Bennington and his wife were harassed by a cyberstalker named Devon Townsend for almost a year. Townsend was found guilty of tampering with the couple's email, as well as sending threatening messages, and was later sentenced to two years in prison.
https://en.wikipedia.org/wiki/Chester_Bennington
https://en.wikipedia.org/wiki/Chester_Bennington
A former national laboratory worker has admitted that she used government computers to access the e-mail account of Linkin Park lead singer Chester Bennington and hacked into a cell phone company's Web site to obtain his phone number.
...
Townsend, who worked in Sandia National Laboratories' technology and manufacturing group, used lab computers to access private information about Bennington and his wife, Talinda, from January 2006 to November 2006.
According to a plea agreement filed Friday, Townsend said she was able to access family photos, information about a new home bought by the Benningtons, the couple's travel plans, and correspondence between Warner Bros. Records and Linkin Park's business attorney — including a copy of a check made to Bennington from the record company and a copy of the band's recording contract.
ownsend also accessed the couple's cell phone accounts online and was able to download digital phone pictures and monitor voice messages.
"On at least one occasion, knowing that Chester Bennington was in Arizona, I traveled to Arizona solely for the purpose of trying to see him," Townsend said in the plea agreement. "While I was there, I monitored Chester Bennington's voice mails as a means of trying to locate where he might be eating dinner or lunch."
Investigators said Townsend also hacked into the e-mail of Bennington's wife and at one point called the former Playboy model and threatened her.
Court documents also said investigators searched Townsend's home in Albuquerque and found Linkin Park posters, autographed band memorabilia, pictures of Townsend with Chester Bennington, bootlegged Linkin Park music, and copies of messages and photographs intercepted from the Bennington family's e-mail accounts.
http://www.foxnews.com/story/2007/07/02 ... ngton.html
...
Townsend, who worked in Sandia National Laboratories' technology and manufacturing group, used lab computers to access private information about Bennington and his wife, Talinda, from January 2006 to November 2006.
According to a plea agreement filed Friday, Townsend said she was able to access family photos, information about a new home bought by the Benningtons, the couple's travel plans, and correspondence between Warner Bros. Records and Linkin Park's business attorney — including a copy of a check made to Bennington from the record company and a copy of the band's recording contract.
ownsend also accessed the couple's cell phone accounts online and was able to download digital phone pictures and monitor voice messages.
"On at least one occasion, knowing that Chester Bennington was in Arizona, I traveled to Arizona solely for the purpose of trying to see him," Townsend said in the plea agreement. "While I was there, I monitored Chester Bennington's voice mails as a means of trying to locate where he might be eating dinner or lunch."
Investigators said Townsend also hacked into the e-mail of Bennington's wife and at one point called the former Playboy model and threatened her.
Court documents also said investigators searched Townsend's home in Albuquerque and found Linkin Park posters, autographed band memorabilia, pictures of Townsend with Chester Bennington, bootlegged Linkin Park music, and copies of messages and photographs intercepted from the Bennington family's e-mail accounts.
http://www.foxnews.com/story/2007/07/02 ... ngton.html
Our unique mission responsibilities in the nuclear weapons (NW) program create a foundation from which we leverage capabilities, enabling us to solve complex national security problems.
As a multidisciplinary national laboratory and federally funded research and development center (FFRDC), Sandia accomplishes tasks that are integral to the mission and operation of our sponsoring agencies by
[*]anticipating and resolving emerging national security challenges
[*]innovating and discovering new technologies to strengthen the nation’s technological superiority
[*]creating value through products and services that solve important national security challenges
[*]informing the national debate where technology policy is critical to preserving security and freedom throughout our world
As an FFRDC for the National Nuclear Security Administration (NNSA), we have a long-term relationship with our sponsor. This creates an environment that supports our fields of expertise, enables us to maintain our objectivity and independence, and allows us to be familiar with our sponsor’s mission. We bring the FFRDC culture to all our federal sponsors to provide long-term support, solutions to existing problems and emerging threats, and quick-response capabilities. As an objective, independent, and trusted advisor, we draw from our deep science and engineering experience to anticipate, innovate, create, and inform the policy debate for decision makers.
