PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Extortion Website Operator Casey Meyering Pleads No Contest

Posted on May 9, 2015June 26, 2025 by Dissent

Attorney General Kamala D. Harris announced today that cyber exploitation website operator, Casey E. Meyering, has pled no contest to one count of extortion, three counts of attempted extortion, and one count of conspiracy. He is expected to be sentenced on June 8, 2015. Meyering operated WinByState.com, a cyber exploitation website on which intimate images of unsuspecting victims were posted without the victims’ consent.

Casey Meyering. Photo via Adam Steingbaugh.
Casey Meyering. Photo courtesy of Adam Steingbaugh.

Meyering, 28, of Tulsa, Oklahoma, entered his no contest plea today in Napa County Superior Court. Meyering’s no-contest plea is considered by the court the same as a plea of guilty and, following his plea today, the court found him guilty.

Meyering was arrested in Tulsa on February 13, 2014, and extradited to California following an investigation led by the California Department of Justice’s eCrime Unit. The investigation revealed that the website Meyering owned and administered, WinByState.com, solicited the anonymous, public posting of private photographs containing nude and explicit images of individuals without their permission.

Described as “a user supported website where you can trade your ex-girlfriend, your current girlfriend, or any other girl that you might know,” WinByState.com solicited uploaders to identify their “wins” by city and state, sometimes using the victim’s complete or partial name. In the California-specific user forum for this website, there were over 400 postings.

WinbyState.com also required victims to pay $250 via a Google Wallet account to remove posted photographs. The account was named TakeDownHammer, and it was registered to Meyering at a fictitious Beverley Hills storefront. Law enforcement agents purchased a “takedown” for one of the victims in Napa, and traced the funds to Meyering’s bank account in Tulsa. Surveillance footage from the bank identified him withdrawing money from the account.

The investigation started in February 2013 from a complaint by a Northern California victim to a Rohnert Park Department of Public Safety detective. The victim suspected that a college classmate had hacked the victim’s computer and retrieved nude images. Through search warrants, law enforcement discovered that the victim’s classmate had indeed hacked and stolen nude images of her. The Sonoma County District Attorney’s Office convicted the classmate for identity-theft related crimes, and he received an eight-month jail sentence.

In September 2013, the victim sought law enforcement’s help again because her images appeared on Meyering’s website, WinByState.com. After law enforcement efforts to have Meyering take down the images failed, it paid Meyering’s $250 fee to his Google Wallet account. Following search warrants, law enforcement traced the website and Google Wallet account to Meyering and were able to identify additional California victims.

Meyering’s guilty plea follows the conviction of Kevin Bollaert, the operator of a similar cyber exploitation website. A jury found Bollaert guilty of 6 counts of extortion and 21 counts of identity theft, and a superior court judge in San Diego County sentenced him to 18 years of incarceration. The Bollaert case was the first criminal prosecution of a cyber exploitation website operator in the country.

SOURCE: Attorney General Kamala Harris

In June, 2013, Adam Steinbaugh blogged about Meyering and the site, here.

No related posts.

Category: BreachesCourtOnline

Post navigation

← Privacy Group Backs Nick.com Users Against Google And Viacom
Debt collectors fight privacy advocates over limits for automated license plate readers →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

RSS Recent Posts on DataBreaches.net

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy