40-Mainaustin Alcala Criminal Complaint
40-Mainaustin Alcala Criminal Complaint
40-Mainaustin Alcala Criminal Complaint
U\\lSL!V~~
uLS~
DISTRICTOFDELAWARE
UNITEDSTATESOFAMEruCA
v.
NATHAN LEROUX,
a/k/a "natelx,"
afk/a "animefre4k,,
a/k/a "comettimancer,"
a/k/a ''void mage,"
a/k/a "Durango,"
a!k/a "Cthulhu,"
"171 ~
~ s~mLt.D
q\1-c.\~'-\ ~:flL..
SANADODEH NESHEIWAT,
a/k/a "rampuptechie,"
alk/a "Soniciso,"
a/kla ccsonic,"
DAVID POKORA,
alk/a "Xenomega 9,"
alk/a "Xenon7,"
alk/a "Xenomega,"
AUSTIN ALCALA,
a/k/a "AAmonkey,"
a/k/a "AAmonkeyl,"
Defendants.
,_
o:::w
::::lcz::
r-
0..<(
u~
c;;
'-'...I
::c
~---<
Q~W
wt-o
.J!!!~
-oo
Ll-1-
~u
:;:)0:::
X:I -
o:::.n
0..
"'
Forfeiture Notice
.....10
<..:1
SUPERSEDING INDICTMENT
1.
The Defendants
hardware, video games, game engine technology, online gaming platforms, and
related products and services. Microsoft was headquartered in Redmond,
Washington. Microsoft is the developer, manufacturer and intellectual property
rights holder of the Xbox gaming console (hereinafter ''Xbox"). The latest
1.
1. Epic Games, Inc. ("Epic") was a developer of computer games, and cross~
platform game engine technology, including software used in electronic gaming
consoles such as Microsoft's Xbox gaming system. Epic was headquartered in
Cary, North Carolina. Beginning in or about January 2011, Epic was the victim
of a SQL Injection Attack and other incidents of unauthorized access to Epic's
protected computer network that resulted in the theft of Intellectual Property from
its network, including unreleased software, source code, and middleware from the
software title "Gears ofWa.r 3," which Epic developed exclusively for the
Microsoft Xbox gaming system. Epic holds certain copyrights and trademarks
related to the "Gears of War 3" game.
m. Valve Corporation ("Valve") was a developer of computer games, game engine
technology, and online gaming platforms, and the operator of the "Steam" online
gaming forum and merchandise store. Valve was headquartered in Bellevue,
Washington. Beginning in or about September 2011, Valve was the victim of a
SQL injection attack and other incidents of unauthorized access to Valve's
protected computer network that resulted in the theft of Intellectual Property and
Personal Data from its network, including the theft of Log-In Credentials for
Valve employees.
n. Activision Blizzard Inc. (..Activision") was a publisher of interactive online
garuing software for personal computers, consoles, handheld and mobile devices.
THE CONSPIRACY
2.
Between in or about January 2011 and in or about March 2014, in the District of
AUSTIN ALCALA,
a/kla "AAmonk.ey,"
aJk/a "AAmonkeyl,"
did knowingly and intentionally conspire and agree among themselves and with others known
and unknown to the grand jury, including. and C. W., to commit offenses against the United
States, namely:
a. Fraud and Related Activity in Connection with Computers by intentionally
accessing a protected computer used in or affecting interstate or foreign
commerce without authorization, and exceeding authorized access to a
protected computer, and thereby obtaining information from that computer,
namely Log-In Credentials, Personal Data, Authentication Keys, Corporate
Documents, Card Data, and Intellectual Property, for the purpose of
commercial advantage and private financial gain, and the value of that
information exceeds $5,000, in violation of Title 18, United States Code,
Sections 1030(a)(2)(C) and (c)(2)(B)(i) and (iii);
b. Fraud and Related Activity in Connection with Computers by intentionally
accessing a protected computer used in or affecting interstate and foreign
commerce and exclusively for the use of the United States Government, and
exceeding authorized access to a protected computer, and thereby obtaining
information from any deparl!nent or agency of the United States, for the
purposes of commercial advantage and private financial gain and the value of
the information obtained exceeds $5,000, in violation ofTitle 18, United
States Code, Sections 1030(a)(2)(B) and (C) and (c)(2)(B)(i) and (iii);
c. Criminal Copyright Infringement by the distribution, for the purpose of
commercial advantage and private financial gain, of a work being prepared for
3.