http://www.sandia.gov/about/mission/index.html
As a multidisciplinary national laboratory and federally funded research and development center (FFRDC), Sandia accomplishes tasks that are integral to the mission and operation of our sponsoring agencies by
[*]anticipating and resolving emerging national security challenges
[*]innovating and discovering new technologies to strengthen the nation’s technological superiority
[*]creating value through products and services that solve important national security challenges
[*]informing the national debate where technology policy is critical to preserving security and freedom throughout our world
As an FFRDC for the National Nuclear Security Administration (NNSA), we have a long-term relationship with our sponsor. This creates an environment that supports our fields of expertise, enables us to maintain our objectivity and independence, and allows us to be familiar with our sponsor’s mission. We bring the FFRDC culture to all our federal sponsors to provide long-term support, solutions to existing problems and emerging threats, and quick-response capabilities. As an objective, independent, and trusted advisor, we draw from our deep science and engineering experience to anticipate, innovate, create, and inform the policy debate for decision makers.
http://www.sandia.gov/about/mission/index.html
It was September 11, 2006, a fateful anniversary but just another Monday for Konstantinos "Gus" Dimitrelos. A solid 5'5" Joe Pesci look-alike, Dimitrelos, 40, was sitting in his office behind a Belk's department store in Spanish Fort, Alabama, when Talinda Bennington called. Dimitrelos is a former Secret Service agent with a black belt in judo and a knack for computer forensics. As a special agent in the Secret Service's Technical Security Division, Dimitrelos would secure locations for visits by presidents Clinton and Bush — sweeping it for hazards like bugs and chemical weapons, as well as setting up evacuation measures in case of disaster or attack.
The mission of the Secret Service also covers fraud, identity theft, and assisting local law enforcement with forensics. As a result, Dimitrelos had chased down counterfeiters in Colombia and software pirates in Miami. He was particularly adept at interrogations. "I pride myself on getting a confession," he says. "I'm a midget compared to the guy in the street, but I'll break him. I'll throw a chair through a wall, flip over a table."
In 2003, Dimitrelos blew out a knee during a confrontation, which relegated him to a desk job. When he retired a couple of years later, he could have gone into the private sector — he had lucrative offers to do cybersecurity work for Home Depot and Bank of America — but that wasn't his speed. "Corporate America just does not appeal to me; I like the idea of putting people away." At about this time, the state of Alabama needed someone to set up a computer-forensics department and asked Dimitrelos to organize and run it. There was a two-year backlog of state cases seeking to use the FBI forensic labs, and state law-enforcement officers needed to be trained on the seizure of digital evidence. He wasn't crazy about moving to the sticks. But he took the contract gig and ended up digging the beaches and the barbecues in this small town of 5,600 people.
(continued)
The mission of the Secret Service also covers fraud, identity theft, and assisting local law enforcement with forensics. As a result, Dimitrelos had chased down counterfeiters in Colombia and software pirates in Miami. He was particularly adept at interrogations. "I pride myself on getting a confession," he says. "I'm a midget compared to the guy in the street, but I'll break him. I'll throw a chair through a wall, flip over a table."
In 2003, Dimitrelos blew out a knee during a confrontation, which relegated him to a desk job. When he retired a couple of years later, he could have gone into the private sector — he had lucrative offers to do cybersecurity work for Home Depot and Bank of America — but that wasn't his speed. "Corporate America just does not appeal to me; I like the idea of putting people away." At about this time, the state of Alabama needed someone to set up a computer-forensics department and asked Dimitrelos to organize and run it. There was a two-year backlog of state cases seeking to use the FBI forensic labs, and state law-enforcement officers needed to be trained on the seizure of digital evidence. He wasn't crazy about moving to the sticks. But he took the contract gig and ended up digging the beaches and the barbecues in this small town of 5,600 people.
(continued)