Valassis Communications Supports Cyber Bullying?
Supports Cyber Bullying
COULD THE LARGEST CYBER BULLY SCOT TERBAN AND HACKER BE EMPLOYED IN CORPORATE AMERICA?
“It has been a long journey,” Gregory Evans the Founder of LIGATT Security International.“Over 25 private investigators, in 5 countries on 3 continents. Two federal and one state lawsuit. Twenty five subpoenas on every social media company worth over $100 millions. Ten more subpoenas from internet service providers. At least 70 hours on conference calls with corporations and universities around the world like Saltbush Assurance, DigiSafe Pty Ltd, Ionize Pty Ltd, SecureLink, Raiffeisen Informatik, McAfee, Frontline Security Solutions, Computershare, Symantec, Nessus, Alternative Technologies Inc., NYU, Georgia Tech, The University of Connecticut and the list goes on and on,” says Evans as he catches his breath. Then a silence and he starts again “We have contacted several government agencies, including the United States Army and Navy. We spoke to the FBI department that investigates contractors who are trying to get security clearances. Yes, I said security clearances. Some of these bully’s work for government agencies or contract with them,” say Evans. He continues with “the only way to fight these guys is to expose them to their employers and the other people they do business with,” say Evans as he sits back in his chair overlooking the Pacific Ocean in Marina Del Rey, California.
A large portion of society is under the impression that cyber bullying is only done by pre-adolescent kids & teens with extra time on their hands; Matter-of-fact it may start there, but it does not always end there. In the last 5 years since cyber bullying became a popular subject, most studies have been done using statistics derived from doctors, law enforcement & educational institutions, based on kids under 19 years of age. We here at National Cyber Security (NCS) have decided to not only show that these studies are incomplete, but prove that age has nothing to do with being a bully.
To do this, National Cyber Security has hired me to become the point man on a new series called “Cyber Bullies and Hackers Exposed.” In this new series, we will reveal the names of these cyber bullies and the companies they are employed with. Domestic and foreign companies will be profiled. Some of the people we will uncover have top security clearances within the government and/or are working as security professionals. We have contacted the agencies that issues government clearances with our findings. Additionally, we have contacted each company for a statement to inform them that they may have rouge employees working for them. In the first five articles of this series, some of the information released will be scary to many of our readers and they may feel as if they were watching the movie The Exorcist for the very first time.
If there is a bully there is victim, even though Gregory Evans does not like to be called a victim, that is exactly what he has become. Before taking on this cyber task, I went straight to Google to find out what people had to say about Gregory Evans, and LIGATT Security. All I could find was personal opinions and no facts. Even the CBS Expose featuring Mr. Evans contained no facts. Just a lot of questions, which surprised him because in most news investigation segments there are screaming victims, customers, and vendors that did not get paid, or innocent victims who were conned into buying snake oil, that was being sold as a cure for cancer. Evan and family and watched the video in awe shaking their heads wondering, what, when and why!
I then went to Evans website http://www.GregoryDEvans.com and read every detail, and printed all of his credentials. I observed some of the newspaper articles referencing Evans company, product, and background went as far back as 1991. That was before most of the bloggers, who are as my kids would say, “hating” on Gregory Evans. I will go on record to say, I spoke to his father, mother, elementary, middle school and high school friends and they all had the same thing to say about their hero and favorite son, he was hacking before anyone knew what hacking was in 1983. I am not going to go into details about his background, but feel free to visit his biography website.
Imagine a cyber bully employed by a major company as their IT manager or worse, their computer security analyst. This person has access to all the information within that company, including customers’ personal information as well as the company’s thousands of employees’ electronic records. They could use the company’s network to register domain names, hack into computers, spam the company’s employees or post hate messages on blogs, all right under the nose of the CEO.
We will meet that person, Scot Terban of Valassis Communications. In 2009, there was a “cyber hit” put out on Gregory Evans and his company LIGATT Security International. This “hit” was called “Operation Nigger Matrix.” This 18 page report, that uses the word “nigger” over 30 times, describes how to ruin Gregory Evans and his company’s reputation. What makes this even more alarming is that Scot Terban is a very recognized contributor in the computer security industry.
