ShareThis Page
Federal judge in Pittsburgh cuts Kentucky computer hacker a break |

Federal judge in Pittsburgh cuts Kentucky computer hacker a break

Andrew Russell | Tribune-Review
Ryan Neil Green, 32, of the Paducah, Ky., area, exits the federal courthouse in Pittsburgh Tuesday after being sentenced to probation for his role in as one of the Darkode hacker defendants..
Andrew Russell | Tribune-Review
Darkode hacker defendant Ryan Neil Green, 32, of the Paducah, Ky., area exits the federal courthouse in Pittsburgh on Tuesday with his defense attorney, Emily Roark.

The dark side of the Internet provided Ryan Neil Green with a satisfaction that was missing in his life.

Green was a licensed plumber who was more interested in computers than pipes. Using his computer skills, authorities say he conspired with others to help infect at least 77,000 computers, turning them into a botnet that was sold to someone else who used the hijacked computers to send out spam emails.

“I loved how everyone on the Internet looked up to me because of all the things I could do,” he said in a letter to U.S. District Judge Arthur Schwab in federal court in Pittsburgh. “Everyone wanted to be my friend, and it was intoxicating.”

That changed with the birth of his daughter, Green told the judge Tuesday in court.

“I wanted to build a future that she could be proud of,” said Green, who pleaded guilty in January to hacking computers and making them send out spam messages.

Schwab sentenced Green, 32, of the Paducah, Ky., area to two years of probation and 50 hours of community service.

A prison sentence would have kept Green from providing for his daughter and would have interrupted the service Green provides through his business, Rygre Digital Marketing, the judge said.

Green and his attorney, Emily Roark, declined comment after the hearing.

Green was one of about 70 people charged worldwide in a July 2015 takedown of Darkode, an online forum where criminals met to buy and sell credit card and other personal information, to trade viruses and malware, and sometimes to sell narcotics.

Assistant U.S. Attorney James Kitchen and two FBI agents based in Pittsburgh led the international investigation, which started with an unnamed industry partner asking the FBI for help, agents said when the investigation became public.

About a year later, in January 2015, Kitchen and the FBI agents traveled to the Hague in the Netherlands to meet with prosecutors and police officers from 20 countries.

They had two more meetings at the Europol offices to coordinate their efforts over the next six months. Then, in July 2015, they started making arrests and disabling Darkode.

The suspects ranged from career criminals to college students trying to raise tuition money and computer experts moonlighting.

Green had joined Darkode in 2006. During the next six years, he conspired with others to infect computers and create the botnet they sold, Kitchen said.

“This went on for a while until I realized that I did not want to live that life anymore and the potential I had to use my talents to build a legal, profitable business,” Green said in his letter to the judge.

By the time FBI agents showed up at his home, Green had withdrawn from Darkode and was building that business, Roark said.

“He’s a good father. He’s become a good businessman. He’s a good member of our community,” said Roark, whose law office is in Paducah.

Green volunteers his time to help other small businesses.

While pointing out the severity of Green’s crime, Kitchen confirmed Green has apparently turned his life around.

“I have no reason to quarrel with anything Mr. Green or his attorney has said,” he told the judge. Green immediately cooperated with investigators, he said.

Anecdotally, there are plenty of examples of people who commit cybercrimes in their youth who go on to become law-abiding citizens and even computer security experts, said Brian Nussbaum, a former security intelligence analyst who teaches computer security at State University of New York at Albany.

“It has historically not been unusual for youthful indiscretions at the keyboard to lay the technical and intellectual foundations for careers in information technology and information security,” Nussbaum said.

How often that occurs, however, is an open question, he said.

While many criminal justice researchers focus on criminal behavior and how it changes over a person’s lifetime, “there has been very little research applying this approach to cyber criminals,” Nussbaum said. “This is at least, in part, because the field of studying cyber criminality is much less mature than the broader field of studying criminality.”

Brian Bowling is a Tribune-Review staff writer. Reach him at 412-325-4301 or [email protected].

TribLIVE commenting policy

You are solely responsible for your comments and by using you agree to our Terms of Service.

We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.

While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.

We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers

We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.

We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.

We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.

We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.