 fake credit and debit cards in Newark, New Jersey, though he avoided jail time by providing evidence to the United States Secret Service against his cohorts. 19 ShadowCrew members were indicted. Gonzalez then returned to Miami.

=TJX Companies hack=

While cooperating with authorities, he was said to have masterminded the hacking of TJX Companies, in which 45.6 million credit and debit card numbers were stolen over an 18-month period ending in 2007, topping the 2005 breach of 40 million records at CardSystems Solutions.{{cite web |author=Jaikumar Vijayan |url=http://www.computerworld.com/s/article/9014782/TJX_data_breach_At_45.6M_card_numbers_it_s_the_biggest_ever |title=TJX data breach: At 45.6M card numbers, it's the biggest ever – Computerworld – March 29, 2007 |publisher=Computerworld.com |date=2007-03-29 |access-date=2012-05-07 |archive-date=2012-05-02 |archive-url=https://web.archive.org/web/20120502160525/http://www.computerworld.com/s/article/9014782/TJX_data_breach_At_45.6M_card_numbers_it_s_the_biggest_ever |url-status=live }} Gonzalez and 10 others sought targets while wardriving and seeking vulnerabilities in wireless networks along U.S. Route 1 in Miami. They compromised cards at BJ's Wholesale Club, DSW, Office Max, Boston Market, Barnes & Noble, Sports Authority and T.J. Maxx.{{Cite web |url=http://www.usdoj.gov/usao/ma/Press%20Office%20-%20Press%20Release%20Files/IDTheft/Gonzalez,%20Albert%20-%20Indictment%20080508.pdf |title=Archived copy |access-date=2009-12-02 |archive-url=https://wayback.archive-it.org/all/20091202105753/http://www.usdoj.gov/usao/ma/Press%20Office%20-%20Press%20Release%20Files/IDTheft/Gonzalez,%20Albert%20-%20Indictment%20080508.pdf |archive-date=2009-12-02 |url-status=dead }}{{cite web | title = The Retail Store Hacker Albert Gonzalez Now Faces Prison Time | publisher = Law Vibe | url = http://lawvibe.com/the-retail-store-hacker-albert-gonzalez-now-faces-prison-time/ | access-date = 2009-08-19 | archive-date = 2009-08-21 | archive-url = https://web.archive.org/web/20090821141914/http://lawvibe.com/the-retail-store-hacker-albert-gonzalez-now-faces-prison-time/ | url-status = live }} The indictment referred to Gonzalez by the screen names "cumbajohny", "201679996", "soupnazi", "segvec", "kingchilli" and "stanozlolz." The hacking was an embarrassment to TJ Maxx, which discovered the breach in December 2006. The company initially believed the intrusion began in May 2006, but further investigation revealed breaches dating back to July 2005.

One of his alleged co-conspirators was Stephen Watt, known in the hacker world as "Unix Terrorist" and "Jim Jones." Watt worked at Morgan Stanley in New York City and wrote the sniffer program.{{cite magazine | url=https://www.wired.com/2009/06/watt/ | title=TJX Hacker Was Awash in Cash; His Penniless Coder Faces Prison | date=June 18, 2009 | magazine=Wired | first=Kim | last=Zetter | access-date=December 3, 2021 | archive-date=May 8, 2020 | archive-url=https://web.archive.org/web/20200508145041/https://www.wired.com/2009/06/watt/ | url-status=live }}

=Arrest=

Gonzalez was arrested on May 7, 2008, on charges stemming from hacking into the Dave & Buster's corporate network from a point of sale location at a restaurant in Islandia, New York. The incident occurred in September 2007. About 5,000 card numbers were stolen. Fraudulent transactions totaling $600,000 were reported on 675 of the cards.{{cite web |url=https://www.csoonline.com/article/2122735/three-charged-in-dave---buster-s-hacking-job.html |title=Three Charged in Dave & Buster's Hacking Job |publisher=CSO Online |date=2008-05-14 |access-date=2021-12-03 |archive-date=2010-04-03 |archive-url=https://web.archive.org/web/20100403084304/http://www.csoonline.com/article/357068/Three_Charged_in_Dave_Buster_s_Hacking_Job |url-status=live }}

Authorities became suspicious after the conspirators kept returning to the restaurant to reintroduce their hack, because it would not restart after the company computers shut down.