For almost two years using the Valassis network, their computers and other company resources, Terban set up bullying websites, encouraged racial divide in the security industry and on February 2, 2011 hacked into LIGATT Security’s network and posted business and personal emails along with the company’s employees personal information including social security numbers. All of which is outlined in “Operation Nigger Matrix.” Valassis Communications’ legal council, David Henessey, was informed about Scot Terban’s actions and even after 5 phone calls and 3 emails we still could not get a comment. We held on for an entire month’s since we contacted David Hennessey to see if there would be any actions taken against the rouge employee and at the time of this story he is still working in computer security for the company.
In fact Valassis Communications, which is a publicly traded company — trading under the symbol VCI, has stood by Scot Terban’s actions. What most people, including Valasis (until they were recently notified) don’t know is that Scot Terban has been under FBI investigation for hacking into LIGATT Security’s network. He was part of a state lawsuit under the alias Crabby Ol Bastard and now he is part of the Federal Lawsuit being filed in the LIGATT hacking case.
Below you will find screen shots, copy’s of lawsuits, company subpoenas, emails, and third party evidence that during business hours, working at Valasis Communications, Scot Terban, used the company’s computer network and resources to harass, stalk and hack into the networks of LIGATT Security International.
This is the original page of “Operation: Niggermatrix” which was published around October 2009. Although the picture is not of Gregory Evans.
When reading the article below I felt that who ever was the originator of this “Matrix” had some type of hate towards Gregory Evans and his company. I am not African American, but I am still offended about how loosely he uses the “N” word.
I checked the investor message blogs during the same time period, where they were discussing manipulating the stock market to see what was being said about Evans and LIGATT, and there was a lot of what people in the stock world called bashing. Again who ever is the author of this mission took a lot of time and was very detailed.
The sentence below “trash his company and reputation in every and all ways possible,” is what Scot Terban and his friends have pledged to do for the last three years.
When I came across this next chapter called “Raid Planning”, you would have thought that a Navy Cyber Seal Team 6 was coming for Evans and his team. I want all the readers to take note the section “Leave racist, homophobic comments on his blog.” They could have stopped at his blog, but racist comments can still be found on CNN, Fox News, Youtube and more.
When I was combing through all the Youtube.com videos for Gregory Evans, I came across a rap video made by Chris John Riley, who is a friend of Scot Terban and also appeared in the CBS interview about Gregory Evans. It was a remix of the great rapper Eminem. I thought is was funny until I read the section below, that talks about “Create remixes, youtube poopz….”
Remember what the author said about about leaving racist comments on youtube video blogs? Well look at some of the video comments below.
August 27, 2010 after almost a year into the “Operation” Gregory Evans and his companies LIGATT Security International Inc and SPOOFEM.COM USA, Inc filed a lawsuit on 24 John Doe’s. Why, John Doe’s? I ask Gregory Evans and he said “We did not know any of these individuals”. They were affecting stock prices and our shareholders could not tell what was real and what was not real. Later we find out that John Doe #20 was Scot Terban.
In his own words below, Scot Terban brags about being John Doe #20. In-addition he admits that he is working with the other John Doe’s which show signs of a conspiracy.
Below you will see the arrogance Scot Terban displays, as if “I am untouchable.” This alone proves to any judge in the up and coming Federal Lawsuit that Scot has been cyber bullying and cyber stalking.
I was truly wondering when did Scot Terban have time to post each of these articles while working at Valassis Communications.
There is a website that hackers love, called Pastebin. Pastebin allows anyone to post anything on the site without asking for any information. This is the site that all the hackers use to post all the spoils of their crimes. They think that since they are not providing their information that they are anonymous and that is untrue. As you can see below, this is where Scot Terban posted employees of LIGATT Security International personal information, including social security numbers in Pastebin, while working at Valassis.
Scot Terban proceeded to encourage people to file fake lawsuits in Gwinnett County Courts so he could then post the lawsuit on the internet. I have found 3 lawsuits that were filed, and then dropped. Evans was never served but the law suit ended up at a website that all the cyber bullies and cyber stalkers use to post about Gregory Evans and his companies called attrition.
On January 25, 2011, eight days before LIGATT Security International was hacked, a website called LIGATTLeaks.org appeared. An email then was sent out to all the employees of LIGATT Security International from Scot Terban. He was looking for information to post on the site about Gregory Evans and his companies.
