Best Answer

Noted computer hacker, Justin Tanner Petersen, a.k.a. Agent Steal, a.k.a. Eric Edwin Heinz. Convicted of computer hacking, wire-tapping and other related charges in 1994. Justin worked as an undercover FBI informant 1991 to 1993.

Justin Petersen is best known as the hacker the FBI paid to track down infamous hackers Kevin Mitnick and Kevin Poulsen. Petersen was chosen to work for the FBI due to his work for a P.I. firm operated by Ted Gunderson. Gunderson was formerly the Los Angeles FBI Special Agent in Charge. Faced with a 15-year sentence for unauthorized possession of classified material, Petersen opted to rat his friends out in exchange for a paycheck and a lesser sentence. Petersen was supposedly chosen to work for the FBI due to his affiliation with Gunderson's P.I. firm, "Michaels International". Justin was allegedly performing illegal wiretaps for Michaels International in addition to providing access to DMV, TRW, and other private/government databases.

In 1984 after a brief Secret Service investigation, Justin avoided questioning and went underground. He changed his named to Eric Heinz and moved from Northern Virginia to Hollywood. Petersen continued hacking and was a fugitive for over 7 years. During that period Justin worked as a sound engineer for several Hollywood based rock bands. He was captured in Dallas in 1991 when he came to the attention of the FBI due to his association with Kevin Poulsen.

In 1989 Petersen and Poulsen had hacked in to a Pacific Bell test system and gained access to radio station contest call in lines. Through this system they were able to control the dial in lines and assure that they were the winning callers to the contests. A trio of Petersen's' associates, who included Kevin Poulsen and Lewis DePayne, won two Porsches, and over $50,000 in cash prizes.

After working for the FBI Petersen began hacking again. In 1994 he tapped in to the commercial lending company Heller Financial. He gained Heller's' computer access codes it used to initial wire transfers. Petersen initiated a transfer for $150, 000. Heller noticed the unauthorized transfer just minutes before an associate of Petersen was due to collect it. The transferred was stopped. Petersen was captured a year later and convicted of placing a data-tap on Heller's computer lines and transferring the funds. Justin was the first hacker to be convicted of gaining access to a financial institution's network and initiating a transfer.

Petersen crimes have been published in "The Fugitive Game", "The Watchman", "Cyberthief and the Samurai", and "Takedown." Numerous articles about Petersen's' exploits have made newspaper headlines from 1991 to 1995.

Actor Jeremy Sisto in the screenplay "Takedown" portrayed Petersen in a straight to video movie.

In 1985 Petersen had his left foot amputated as the result of a hit and run motorcycle accident while he was driving drunk on Sunset Blvd.

In 1995 Justin appealed his 41-month prison sentence. The 9th Circuit Court of Appeals heard his case in 1996 and was published in The Federal Reporter here;

Finally released from Federal prison in 1996 Petersen continued to work in the IT field specializing in the music industry. An article about his music career appeared in Music Connection magazine in 2003:

CNN/Time Magazine interviewed Petersen shortly after his release for the TV series "CNN Presents". The interview aired in 1998 and again in 2000. It can be viewed on MySpaceTV: Petersen was found dead in his apartment on March 12, 2010. Awaiting autopsy results, official cause of death is unknown.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: Who is computer hacker Agent Steal?
Write your answer...
Still have questions?
magnify glass
Continue Learning about General History

Why tracert is used?

Tacert is used on the internet to verify a person's computer identity.It also verifies the person contacted is the actual contact instead of a hacker. By: Robert Hocker

When and where was baseball player Rich Hacker born?

Rich Hacker was born October 6, 1947, in Belleville, IL, USA.

Who is the most powerful hacker in the world?


What are baseball player Warren Hacker's physical stats?

Warren Hacker is 6 feet 1 inches tall. He weighs 185 pounds. He bats right and throws right.

What items do grave robbers typicaly steal?

They steal someone's wallet or something small like a radio or a TV.

Related questions

Why is the difference in a virus and a hacker?

well yes and no. hackers will be the ones who make the virus. depending on what virus it is. if it is a Trojan it is most likely done by a hacker because the virus itself steals information and gives control to your computer.

What the definition of hacker?

"Hacker" refers to a person who enjoys learning the details of computer system, how they work and stretch their capabilities. Hacker == Computer Enthusiast.Nowadays term hacker it is thought to be the same as the term cracker, which is wrong. "Cracker" refers to a person who attempts to break into a network computer system or software.There are about as many different definitions for the term "hacker" as there are hackers. Here are some opinions:A hacker is a programmer who breaks into a computer system to either steal information or delete it.A hacker is someone who breaks into computers.A hacker is a member of the computer programmer subculture.

What do a Trojan horse does?

false error slow computer delete files a hacker watch your computer to steal facebook Account and bank account

Is a hacker dangerous?

Yes. A hacker can steal from you, stuff like your money (out of your bank account), your identity (for your social welfare), your peace of mind, and more! Also, a hacker can steal secrets and endanger national security, or a company's plans and designs.

Someone who tries to access a computer or network illegally?

That sounds like a hacker--someone who breaks into a computer system without permission.

What does the name hacker mean?

A hacker is one that exploits a computer system in order to learn more about computer systems. Compare to cracker, which is interested only in making money by making software free illegally and/or "cracking" software, and phreakers, whom are interested in exploiting phone technology to their own ends. A true hacker will penetrate a firewall or database, but never steal a single datum of data.

How do you create a hacker in doodle god?

Computer + virus will give you hacker.

What does flaming mean on the computer?

it mean there is a hacker in your computer

What is the term hacker means?

The term "hacker" means someone who illegally breaks into computer systems and uses their private information for illegal purposes i.e can steal bank details, identity, can hack into large companies private info and sell it to other companies etc

How a computer hacker might do harm than office burglar?

While a burglar can steal your physical property, a hacker can steal your personal information such as credit card details. If a burglar can steal what money is in your house, a hacker can drain your entire bank account without leaving any traces.

What is the girl hacker called?

Hacker. It is similar to being a computer programmer and is not gender specific.

What is a computer that is controlled by a hacker or other computer criminal?