Telecom Signaling Industry News

TMCNet:  Cyber-security specialist at Scott Air Force Base was investigated for hacking [Belleville News-Democrat :: ]

[August 30, 2014]

Cyber-security specialist at Scott Air Force Base was investigated for hacking [Belleville News-Democrat :: ]

(Belleville News-Democrat (IL) Via Acquire Media NewsEdge) Aug. 31--A Mascoutah man stationed at Scott Air Force Base and hired to ensure the security of Department of Defense computers was being investigated for hacking before he took his own life, according to recently unsealed federal court records.

FBI Agent Christopher Trifiletti showed up to question Jamie Magers, 33, who worked as a cyber-security specialist, at his office at Scott Air Force Base on Sept. 23. Trifiletti also had a search warrant to search Magers' home at 410 Turquoise Court in Mascoutah, allowing them to seize computer equipment at the home. The contents of the search warrant affidavit were unsealed in federal court earlier this month.

The next day after Magers was questioned by federal agents and his home was searched, Mascoutah police found Magers in the driver's seat of his Cadillac in the parking lot of Mascoutah City Hall with a gunshot wound to his head.

"I know once you go through everything, you will find things that crossed the line. Nothing I've done was meant to hurt anyone ... I never planned to leak anything or release anything to the public ... If I could go back and undo my wrongs I would. I hope you know that I am a good person at heart, even if I let my (curiosity) get the better of me," Magers wrote in a portion of his suicide note addressed to the FBI.

Brad Ware, spokesman for the Springfield Division of the FBI, declined to comment because the investigation is ongoing.

Magers was assigned to a hunt team for the Defense Information Systems Agency, a team that detects unauthorized intrusions into Department of Defense networks. As part of his employment at Scott Air Force Base, Magers had access to sensitive and classified material, according to the search warrant affidavit.

Alarms went up on Sept. 3 when an unnamed government agency lost control of an email account and related website in early September. An FBI investigation identified "Jamie Magers as the likely perpetrator of the malicious activity." Investigators discovered that in addition to the compromised e-mail account and website. Magers accumulated a "significant amount of information" on an unnamed person, including personal pictures, partial credit card information, account passwords, emails, college transcripts, the search warrant application stated. Magers also accessed the voicemail of that individual's boyfriend and downloaded those messages to his computer, Trifiletti stated.

"Investigation is ongoing as to the nature of the relationship between Magers and this individual, and to determine why Magers would have acquired such information," the affidavit stated.

Magers also accessed the email account for a musical group and the individual email accounts for each member of the group, Trifiletti stated.

"Magers' computer contained copies of records such as pay stubs, contract negotiations, artistic drafts of unreleased album art, copies of passports, personal pictures and videos, and other items related to the musical group and its members that would not be public," according to the warrant.

The name of the band was not listed.

Federal agents would not get the chance to question Magers about why he collected this information or who he was sharing it with, but they do name another civilian contractor who worked at Shaw Air Force Base in South Carolina that may have known about Magers' activities.

In a chat exchange referenced in court documents, Magers writes to the man, who has not been charged, "I have something epic. ... You're missing out on some good stuff. Yeah. Passwords, logons, access to servers." Among items found at Magers' home were "Pass-Pal devices," which are small, hand-built USB password storage devices that can hold multiple passwords or tokens and photographs of a "data ex-filtrators," a hand-built customized storage device that can deceive a computer into thinking that the device is a keyboard, allowing the user to get around security measures and allow the unauthorized transfer of data.

Magers' fiance, who declined to comment, told investigators that the night after the search warrant was executed, Magers was "frantically" trying to find out what electronic devices were seized.

Within hours of being questioned by federal agents, Magers wrote a note, took a .38-caliber handgun and drove to the city's parking lot in his black Cadillac.

The car was found there the next morning. Magers was in the front seat with a gunshot wound to the head. He died three days later -- the day before his 34th birthday.

"(Trifiletti) believes Magers was involved in additional criminal activity, including unauthorized access, the details of which are not yet known to investigators but could be critical to the (government)," the affidavit stated.

Contact reporter Beth Hundsdorfer at or 618-239-2570.

___ (c)2014 the Belleville News-Democrat (Belleville, Ill.) Visit the Belleville News-Democrat (Belleville, Ill.) at Distributed by MCT Information Services

[ Back To Telecom Signaling's Homepage ]

Featured Events

5G NA Signaling Day

November 14-16, 2016
Sheraton Dallas, Dallas, TX

Featured Webcasts

Securing The Signaling Interconnect: Oracle's Perspective On Recent Security Events

Today's telecommunications landscape is changing rapidly, and the "institution" of trust between networks that has been assumed over the decades is no longer relevant. We are now hearing of vulnerabilities in CSP interconnection points that have been known ...

Applications of Wi-Fi Calling

With all of the discussion about faster data access and richer content, it could be assumed that voice services no longer play an important role in the business model of the communications service provider. Join ReThink Technologies Research and Oracle Communications as we explore ...

Featured Whitepapers

Oracle Communications Diameter Signaling Router Main Differentiators

Diameter is the protocol used by network elements in LTE and 3G networks to enable and monetize services, such as voice, video and data. Diameter enables revenue-generating data services; including tiered data plans, loyalty programs, application specific QoS, content provider and Internet of Things (IoT) solutions ...

Multi-Layer Security Protection for Signaling Networks

The sanctity of mobile operators' networks and brands will depend greatly on their ability to deliver QoS guarantees to roaming and interconnect partners, while simultaneously protecting increasingly multimedia-savvy and socially connected ...

Featured Datasheets

Oracle Communications Diameter Signaling Router

Centralizing Diameter routing with cloud deployable Oracle Communications Diameter Signaling Router creates a secure signaling architecture that reduces the cost and complexity of the core network and enables elastic growth, interoperability and rapid introduction ...

Oracle Communications Mobile Security Gateway

The Oracle Communications Mobile Security Gateway is a high performance gateway that allows the Communications Service Provider (CSP) to cost effectively expand network coverage and increase capacity by incorporating Heterogeneous ...

Oracle Communications Evolved Communications Application Server

As service providers drive their networks toward an all-IP and virtualized state, they require the means to design and deliver compelling high definition voice, video and multimedia offers via Voice over LTE (VoLTE) and Voice over WiFi (VoWiFi) ...

Featured Infographic