February 2, 2012 will always be known as D-Day in the cyber security industry. The day the “No 1 Hacker” was attack. I do find it a big coincidence that 8 days before a website called LIGTTLeaks.org was started and now LIGATT gets hacked and over 80,000 emails are exposed and the first place they are posted is on LIGATTLeaks.org. In fact why would someone start a website called LIGATTLeaks without having any information to post? I was puzzled for hours thinking about this, then it hit me “like a ton of brinks,” as the old adage goes. They had already hacked into the company before setting up LIGATTLeaks.org. They just waited until February 2, 2012 because that was Gregory Evans birthday. This is like a Hollywood movie.
There was a ligattleaks website setup and minutes after the hack information was being posted on twitter and ligattleaks.org. All off this took place between 12:30pm and 1:130pm. It was confirmed that Scot Terban was at work at Valassis.
Around 2pm on February 2, 2012 Gregory Evans was on the phone with his attorneys, the FBI and several well known international hacking groups. After a short investigation LIGATT was able to narrow it down to 8 John Does. One of those John Does is know other than Scot Terban. Below you will see where Scot Terban admits he registered the domain name Ligattleaks.org, but denies the hacking, sending emails or even posting anything on any site. But we will prove that he is lying further into the story.
Below you will see the subpoena that went out GoDaddy.com and 1&1 Domains to find out who registered the domain names. Although there are more subpoenas and different company’s such as Twitter, Hushmail.com and Pastebin.
The following documentation that was given to the attorneys for LIGATT Security and Gregory Evans is the most important evidence proving that Scot Terban used Valassis Communications network to pull of his part of the operation. Below you will see the IP Address 126.96.36.199 which is registered to Valassis.
If you remember Interrogatory No. 7 that Scot Terban signed under oath to a Federal Court that the only “domain names,” he owned or operated was http://krypt3ia.com, ligattleaks.com, ligattleaks.net and ligattleaks.org. The truth is he did not know the subpoenas had already gone. The truth is, Scot Terban registered 6 other domain names which were variation of the domain names Gregory Evans and LIGATT Security owned.
Below is a website that shows who the IP Address 188.8.131.52 is registered to. Yes Valassis Communications.
To all the hackers and cyber thieves out there thinking that you are anonymous….. You really are not. Each one of those links were to personal information that was posted in Pastebin.com. There was over 300 links and Pastebin.com turned over all the IP Address for each one. Note the IP address third from the bottom. Look familiar? It is the same one that registered to Valassis Communications. Again, additional evidence, that Scot Terban cyber terror crusade continued while working at Valassis. What makes this worse is that the link is for almost 60 employees who worked for LIGATT Security International. Having a problem with Gregory Evans is one thing, but to put the employees personal information for all the identity thieves to have it is another.
As my my son would put in a text message, “LOL and SMH,” when I was given this letter that Scot Terban’s attorney sent to Gregory Evans when he contacted Valassis corporate attorney Mr. Hennessy about this article and Scot Terban’s actions. “All of sudden he is worried. All of sudden he is trying to hide behind the law. For almost three years he bullied, stalked and hacked into our network and now he wants to act like he is a victim,” says Evans.
I have found that Scot Terban is 1 of 2 ring leaders when people want to go after Gregory Evans and may not have the courage themselves, they call on Scot Terban. On March 24, 2012 a internet security blog, went to a website owned by Gregory Evans company called AmIHackerProof.com and performed a website security scan on their site infosecisland.com. Not only did they perform the scan they also purchase the report for $24.95. After they purchased and saw what AmIHackerProof.com reported they sent the following email.
The following is the reply Gregory Evans sent back to Michal Menefee.
Three days after the exchange of emails between Gregory Evans and Michal Menefee, Scot Terban posted the story on infosecisland.com. Proving that Scot Terbans, mission in life is not to save the world, but to terrorize Gregory Evans and his companies anyway he can.
Coming To NationalCyberSecurity.com
- Part 2 – “The Largest Cyber Bully and Hacker Employed In Corporate America and the Government.” Who else was involved and the companies they work for.
- “What hacker is working as a snitch for the FBI” – July 19, 2012