ALCALA, and others to hack into the computer networks of various companies, including
but not limited to Microsoft, Epic, Valve, Activision, Zombie, and the United States Department
of the Army (collectively "the Victims''), to steal and then to use, share, and sell Network Log-In
Credentials, Personal Data, Authentication Keys, Card Data, Confidential and Proprietary
Corporate Information, Trade Secrets, Copyrighted Works, and Works Being Prepared for
Commercial Distribution, and to otherwise profit from their unauthorized access.
MANNER AND MEANS OF THE CONSPIRACY
4.
ALCALA, and others sought to accomplish the conspiracy included, among other things,
the following:
Scouting Potential Victims
legitimate Log-In Credentials for potential victims, and would copy those
Log-In Credentials and save them for subsequent use.
Launching the Attacks -The Hacking Platforms
It was further part of the conspi,racy that once they hacked into the computer
networks, LEROUX, NESHEIWAT-;~POKORA, ALCALA and
conduct network reconnaissance to find and to steal Log-In Credentials,
Personal Data, Authentication Keys, Card Data, Confidential and Proprietary
10
POKORA, ALCALA
11
Internet from, among other places, Ontario, Canada, Delaware, Indiana, New
Jersey, Maryland, and Australia.
k. It was further part of the conspiracy that LEROUX, NESHEIWAT,
POKORA, ALCALA and
12
networks by, among other things, conducting their hacking via Virtual Private
Networks, including but not limited to computer programs that used
encryption to protect communications transmitted via the Internet.
n. It was further part of the conspiracy that LEROUX, NESHEIWAT,
POKORA, ALCALA and
networks by, among other things, disguising their true Internet Protocol
addresses through the use of "proxies," or intermediary computers.
o. It was further part of the conspiracy that LEROUX, NE~HEIWAT,
POKORA, ALCALA
13
21, 2011 electronic communication session via the Internet, for instance,
POKORA stated:
Have you been listening to the shit that I've done this past month?
,.
I have shit to the U.S. military. I have shit to the Australian Dept. of
Defense.
I have every single big company: Intel, AMD, Nvidia, any game company
you could name, Google, Microsoft, Disney, Warner Brothers, everything.
It's not like I'm trying to prove a point, but I'm just saying. if they notice
any of this, eventually they're going to come looking for me.
14
fuckton ofPaypals from those databases we have. Not that I logged into
them, but I've compromised enough that we could have already sold them for
Bitcoins which would have been untraceable if we did it right. It could have
already been easily an easy 50 grand."
t.
15
5.
In furtherance of the conspiracy, the following overt acts, among others, were
16
a. In or about January 2011, POKORA learned that C.W., an unindictedcoconspirator, had conducted a SQL Injection Attack against Epic, and revealed
Log-In Credentials for Epic's protected computer network.
b. In or about Januacy 2011, POKORA used legitimate Epic Log-In Credentials
to gain unauthorized access to Epic's computer network, and to copy and
17
computer network certain Copyrighted Works and Works Being Prepared For
Commercial Distribution, including "Gears of War 3," which was developed
by Epic and had not yet been commercially released. The copyrights and
trademarks to "Gears of War 3," which was commercially released on or
about September 20, 2011, are held by Epic and Microsoft.
g. On or about July 15,2011, NESHEIWAT sentPOKORA a package labeled
"Wedding Videos," which included Blu-Ray discs containing Copyrighted
Works and Works Being Prepared for Commercial Distribution, including
"Gears of War 3" gaming software.
18
j.
19
New Jersey, Maryland and Canada, POKORA, his co-conspirators and others
utilized TeamViewer software to jointly and remotely access a computer
controlled by POKORA. This computer contained multiple databases within
a "Hacking'' folder, labeled in a manner consistent with the Victims' names,
including: Epic Games (i.e., "epicgames_user_db_cracked") and Valve Corp.
(i.e., "steam_valve_accs.html"). POKORA provided Person A with access to
by.
POKORA and the others logged into Epic's webmail server with the Log-In
Credentials of an Epic employee who was assigned to respond to lmown
intrusions into Epic's computer network. POKORA and the others accessed
an Epic e-mail account and visually reviewed approximately 35
Authentication Keys. POKORA and his co-conspirators then posted the
proprietary software keys to the "Pastebin.com" website.
20
of War 3" via the Internet to an individual using the alias "Xboxdevguy."
n. In multiple online instant message chats occurring in May and July 2012, via
computers connected to the Internet from Delaware and Australia.
provided Person A with the credit card information for an Epic Games
corporate credit card issued to Epic employee, S.S., including the card
number. cardholder name, expiration date, and card brand.