Gonzalez was arrested in room 1508 at the National Hotel[http://www.suntimes.com/news/nation/1729726,CST-NWS-hack23.article]{{dead link|date=May 2012}} in Miami Beach, Florida. In various related raids, authorities seized $1.6 million in cash (including $1.1 million buried in plastic bags in a three-foot drum in his parents' backyard), his laptops and a compact Glock pistol.{{cite news |url=http://www.nydailynews.com/news/us_world/2009/08/19/2009-08-19_soupnazi_nerdy_past.html |title='Soupnazi' hacker Albert Gonzalez went from nerdy past to life of sex, guns and drugs – New York Daily News – August 19, 2009 |publisher=Nydailynews.com |date=2009-08-18 |access-date=2012-05-07 |archive-date=2009-09-18 |archive-url=https://web.archive.org/web/20090918105329/http://www.nydailynews.com/news/us_world/2009/08/19/2009-08-19_soupnazi_nerdy_past.html |url-status=live }} Officials said that, at the time of his arrest, Gonzalez lived in a nondescript house in Miami. He was taken to the Metropolitan Detention Center in Brooklyn, where he was indicted in the Heartland attacks.{{Citation needed|date=March 2018}}

==Co-defendants==

Gonzalez had multiple US co-defendants for the Dave & Buster's and TJX thefts. The main ones were charged and sentenced as follows:

  • Stephen Watt was charged with providing a data theft tool in an identity theft case. He was sentenced to two years in prison and 3 years of supervised release. He was also ordered by the court to pay back $250,000 in restitution.{{cite web |url=https://www.justice.gov/criminal/cybercrime/press-releases/2008/wattCharge.pdf |title=Federal Indictment Press Release justice.gov – 2008 |publisher=Department of Justice |access-date=2012-08-05 |archive-url=https://web.archive.org/web/20130415112947/http://www.justice.gov/criminal/cybercrime/press-releases/2008/wattCharge.pdf |archive-date=2013-04-15 |url-status=dead }}
  • Damon Patrick Toey pleaded guilty to wire fraud, credit card fraud, and aggravated identity theft and received a five-year sentence.{{cite web |url=https://www.wired.com/2010/04/toey-sentence/ |title=Final Conspirator in Credit Card Hacking Ring Gets 5 Years |website=Wired.com |first=Kim |last=Zetter |date=April 15, 2010 |access-date=December 3, 2021 |archive-date=August 1, 2021 |archive-url=https://web.archive.org/web/20210801114239/https://www.wired.com/2010/04/toey-sentence/ |url-status=live }}
  • Christopher Scott pleaded guilty to conspiracy, unauthorized access to computer systems, access device fraud and identity theft. He was sentenced to seven years.{{cite web |url=https://www.justice.gov/usao/ma/news/2010/March/ScottSentencingPR.html |title=TJX DATA THEFT CONSPIRATOR SENTENCED|website=justice.gov|date= March 29, 2010 |publisher=Department of Justice |access-date=2012-08-05 |archive-url=https://web.archive.org/web/20120115074032/http://www.justice.gov/usao/ma/news/2010/March/ScottSentencingPR.html |archive-date=2012-01-15 |url-status=dead }}

