Former State Department Employee Pleads Guilty to ‘Sextortion’ Scheme The Oceanside


Ford tended to target young females, especially sorority members and aspiring models. “The Diplomatic Security Service is firmly committed to investigating and working with the Department of Justice, U.S. Attorney’s Office and our other law enforcement partners to investigate criminal allegations and bring those who commit these crimes to justice”. He told them if they didn’t comply, he would release their photos. Those that did not co-operate had images sent to friends and family. According to the indictment, Ford “engaged in a widespread, worldwide computer hacking, cyberstalking and “sextortion” campaign created to force victims to provide [him] with personal information as well as sexually explicit videos of others”. Ford tricked his victims into sending him their email passwords by pretending to be tech support from their email provider, claiming he was from the “account deletion team” and that their accounts were about to be closed. A spreadsheet of 262 email addresses was found on Ford’s computer at the London embassy; several were associated with schools such as Ball State University and the University of Michigan, Sedky said, adding that he spent hours phishing, hacking and cyberstalking women from work, despite warnings from the State Department that embassy computers were monitored.

Ford later described the victim’s home to her, stating “I like your red fire escape ladder, easy to climb”. “This leads me to believe that Ford may be targeting college-aged women throughout the United States”, the lead investigator wrote in the complaint. He will be sentenced on 16 February 2016. Ford was arrested at Hartsfield-Jackson International Airport in May. “With nothing more than a computer and a few keystrokes, modern predators like Michael Ford can victimize hundreds of people around the world”, Assistant Attorney General Leslie R. Caldwell said in a statement Thursday.



Leave a Reply