Valve Computer Network
21
3," which was being prepared for commercial release by Activision Blizzard,
Inc., the holder of various trademarks and copyrights relating to the game.
"Call of Duty: Modem Warfare 3" was commercially released on or about
November 8, 2011.
r. After obtaining "Call of Duty: Modem Warfare 3," POKORA used an instant
messaging service to transmit to . . a link allowing him to download "Call
ofDn1y: Modem Warfare 3."
t. During the group's theft of"Call ofDuty: Modem Warfare 3" from Valve,
POKORA and his co-conspirators made the following statements:
i. When discussing the "Modem Warfare 3" file download, a coconspirator stated: "you don't get those unless you're Valve," to
which POKORA responded: "well, unless you're us."
iii. POKORA characterized his access to the software with the following
statements:
1. "I'm going to setup the laptop so it's ready to steal shit."
22
Zombie Studios Computer Network and U.S. Army Virtual Private Network
w .. On or about May 14, 2012, during an online communications session, . .
and Person A, who was connected to the Internet from Delaware, discussed
computer intrusions into Zombie Studios. ~ted, in part:
Time to see if I can connect to Zombie Studios still
pull some military shit
x. On or about July 29, 2012, via computers connected to the Internet from,
among other places, Delaware, Indiana, Maryland, Australia and Canada,
. . . LEROUX, ALCALA and others, including Person A, utilized
TeamViewer software to intrude into the computer network of Zombie
Studios.
y. During this intrusion,
release software and software builds for gaming software being developed by
23
additionally
and his
24
this intrusion included multiple software products produced by, or licensed to,
Zombie Studios.
25
January 2013. Within this period, the following IP addresses, which were
known to have been utilized by . t o access Zombie Studios' computer
network, had the following number of records:
203.59.226.40- approximately 104 entries;
203.59.226.72- approximately 13 entries;
203.59.226.73- approximately 3 entries;
203.59.226.75- approximately 3 entries.
Microsoft Game Developer Network Portal
hh. In or about 2011 and 2012, Microsoft and its development partners were
designing a next-generation Xbox gaming console, which Microsoft internally
codenamed "Durango" and later publicly named "Xbox One," as well as
software to be used with the new Xbox console. Microsoft released the
"Xbox One" fo.r commercial distribution on or about November 22, 2013.
ii. Microsoft operated a "Game Developer Network Portal" ("GDNP''), which
26
jj. Microsoft also provided developers with access to a software platfonn, known
as ''PartnerNet," to refine video game creation. Microsoft controlled access to
PartnerNet by, among other methods, licensing and providing authorized
network users with an ":Xbox Development Kif' ("XDK''), which are nonretail units used to access PartnerNet.
kk. Beginning in or about January 2011, LEROUX, NESHEIWAT, POKORA,
ALCALA,.and others engaged in incidents of unauthorized access into
Microsoft's computer networks, including GDNP' s protected computer
network, during which they stole Log-In Credentials, Personal Data,
Confidential and Proprietary Corporate Information, Trade Secrets,
Copyrighted Works, and Works Being Prepared for Commercial Distribution
relating to the Xbox gaming system. In particular, LEROUX. NESHEIWAT,
POKORA, ALCALA, ~d others accessed GDNP with valid, but stolen,
accounts associated with legitimate Microsoft software-development partners.
'
11. During an online electronic communication session conducted by the coconspirators on or about August 11, 2011 from computers connected to the
Internet from Australia, Canada, Delaware, and New Jersey, POKORA
claimed: "I got a couple of GDN accounts. I actually have over 16,000, just
pure developer accounts for different studios."
mm.
Maryland, New Jersey, and Delaware, and shared information that they had
gained from accessing Microsoft's PartnerNet and GDNP.
Th~
co-
nn. Using the stolen Log-In Credentials that provided them access to Microsoft's
computer networks, LEROUX, NESHEIWAT, POKORA, ALCALA and
copied files containing or relating to the specialized operating system
with software source code, technical specifications, assembly instructions, and
software design and source code writing specifications for use by game
developers for the next-generation Xbox gaming console, which Microsoft
internally codenamed "Durango" and later publicly named ''Xbox One" and
which was being prepared for commercial distribution.
to use this stolen data and operating
system software to manufactUre and then sell counterfeit versions of the next
generation Xbox gaming console, which Microsoft internally codenamed
"Durango" and later publicly named "Xbox One" and which was being
prepared for commercial distribution.
pp. LEROUX subsequently ordered hardware components from NewEgg.com and
other online vendors to build a counterfeit version of the next-generation
28
29
sold this
ww.
