Williams v. AT&T Mobility, LLC

CourtDistrict Court, E.D. North Carolina
DecidedMarch 25, 2020
Docket5:19-cv-00475
StatusUnknown

This text of Williams v. AT&T Mobility, LLC (Williams v. AT&T Mobility, LLC) is published on Counsel Stack Legal Research, covering District Court, E.D. North Carolina primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Williams v. AT&T Mobility, LLC, (E.D.N.C. 2020).

Opinion

IN THE UNITED STATES DISTRICT COURT FOR THE EASTERN DISTRICT OF NORTH CAROLINA WESTERN DIVISION No. 5:19-cv-475-BO JASON WILLIAMS, ) Plaintiff, ) V. ORDER AT&T MOBILITY, LLC, Defendant. )

This matter is before the Court on defendant’s motion to dismiss [DE 14]. For the reasons discussed below, the motion [DE 14] is DENIED. BACKGROUND Plaintiff brings this lawsuit against his former wireless carrier, AT&T Mobility, after the company effectuated seven unauthorized reassignments of his SIM card at the behest of hackers. A SIM (“subscriber identify modulc’) card is a small, removable chip that allows a cell phone to communicate with the wireless carrier and to know which subscriber is associated with that phone. The SIM card associated with a wireless phone can be changed, allowing customers to move their wireless number from one cell phone to another and to continue accessing the carrier network when they switch cell phones. The wireless carrier must effectuate the SIM card reassignment. A “SIM swap” refers to an unauthorized and illegitimate SIM card change. It is a hacking technique whereby the hacker induces the phone carrier to change the phone associated with the SIM card. rerouting the victim’s phone activity (e.g., phone calls, texts) to a third-party phone. The victim loses his or her phone connection while the hacker receives all of the text messages and phone calls intended for the victim. Once the hacker establishes control over the victim’s

phone number, he can utilize that number to access the victim’s other online accounts, which often utilize phone-based, two-factor authentication for access and password change requests. Plaintiff's complaint alleges that AT&T effectuated seven unauthorized reassignments of his SIM card between November 5, 2018 and February 8, 2019. These SIM swaps compromised much of his personal and financial data, exposed him and his family to threats to their physical safety. and put aspects of his business at risk. See Pl.°s Comp., DE 2. Plaintiff is a co-founder and partner of an asset management company that invests in blockchain technology and digital assets. /d. § 8. This included a large-scale bitcoin mining operation, which was discontinued in February 2019 in response to the SIM swaps. /d. ¥ 9. The first SIM swap occurred on November 5, 2018. /d. § 37. In the period between when AT&T etfectuated the unauthorized change and when plaintiff was able to reverse it, hackers (1) created a mirror image of his phone so that they could see every app: (2) accessed other online accounts, including his Coinbase and Slush Pool accounts;! (3) obtained his home address, his and his family members’ social security numbers, copies of their passports, TSA precheck information, and financial documents; and (4) threatened to sell his personal information on hacker exchange sites. /d. {§ 37-46. The hackers also stole $1,500 worth of bitcoin. Jd. § 42. After the attack, plaintiff contacted AT&T to discuss measures the company could take to prevent another SIM swap. /d. § 47. AT&T represented that it would add additional security protocols to plaintiff's account. Specifically. AT&T told plaintiff that it would only make SIM card changes in-person at a designated Raleigh AT&T location and that plaintiff would be required to authenticate his identity with two passports. /d. Plaintiff also put AT&T on notice that. given his involvement as a cryptocurrency trader, he faced a heightened risk of SIM swap

Coinbase is a cryptocurrency exchange. Slush Pool is a cryptocurrency mining platform.

attacks. Relying on AT&T's representations that it was adding these additional safety measures, plaintiff decided not to close his account with the company. /d. The fallout from the first SIM swap was not over, though, because after the attack, the hackers began sending threatening messages to plaintiff. /d. § 48. The messages specified his name. home address, and social security number. /d. The messages also threatened the physical safety of his family. Despite AT&T’s representations that it would not make any SIM card changes outside of the established protocols, the company effectuated a second SIM swap on November 30, 2018, less than a month later. /d. § 50. During the hack, plaintiff immediately went to the designated AT&T store with two passports to reverse the change. /d. § 52. At the store, he was told that an AT&T employee made the SIM card change at the behest of an impersonator who only provided a fake driver's license as proof of identity. /d. The next day, December 1, 2018, AT&T effected a third unauthorized SIM card change. Id © 53. Plaintiff went to the designated AT&T location the next day, disabled his SIM card, and bought a new iPhone for $700. Jd. § 57. Ile purchased the new phone because the AT&T employees represented that it would help mitigate the risk of additional attacks. /d. He was again assured that his account was subject to the agreed limitations for changing the SIM card. /d. What's more. he was informed that he was on a special list of customers designated as at a high risk for SIM swap attacks. /d. § 58. But that same evening, hours after being assured the company was well aware additional security was needed with respect to his account, AT&T made unauthorized changes to his SIM card a fourth time. /d. § 59. With control over his phone number, the hackers accessed his Twitter account and put out messages impersonating him, inducing plaintiff's friends and

