**AT&T employees allowed the hackers to steal Mr. William's money and his family’s personal and private information and threaten his family, and access his personal and digital finance accounts, steal his cryptocurrency, and destroy his business, all resulting in the loss of Mr. Williams’ $2 million investment. After Mr. Williams’ personal information was compromised, he also had to halt his lucrative cryptocurrency mining operations, in order to stop the hackers from stealing more. **
10/25/19 Update Plaintiff filed the corrected complaint.
Status Update as of 10/24/19 Plaintiff filed the original complaint.
Under N.C.G.S. § 1-539.2A, any person whose property or person is injured by reason of a violation of G.S. 14-458 may sue for and recover any damages sustained and the costs of the suit.
In 1986, the Computer Fraud and Abuse Act (CFAA), 18 U.S.C. § 1030, was introduced to combat hacking, as an update to the first federal computer fraud statute. It has been updated many times over the years, most notably in 2008, to encompass a broad range of actions well beyond its original purpose. The CFAA forbids the intentional access to a device without permission or in excess of permission, but does not specify what "without authorisation" entails. It has been a weapon perfect for violence to usage against virtually any aspect of electronic operation with harsh punishment schemes and malleable clauses.
North Carolina enacted the Unfair and Deceptive Trade Practices Act (“UDTPA”), N.C. Gen. Stat § 75-1.1, to benefit consumers, but “its protections extend to businesses in appropriate situations.” Creating a private cause of action for consumers was the Act’s primary purpose. Also, the statute was enacted “to provide a civil means to maintain ethical standards of dealings between persons engaged in business and the consuming public” within North Carolina because “other legal remedies were inadequate or ineffective.” It applies to dealings between buyers and sellers at all levels of commerce.
Negligent supervision is a cause of action in United States tort law which arises where one party ("the entrustor") is held liable for negligence because they negligently provided another party ("the entrustee") with a dangerous instrumentality, and the entrusted party caused injury to a third party with that instrumentality. The cause of action most frequently arises where one person allows another to drive their automobile.
Negligence is defined as a failure to behave with the level of care that someone of ordinary prudence would have exercised under the same circumstances. The behavior usually consists of actions, but can also consist of omissions when there is some duty to act (e.g., a duty to help victims of one's previous conduct).
Mr. Shapiro claims AT&T employees took bribes from hackers and gave them control of his mobile account 4 times over the course of one year. Mr. Shapiro also claims that the hackers then used their control over his mobile account to take control of his personal and digital finance accounts and steal more than $1.9 million from him.
Mr. Terpin claims that AT&T allowed an illegal sim swap to occur after an imposter posing as Mr. Terpin obtained Mr. Terpin’s telephone number from an insider cooperating with the hacker without the AT&T store employee requiring him to present valid identification or to give Mr. Terpin’s required password.
Mr. James Chen claims that AT&T employees gave unauthorized access to hackers in a sim swap which allowed the hackers to steal $764,168.00 from his bank accounts. The hackers then created a new cryptocurrency account, purchased cryptocurrency using the stolen money for themselves.
Ms. McCants claims that AT&T agents were paid to override security measures on her mobile account and allowed an unauthorized user to access her confidential account information. The information accessed then lead to Ms. McCants attack.
The People of the State of California alleges that Nicholas Truglia knowingly accessed data, a computer, computer system, and computer network in order to commit fraud and steal identity and cash from multiple victims.
Donations to StopSIMCrime are used to raise awareness by supporting this website, travel to present at events, help victims recover their money, and stop carriers from giving our service to criminals.
A portion of your donation may be used to provide funding for lawsuits against the carriers and criminals. Because the carriers’ Terms of Service do not allow for legal class actions, each victim must take action individually, which may benefit victim individual. For that reason, we are not able to get tax-exempt status. To be clear, your donation is not tax deductible. However, our intention is that our collective efforts through your support will compel the carriers to fix the problem.