yy. During the August 12 and 13, 2013 intrusion in Microsoft's GDNP computer
30
files relating to ''Xbox Onen that the group had stolen from Microsoft's
computer network during prior intrusions, including files named "GDN.txt,"
''Durango ins1ructions.png," and "P4 Epic.txt." ALCALA also displayed a
folder named ''Durango\Latest," which contained a file named ''Xbox One
Roadmap."
zz. In or about September 2013, ALCALA and POKORA brokered a physical
theft, committed by A.S. and B.A., of multiple Xbox Development Kits
(XDKs) from a secure building on Microsoft's Redmond, Washington
and E.A. subsequently mailed two of the stolen consoles to ALCALA and
POKORA. In return, ALCALA transmitted to A.S. stolen Log-in Credentials
thatprovidedA.S. with access to Microsoft's GDNP.
aaa.
6.
31
7.
Between in or about January 2011 and in or about October 2013, in the District of
32
(Wire Fraud)
18 u.s. c. 1343
8.
9.
On or about each of the dates set forth below, each instance constituting a
communication in interstate and foreign commerce, the following writings, signs, signals,
pictures,
and sounds:
10.
On or about each of the dates set forth below, each instance constituting a
NATHAN LEROUX,
a/kla "natelx,"
a/k/a "anim.efre4k,"
a/kla "confettimancer,"
a/k/a "void mage,"
a/kfa "Durango,"
a/k/a "Ctb.ulhu,"
SANADODEHNESHEIWAT,
a/kla ''rampuptechie,"
alkla "Soniciso,"
a/k/a "Sonic,"
DAVID POKORA,
alk/a "Xenomega 9,"
a/k/a "Xenon7,"
a/k/a "Xenomega," and
AUSTIN ALCALA,
alk/a "AAmonkey,"
alkJa "AAmonkeyl,"
34
having intentionally devised and intending to devise a scheme and artifice- to defraud, and for
obtaining money and property, by means of materially false and :fraudulent pretenses,
representations, and promises, and for the purpose of executing such scheme and artifice, and
attempting to do so, knowingly transmitted and caused to be transmitted, by means ofwixe
communication in interstate and foreign commerce, the following writings, signs, signals,
pictures, and sounds:
April2013
12.
35
NATHAN LEROUX,
aJk/a "natelx,".
a!k/a "animefre4k,"
a/k/a "confettimancer,"
a/k/a "void mage,''
a/k/a "Durango,"
a!k/a "Cthulhu,"
SANADODEH NESHEIWAT,
a/k/a "rampuptechie,"
a!k/a ''Soniciso,"
a/k/a "Sonic,"
DAVID POKORA,
"Xbox One," and which is related to and included in a product that is produced for and placed in
interstate and foreign commerce, knowing that the Trade Secrets had been stolen, appropriated,
obtained, and converted without authorization, and intending and knowing that the disclosure
would injure Microsoft.
MANNER AND MEANS OF THE CONSPIRACY
14.
ALCALA,
GDNP using the stolen Log-In Credentials and would download Microsoft
Copyrighted Works, Works Being Prepared for Commercial Distribution, and
Trade Secrets relating to the "Xbox Live" online gaming platform and to the nextgeneration Xbox gaming console, which Microsoft internally codenamed
"Durango" and later publicly named "Xbox One," and which was being prepared
for commercial distribution.
c. It was further part of the conspiracy that LEROUX, NESHEIWAT, POKORA,
ALCALA,
Secrets with each other and with other co-conspirators in an effort to build and
then sell a counterfeit version of the next-generation Xbox gaming console, which
37
Microsoft internally codenamed "Durango" and later publicly named "Xbox One"
and which was being prepared for commercial distribution.
d. It was further part of the conspiracy that LEROUX, NESHEIWAT, POKORA,
and others would share with each other and with other co-conspirators the
15.
In furtherance of the conspiracy, the following overt acts, among others, were
38
Network Portal" ("GDNP"), during which they stole Log-In Credentials, Trade
Secrets, and Intellectual Property relating to the Xbox gaming system. In
particular, LEROUX, NESHEIWAT, POKORA, ALCALA,. and others
accessed GDNP with valid, but stolen, accounts associated with legitimate
Iv!icrosoft software-development partners.
c. During an online electronic communication session on or about August 11, 2011
from computers connected to the Internet from Australia, Canada, Delaware, and
New Jersey, POKORA claimed: "I got a couple of GDN accounts. I actually
have over 16,000, just pure developer accounts for different studios."
d. In or about July and August 2012, NESHEIWAT, LEROUX, POKORA,
39