Photo via Pixabay
Photo via Pixabay

A sentencing hearing was delayed Monday until Aug. 22 for an Oceanside man who staged repeated attacks on a computer system operated by his former employer, a manufacturer of precision laser and mechanical drilling equipment.

Prosecutors are recommending that Conrad Pearson be sentenced to 18 months in federal prison and ordered to pay restitution of somewhere between $15,000 and $40,000, according to documents filed last week in Los Angeles federal court.

Pearson, 64, pleaded guilty in March to one count of unauthorized damage to a protected computer.

Pearson admitted that soon after he stopped working for Excellon Automation, he began transmitting “attack scripts” to the Rancho Dominguez company’s website.

The “attack scripts” constituted automated actions against Excellon’s website and included automatically downloading information from the Excellon website and automatically sending commands to the Partlink application of the website, according to court documents. The Partlink application allowed customers to check inventory of Excellon products.

The computer attacks, committed on a regular basis over the course of 10 months in 2009 and 2010, caused the Excellon server to either cease functioning or to become inordinately slow, resulting in more than $15,000 in losses to Excellon, prosecutors said.

“Computer hacking causes significant economic damage to local businesses and therefore threatens the economic vitality of our entire region,” said Eileen M. Decker, the U.S. attorney in Los Angeles.

“This defendant used his computer expertise and his knowledge of his former employer’s business to severely disrupt the company’s operations,” she said. “The victim in this case suffered harm and wasted months fighting the defendant’s attacks on its website. This case illustrates why the prosecution of those who violate cyber security laws remains a top priority for my office.”

Pearson also admitted that, in an attempt to hide his Internet address, he used a network that helps conceal the identity of a user by routing it through a distributed network of relays all around the world.

“This case demonstrates the heightened threat posed by insiders whose attacks can be more effective when they’re armed with an understanding of the network operated by a targeted company,” said David Bowdich, the assistant director in charge of the FBI’s Los Angeles field office.

—City News Service

Leave a comment

Your email address will not be published. Required fields are marked *