=Heartland Payment Systems hack=

In August 2009, Gonzalez was indicted in Newark, New Jersey on charges dealing with hacking into the Heartland Payment Systems, Citibank-branded 7-Eleven ATM's and Hannaford Brothers computer systems. Heartland bore the brunt of the attack, in which 130 million card numbers were stolen. Hannaford had 4.6 million numbers stolen. Two other retailers were not disclosed in the indictment; however, Gonzalez's attorney told StorefrontBacktalk that two of the retailers were J.C. Penney and Target Corporation.{{cite web|url=http://www.storefrontbacktalk.com/securityfraud/j-c-penney-target-added-to-list-of-gonzalez-retail-victims/ |title=J.C. Penney, Target Added To List Of Gonzalez Retail Victims|publisher=StorefontBackTalk |date=2009-08-27 |access-date=2012-05-07 |url-status=dead |archive-url=https://web.archive.org/web/20120421081522/http://storefrontbacktalk.com/securityfraud/j-c-penney-target-added-to-list-of-gonzalez-retail-victims/ |archive-date=April 21, 2012 }} Heartland reported that it had lost $12.6 million in the attack including legal fees.{{cite web |last=Zetter |first=Kim |url=https://www.wired.com/2009/08/tjx-hacker-charged-with-heartland/ |title=Hacker Charged With Heartland, Hannaford Breaches |website=Wired.com |date=2009-08-17 |access-date=2021-12-03 |archive-date=2016-04-24 |archive-url=https://web.archive.org/web/20160424084832/http://www.wired.com/2009/08/tjx-hacker-charged-with-heartland/ |url-status=live }} Gonzalez allegedly called the scheme "Operation Get Rich or Die Tryin."

According to the indictment, the attacks by Gonzalez and two unidentified hackers "in or near Russia" along with unindicted conspirator "P.T." from Miami, began on December 26, 2007, at Heartland Payment Systems, August 2007 against 7-Eleven, and in November 2007 against Hannaford Brothers and two other unidentified companies.{{cite web|url=http://www.usdoj.gov/usao/nj/press/press/files/pdffiles/GonzIndictment.pdf |access-date=August 19, 2009 |url-status=dead |archive-url=https://web.archive.org/web/20090823200450/http://www.usdoj.gov/usao/nj/press/press/files/pdffiles/GonzIndictment.pdf |title= United States District Court. District of New Jersey|archive-date=August 23, 2009 }}

Gonzalez and his cohorts targeted large companies and studied their check out terminals and then attacked the companies from internet-connected computers in New Jersey, Illinois, Latvia, the Netherlands and Ukraine.{{cite news |last1=Verini |first1=James |title=The Great Cyberheist |url=https://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html |work=The New York Times |date=10 November 2010 |access-date=24 February 2017 |archive-date=19 July 2014 |archive-url=https://web.archive.org/web/20140719174230/http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html?_r=1 |url-status=live }}

They covered their attacks over the Internet using more than one messaging screen name, storing data related to their attacks on multiple Hacking Platforms, disabling programs that logged inbound and outbound traffic over the Hacking Platforms, and disguising, through the use of proxies, the Internet Protocol addresses from which their attacks originated. The indictment said the hackers tested their program against 20 anti virus programs.{{Citation needed|date=March 2018}}

Rene Palomino Jr., attorney for Gonzalez, charged in a blog on The New York Times website that the indictment arose out of squabbling among U.S. Attorney offices in New York, Massachusetts and New Jersey. Palomino said that Gonzalez was in negotiations with New York and Massachusetts for a plea deal in connection with the T.J. Maxx case when New Jersey made its indictment. Palomino identified the unindicted conspirator "P.T." as Damon Patrick Toey, who had pleaded guilty in the T.J. Maxx case. Palomino said Toey, rather than Gonzalez, was the ring leader of the Heartland case. Palomino further said, "Mr. Toey has been cooperating since Day One. He was staying at (Gonzalez's) apartment. This whole creation was Mr. Toey's idea... It was his baby. This was not Albert Gonzalez. I know for a fact that he wasn't involved in all of the chains that were hacked from New Jersey."{{cite web |url=http://www.storefrontbacktalk.com/securityfraud/gonzalez-case-raises-very-oid%E2%80%94and-very-frightening%E2%80%94retail-security-issues/ |title=Gonzalez Case Raises Very Old Retail Security Issues |publisher=Storefrontbacktalk.com |date=2009-08-23 |access-date=2012-05-07 |archive-url=https://web.archive.org/web/20090829093545/http://www.storefrontbacktalk.com/securityfraud/gonzalez-case-raises-very-oid%E2%80%94and-very-frightening%E2%80%94retail-security-issues/ |archive-date=2009-08-29 |url-status=dead }}

