Crime ❯ Cybercrime ❯ Hacking ❯ Extortion
His plea exposes how he leveraged military access to siphon telecom credentials for ransom