associates to send them cryptocurrency. /d. § 61. Back at the AT&T store to undo the change, plaintiff asked the employees again to confirm that his account carried special instructions allowing only in-person changes at that location. /d. § 64. The employees confirmed the additional protocols. /d. On February 4, 2019, plaintiff was SIM swapped a fifth time. /d. § 66. While in control of his phone number, the hackers accessed his accounts on various cryptocurrency exchange platforms. /d. § 69. The hackers also accessed his Twitter account again and solicited the exchange of currency from his friends and associates. /d. 70. When he went to the AT&T store the next day, employees informed him the changes had been made to his account in response to an email request and an AT&T online representative changed his four-digit personal identification number (“PIN”). /d. § 71. A sixth unauthorized change to his account was made less than 24 hours later. /d. § 72. During this swap, hackers deleted his Slush Pool account, rendering aspects of his business useless. /d. § 73. Back at the AT&T store again, two employees helped him get a new SIM card. Id. © 74. They also told him that his four-digit PIN had been changed online. /d. An AT&T employee made this change to plaintiff's SIM card in response to an over-the-phone request. /d. 4 75. Because of this hack and the continued risk that the currency generated through his bitcoin mining operations would be stolen, plaintiff discontinued bitcoin mining. /d. { 76. This meant shutting down the activity of 500 computer servers for which he had invested $1.4 million. /d. 76-77. A seventh unauthorized SIM card change was made a few days later. /d. 4 78. The hackers transferred $6,500 from his bank account to his Coinbase account, which plaintiff is no

longer able to access. /d. § 79. Plaintiff went to the designated AT&T store to stop the hack and to notify the company that he was switching carriers. /d. § 80. The AT&T emplovees told him he was ineligible to take his new phone with him to the new carrier. /d. Consequently, plaintiff was forced to purchase a new phone from his new carrier. /d. § 81. In response to the seven unauthorized changes and the damage they caused in his life, plaintiff filed this action against AT&T in October 2019. He brings six claims: (1) violation of the Federal Communications Act, 47 U.S.C.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Memphis Community School District v. Stachura
477 U.S. 299 (Supreme Court, 1986)
Price v. City of Charlotte, North Carolina
93 F.3d 1241 (Fourth Circuit, 1996)
Bianca Ellis v. Louisiana-Pacific Corporation
699 F.3d 778 (Fourth Circuit, 2012)
Doe v. Virginia Department of State Police
713 F.3d 745 (Fourth Circuit, 2013)
Sloane v. Equifax Information Services, LLC
510 F.3d 495 (Fourth Circuit, 2007)
Philips v. Pitt County Memorial Hospital
572 F.3d 176 (Fourth Circuit, 2009)
Francis v. Giacomelli
588 F.3d 186 (Fourth Circuit, 2009)
In Re the Appeal of Martin
209 S.E.2d 766 (Supreme Court of North Carolina, 1974)
Trustees of Rowan Technical College v. J. Hyatt Hammond Associates Inc.
328 S.E.2d 274 (Supreme Court of North Carolina, 1985)
Foster v. Winston-Salem Joint Venture
281 S.E.2d 36 (Supreme Court of North Carolina, 1981)
Hairston v. Alexander Tank & Equipment Co.
311 S.E.2d 559 (Supreme Court of North Carolina, 1984)
Everhart v. O'CHARLEY'S INC.
683 S.E.2d 728 (Court of Appeals of North Carolina, 2009)
Williams v. Carolina Power & Light Co.
250 S.E.2d 255 (Supreme Court of North Carolina, 1979)
Spokeo, Inc. v. Robins
578 U.S. 330 (Supreme Court, 2016)
Conboy v. AT & T Corp.
241 F.3d 242 (Second Circuit, 2001)

Cite This Page — Counsel Stack

Bluebook (online)
Williams v. AT&T Mobility, LLC, Counsel Stack Legal Research, https://law.counselstack.com/opinion/williams-v-att-mobility-llc-nced-2020.