Palomino said one of the unnamed Russian hackers in the Heartland case was Maksym Yastremskiy, who was also indicted in the T.J. Maxx incident but is now serving 30 years in a Turkish prison on a charge of hacking Turkish banks in a separate matter.{{cite news |last=Stone |first=Brad |url=http://bits.blogs.nytimes.com/2009/08/19/accused-hackers-lawyer-criticizes-federal-prosecutors/?hpw |title=Hacking Suspect's Lawyer Criticizes Federal Prosecutors – nytimes.com – August 19, 2009 |publisher=Bits.blogs.nytimes.com |date=2009-08-19 |access-date=2012-05-07 |archive-date=2012-03-26 |archive-url=https://web.archive.org/web/20120326142635/http://bits.blogs.nytimes.com/2009/08/19/accused-hackers-lawyer-criticizes-federal-prosecutors/?hpw |url-status=live }} Investigators said Yastremskiy and Gonzalez exchanged 600 messages and that Gonzalez paid him $400,000 through e-gold.

Yastremskiy was arrested in July 2007 in Turkey on charges of hacking into 12 banks in Turkey. The Secret Service investigation into him was used to build the case against Gonzalez including a sneak and peek covert review of Yastremskiy's laptop in Dubai in 2006 and a review of the disk image of the Latvia computer leased from Cronos IT and alleged to have been used in the attacks.{{cite web |last=Zetter |first=Kim |url=https://www.wired.com/2009/08/gonzalez-evidence/ |title=In Gonzalez Hacking Case, a High-Stakes Fight Over a Ukrainian's Laptop |website=Wired.com |date=August 20, 2009 |access-date=2021-12-03 |archive-date=2021-10-24 |archive-url=https://web.archive.org/web/20211024005729/https://www.wired.com/2009/08/gonzalez-evidence/ |url-status=live }}

After the indictment, Heartland issued a statement saying that it does not know how many card numbers were stolen from the company nor how the U.S. government reached the 130 million number.{{cite web |url=http://www.storefrontbacktalk.com/securityfraud/gonzalez-the-al-capone-of-cyber-thieves/ |title=Gonzalez: The Al Capone Of Cyber Thieves? |publisher=Storefrontbacktalk.com |access-date=2012-05-07 |archive-url=https://web.archive.org/web/20090821131516/http://www.storefrontbacktalk.com/securityfraud/gonzalez-the-al-capone-of-cyber-thieves/ |archive-date=2009-08-21 |url-status=dead }}

=Plea bargain =

On August 28, 2009, Gonzalez's attorney filed papers with the United States District Court for the District of Massachusetts in Boston indicating that he would plead guilty to all 19 charges in the U.S. v. Albert Gonzalez, 08-CR-10223, case (the TJ Maxx case). According to reports this plea bargain would "resolve" issues with the New York case of U.S. v. Yastremskiy, 08-CR-00160 in United States District Court for the Eastern District of New York (the Dave and Busters case).{{Citation needed|date=March 2018}}

