PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Extortion Website Operator Casey Meyering Pleads No Contest

Posted on May 9, 2015June 26, 2025 by Dissent

Attorney General Kamala D. Harris announced today that cyber exploitation website operator, Casey E. Meyering, has pled no contest to one count of extortion, three counts of attempted extortion, and one count of conspiracy. He is expected to be sentenced on June 8, 2015. Meyering operated WinByState.com, a cyber exploitation website on which intimate images of unsuspecting victims were posted without the victims’ consent.

Casey Meyering. Photo via Adam Steingbaugh.
Casey Meyering. Photo courtesy of Adam Steingbaugh.

Meyering, 28, of Tulsa, Oklahoma, entered his no contest plea today in Napa County Superior Court. Meyering’s no-contest plea is considered by the court the same as a plea of guilty and, following his plea today, the court found him guilty.

Meyering was arrested in Tulsa on February 13, 2014, and extradited to California following an investigation led by the California Department of Justice’s eCrime Unit. The investigation revealed that the website Meyering owned and administered, WinByState.com, solicited the anonymous, public posting of private photographs containing nude and explicit images of individuals without their permission.

Described as “a user supported website where you can trade your ex-girlfriend, your current girlfriend, or any other girl that you might know,” WinByState.com solicited uploaders to identify their “wins” by city and state, sometimes using the victim’s complete or partial name. In the California-specific user forum for this website, there were over 400 postings.

WinbyState.com also required victims to pay $250 via a Google Wallet account to remove posted photographs. The account was named TakeDownHammer, and it was registered to Meyering at a fictitious Beverley Hills storefront. Law enforcement agents purchased a “takedown” for one of the victims in Napa, and traced the funds to Meyering’s bank account in Tulsa. Surveillance footage from the bank identified him withdrawing money from the account.

The investigation started in February 2013 from a complaint by a Northern California victim to a Rohnert Park Department of Public Safety detective. The victim suspected that a college classmate had hacked the victim’s computer and retrieved nude images. Through search warrants, law enforcement discovered that the victim’s classmate had indeed hacked and stolen nude images of her. The Sonoma County District Attorney’s Office convicted the classmate for identity-theft related crimes, and he received an eight-month jail sentence.

In September 2013, the victim sought law enforcement’s help again because her images appeared on Meyering’s website, WinByState.com. After law enforcement efforts to have Meyering take down the images failed, it paid Meyering’s $250 fee to his Google Wallet account. Following search warrants, law enforcement traced the website and Google Wallet account to Meyering and were able to identify additional California victims.

Meyering’s guilty plea follows the conviction of Kevin Bollaert, the operator of a similar cyber exploitation website. A jury found Bollaert guilty of 6 counts of extortion and 21 counts of identity theft, and a superior court judge in San Diego County sentenced him to 18 years of incarceration. The Bollaert case was the first criminal prosecution of a cyber exploitation website operator in the country.

SOURCE: Attorney General Kamala Harris

In June, 2013, Adam Steinbaugh blogged about Meyering and the site, here.

No related posts.

Category: BreachesCourtOnline

Post navigation

← Privacy Group Backs Nick.com Users Against Google And Viacom
Debt collectors fight privacy advocates over limits for automated license plate readers →

Search

Contact Me

Email: info[at]pogowasright.org
Security Issue: security[at]pogowasright.org
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]pogowasright.org

Research Report of Note

A report by EPIC.org:

State Attorneys General & Privacy: Enforcement Trends, 2020-2024

Categories

Recent Posts

  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs
  • Always watching: How ICE’s plan to monitor social media 24/7 threatens privacy and civic participation
  • Who’s watching the watchers? This Mozilla fellow, and her Surveillance Watch map
  • EPIC Publishes New Whitepaper Detailing Privacy Risks of Government Data Mining Programs
  • Modern cars are spying on you. Here’s what you can do about it.
  • Attorney General James and Multistate Coalition Secure $5.1 Million from Education Software Company for Failing to Protect Students’ Data       
  • EU Parliament committee votes to advance controversial Europol data sharing proposal

RSS Recent Posts at DataBreaches.net

  • NHS providers reviewing stolen Synnovis data published by cyber criminals
  • Gates Down: Third Circuit Says Breaking Employer Computer Access Policies Is Not Hacking
  • Short-term renewal of cyber information sharing law appears in bill to end shutdown
  • Yanluowang ransomware IAB pleads guilty
  • Lawsuit Alleges Ex-Intel Employee Hid 18,000 Sensitive Documents Prior to Leaving the Company
©2025 PogoWasRight.org. All rights reserved.