United States v. Watt

707 F. Supp. 2d 149, 2010 U.S. Dist. LEXIS 41070, 2010 WL 1676439
CourtDistrict Court, D. Massachusetts
DecidedApril 27, 2010
DocketCrim. 08cr10318-NG
StatusPublished
Cited by4 cases

This text of 707 F. Supp. 2d 149 (United States v. Watt) is published on Counsel Stack Legal Research, covering District Court, D. Massachusetts primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
United States v. Watt, 707 F. Supp. 2d 149, 2010 U.S. Dist. LEXIS 41070, 2010 WL 1676439 (D. Mass. 2010).

Opinion

SENTENCING MEMORANDUM

GERTNER, District Judge.

This case concerns what is reported to be the largest conspiracy to commit identity theft in American history. The defendant, Stephen Watt (“Watt”), played a unique role in the conspiracy, unique, that is, for run of the mill fraud crimes before the advent of the Internet. He adapted certain software that enabled the principals of the conspiracy to extract information from a number of companies, but he received no money for his work. He did it for the challenge, for the thrill of besting large institutions. But whatever the motive, however childish, morally irresponsible, not to mention legally culpable, it resulted in millions of victims and substantial losses.

To focus in sentencing on the man yields one result: He is a first offender with a supportive family and, by all accounts, a brilliant future. To focus on the crime yields another calculus. It was an extraordinary offense in scope and sophistication. This kind of dilemma is not unusual in a white collar case — most are first offenders pulling off or trying to pull off a fraud— but it is particularly stark here.

Watt, 25 years old, was charged in a one-count information with conspiracy, in violation of 18 U.S.C. § 371. He waived indictment and pled guilty pursuant to a plea agreement on December 22, 2008. He was released on a $100,000 secured bond. He has been in substantial compliance with his conditions of release since that time. 1

This Court held sentencing hearings over two days. At the initial hearing, the Court expressed concern that related cases 2 were in front of other judges at *151 different stages of litigation, which could result in disparate treatment of similarly-situated offenders. No one judge could see the entire picture. And without a global view, the Court could not comply with 18 U.S.C. § 3553(a)(6)’s direction, calling for “avoiding] unwarranted sentence disparities among defendants with similar records who have been found guilty of similar conduct.” When counsel at the first hearing also indicated that Watt made no money from his participation in the offense, the Court had new concerns— what motivated him to participate, what brand of sociopathy, if any, did he suffer from — and requested additional information about Watt. 3

The parties could not have been further apart on sentencing. Defense counsel urged probation for a sentence of six months or less. The government pressed for the maximum sentence of five years. The Guidelines were of no help; if not for the statutory maximum, the Guidelines for an offense level 43 and criminal history I would have called for a sentence of life imprisonment.

I rejected the defendant’s proposal as being unduly lenient. Substantial punishment was plainly called for because of what Watt did and why, as I describe below. But at the same time, I rejected the government’s recommendation as too severe for a first offender under the circumstances. Accordingly, I sentenced Watt to 24 months of custody, three years of supervised release, and a substantial order of restitution, amounting to $171.5 million.

I. OFFENSE

From 2004 to 2007, Albert Gonzalez (“Gonzalez”) and his associates stole over 40 million credit and debit card numbers from major retailers, including TJX companies, DSW, and BJ’s Wholesale Club. The group tapped into the corporations’ *152 networks and lifted financial data using sophisticated computer programs. Gonzalez then sold millions of these numbers overseas to third parties. Losses total $171.5 million for TJX, 4 between $6.5 and $9.5 million for DSW, and between $11 and $13 million for BJ’s. According to the presentence report — and uncontested — the victims also include the thousands of banks who have had to cover the losses and the millions of individuals whose financial information was stolen. PSR ¶¶ 2, 5

A. The Gonzalez — Scott Conspiracy

From 2003 to 2006, Gonzalez and Christopher Scott (“Scott”) hacked into computer networks for bizrate.com, panduck.com, fortunecity.com, and Florida International University. The two then hacked into BJ’s through wireless access points located near the actual retail stores. Gonzalez stole and subsequently sold off 300,000 to 400,000 credit card numbers that Scott helped him obtain from BJ’s. PSR ¶ 10. 5

Scott then hacked into Office Max’s system, captured debit card information, and gave this information to Gonzalez. PSR ¶ 12. Gonzalez sold some of these to co-conspirator Maksym Yastremskiy, and “cash[ed] out” others at ATMs through co-conspirator Jonathan Williams. PSR ¶ 13.

During the same period, Gonzalez was collaborating with Damon Patrick Toey (“Toey”) to “cash out” payment card numbers and selling “dumps” of them. (“Dumps” are stolen track 2 data, the data encoded on the magnetic strips on the backs of credit cards read by ATM machines and credit card readers.) 6 PSR ¶ 7 & n. 2.

B. Watt’s Role — TJX incursion

Beginning in the summer of 2005, Scott and Gonzalez hacked into TJX Companies, assisted by James. But their work was substantially improved when they used a wireless access point, together with a VPN (virtual private network), a program that allowed Gonzalez to access the TJX system without being in close physical proximity to a retail store. PSR ¶ 16.

Gonzalez used a “sniffer program” that allowed him to seek out the data he wanted, a program that Watt had adapted. PSR ¶¶ 16-16a. Sniffer programs are used both legally and illegally to monitor traffic in a computer network. They represent a class of applications that captures any type of data that travels across a communications network. PSR ¶ 16.

Instant message chat sessions between Watt and Gonzalez from February 24, 2005, until April 10, 2006, the year immediately preceding Watt’s role in supplying the sniffer program, are significant to understand Watt’s role and motivation. While it is difficult to evaluate whether these sessions reflect Watt’s bravado and his stunning immaturity or what one psychologist calls the “online disinhibition effect,” 7 they do make clear that he under *153 stood that he was remotely compromising software vulnerabilities on network systems, as well as utilizing stolen account credentials. And he plainly knew that Gonzalez was selling payment card numbers and making a substantial profit. At the same time, there is no persuasive evidence that Watt had access to the information being stolen, or participated in selling it. Indeed, as noted above, Watt received no money for his efforts. 8

Free access — add to your briefcase to read the full text and ask questions with AI

Related

United States v. Abbas
First Circuit, 2026
Sandra Calkins v. United States
795 F.3d 896 (Eighth Circuit, 2015)
United States v. James Fry
792 F.3d 884 (Eighth Circuit, 2015)

Cite This Page — Counsel Stack

Bluebook (online)
707 F. Supp. 2d 149, 2010 U.S. Dist. LEXIS 41070, 2010 WL 1676439, Counsel Stack Legal Research, https://law.counselstack.com/opinion/united-states-v-watt-mad-2010.