Gonzalez asked for leniency on the grounds that he had Asperger syndrome, and his attorney submitted a report from a psychiatrist describing Gonzalez's actions as "consistent with description of the Asperger's disorder" and "Internet addiction."{{cite web | url=https://www.reuters.com/article/us-hacker-autism/hacker-claims-form-of-autism-seeks-lean-sentence-idUSTRE5BH3SV20091218 | work=Reuters | title=Hacker claims form of autism, seeks lean sentence | date=December 18, 2009 | access-date=April 27, 2022 | archive-date=April 28, 2022 | archive-url=https://web.archive.org/web/20220428063218/https://www.reuters.com/article/us-hacker-autism/hacker-claims-form-of-autism-seeks-lean-sentence-idUSTRE5BH3SV20091218 | url-status=live }}{{cite web | url=https://www.telegram.com/story/news/state/2009/12/17/tjx-hacker-seeks-lower-sentence/51766323007/ | work=Telegram | title=TJX hacker seeks lower sentence, cites Asperger's | date=December 17, 2009 | access-date=April 27, 2022 | archive-date=June 3, 2023 | archive-url=https://web.archive.org/web/20230603221729/https://www.telegram.com/story/news/state/2009/12/17/tjx-hacker-seeks-lower-sentence/51766323007/ | url-status=live }} On March 25, 2010, U.S. District Judge Patti Saris sentenced Gonzalez to 20 years in prison for hacking into and stealing information from TJX, Office Max, the Dave & Busters restaurant chain, Barnes & Noble and a string of other companies.{{cite magazine | url=https://www.wired.com/2010/03/tjx-sentencing/ | magazine=Wired | first=Kim | last=Zetter | title=TJX Hacker Gets 20 Years in Prison | date=March 25, 2010 | access-date=December 3, 2021 | archive-date=April 23, 2022 | archive-url=https://web.archive.org/web/20220423224350/http://www.wired.com/2010/03/tjx-sentencing/ | url-status=live }} The next day, U.S. District Court Judge Douglas P. Woodlock sentenced him to 20 years in connection with the Heartland Payment Systems case. The sentences were ordered to run concurrently, meaning that Gonzalez will serve a total of 20 years for both cases.{{cite web|url=https://www.computerworld.com/article/2516925/gonzalez-sentenced-to-20-years-for-heartland-break-in.html|title=Gonzalez sentenced to 20 years for Heartland break-in|author=Nancy Weil|date=27 March 2010|work=Computerworld|access-date=December 3, 2021|archive-date=4 December 2021|archive-url=https://web.archive.org/web/20211204013423/https://www.computerworld.com/article/2516925/gonzalez-sentenced-to-20-years-for-heartland-break-in.html|url-status=live}} Gonzalez was also ordered to forfeit more than $1.65 million, a condominium in Miami, a blue 2006 BMW 330i automobile, IBM and Toshiba laptop computers, a Glock 27 firearm, a Nokia cell phone, a Tiffany diamond ring and three Rolex watches.{{cite news |title=The Great Cyberheist |author=James Verini |newspaper=The New York Times |date=November 10, 2010 |url=https://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html |access-date=November 14, 2010| archive-url= https://web.archive.org/web/20110326205424/http://www.nytimes.com/2010/11/14/magazine/14Hacker-t.html| archive-date=March 26, 2011| url-status= live}}

On March 25, 2011, Gonzalez filed a motion in U.S. District Court in Boston to withdraw his guilty plea. He claimed that during the time he committed his crimes, he had been assisting the United States Secret Service in seeking out international cybercriminals and said his attorneys failed to advise him that he could have therefore used a "public authority" defense.{{cite web |author=Angela Moscaritolo |url=http://www.scmagazineus.com/tjx-hacker-gonzalez-asks-for-withdrawl-of-guilty-plea/article/200488/ |title=TJX hacker Gonzalez asks for {{sic|withdrawl|nolink=y}} of guilty plea - SC Magazine |publisher=Scmagazineus.com |date=2011-04-11 |access-date=2012-05-07 |archive-url=https://web.archive.org/web/20111108052845/http://www.scmagazineus.com/tjx-hacker-gonzalez-asks-for-withdrawl-of-guilty-plea/article/200488/ |archive-date=2011-11-08 |url-status=dead }}{{cite web|url=http://www.bankinfosecurity.com/gonzalez-seeks-guilty-plea-withdrawal-a-3527|title=Albert Gonzalez Seeks Guilty Plea Withdraw - BankInfoSecurity|work=bankinfosecurity.com|access-date=2012-08-05|archive-date=2012-05-08|archive-url=https://web.archive.org/web/20120508122447/http://www.bankinfosecurity.com/gonzalez-seeks-guilty-plea-withdrawal-a-3527|url-status=live}} The Secret Service declined to comment on Gonzalez's motion.

Gonzalez (inmate number: 25702-050) served his 20-year sentence at the FMC Lexington, a medical facility. He was released on September 19, 2023.{{Cite web |url=https://www.bop.gov/inmateloc/ |title=Inmate locator: Search with 25702-050 |access-date=2022-12-08 |archive-date=2018-01-04 |archive-url=https://web.archive.org/web/20180104221115/https://www.bop.gov/inmateloc/ |url-status=live }}

See also

References

{{Reflist}}