• Skip to main content
  • Skip to primary sidebar
  • Skip to footer
  • Home
  • About Darknet
  • Hacking Tools
  • Popular Posts
  • Darknet Archives
  • Contact Darknet
    • Advertise
    • Submit a Tool
Darknet – Hacking Tools, Hacker News & Cyber Security

Darknet - Hacking Tools, Hacker News & Cyber Security

Darknet is your best source for the latest hacking tools, hacker news, cyber security best practices, ethical hacking & pen-testing.

HOPE Speak Steven Rombom (Rambam) Charged

July 26, 2006

Views: 12,693

[ad]

It turns out yesterday one of the planned speakers at HOPE Number 6 was arrested on Saturday and is being charged by the FBI.

Security Fix obtained a copy of the complaint against “Steven Rambam” the private investigator arrested Saturday at the Hope Number Six hacker conference in New York City. The government document says Rambam is an alias, and that his real name is Steven Rombom, so that is how he’ll be referred to here henceforth.

The complaint, available here as a PDF, charges Rombom with obstruction of justice and with witness tampering, alleging that in April 2006 Rombom impersonated a federal investigator at the request of a client who had hired him to locate a government informant who was central to the client’s money-laundering indictment in 2003.

Seems like it’s not unjust though, he is getting what he deserves. He was taking things a little bit too far.

The government claims that in April Rombom located and visited the California home of the informant’s in-laws, and introduced himself as an FBI agent, flashing what the informant’s mother-in-law described as “a laminated card with an official government gold seal or badge.”

The complaint says “ROMBOM told [the mother-in-law] that he was investigating the [informant], and that her son-in-law was a very bad and dangerous person, and that there were many things about the [informant] that the in-laws probably didn’t know,” such as that the informant had been in jail many times. Rombom also told the mother-in-law that her daughter was in danger because of the informant and that he was afraid for the safety of their daughter, the government says.

1 less speaker for HOPE next time then I guess?

Source: Security Fix

Related Posts:

  • Why Are Hackers Winning The Security Game?
  • Deepfake-as-a-Service 2025 - How Voice Cloning and…
  • An Introduction To Web Application Security Systems
  • nbtscan Download - NetBIOS Scanner For Windows & Linux
  • UK Schedule 7 - Man Charged For Not Sharing Password
  • US Government Cyber Security Still Inadequate
Share
Tweet
Share
Buffer
WhatsApp
Email

Filed Under: Legal Issues Tagged With: FBI, law, legal



Reader Interactions

Comments

  1. Fraud Hunter says

    July 28, 2006 at 12:08 pm

    Steve Rombom has a terroism felony conviction, and spent 8 year in a mental institution. Much of his credentials are bogus, and his work exposing Nazi war criminals has previosly been proven to be a hoax. Big deep enough int ohis background and you will see he has a histry of fraud, of being a snitch, and of being illegally protected by the feds.

    Rombom is not jewish, and is actually born into a Italian Catholic family. He was give up for adopting shortly after birth, and was given to a jewish family with the last name of ROMBOM. When he was 6 years old the state put him in a mental hospital, where he spent 8 years. Afterwords, be joind a terrist group in NYC and waas involved in several bombing before be caught, chrged, ad convivted. He spent 40 months in Federal prison in Tallahasse, FL for the felony convictions.

    When he got out of prison the chnaged his name to hide his past, and became a government snitch and con artist.
    Dig below the surafe and you WILL find the truth.

    Snitch, Snitch, Snitch.

  2. Darknet says

    July 28, 2006 at 12:56 pm

    Indeed, interesting reading out there.

    Especially this.

  3. irv rubin says

    August 4, 2006 at 10:48 pm

    hey steve rombom, you are nothing and you will always be a zero in my book…..
    you are so repulsive that your picture made my daughter puke…
    so i hope you go to a federal slammer and become a maytag for some hardcore prisoner…..you had better order lots of ky jelly in your commissary

  4. hank the skank says

    August 4, 2006 at 11:11 pm

    HEY RUBBLEBUM,

    I HOPE TO HEAR THAT YOUR ANAL CHEER HAS BEEN PENETRATED WHILE YOU ARE IN THE FEDERAL SLAMMER…..
    YOU ARE NOT JEWISH AT ALL!!! YOU ARE A REJECT THAT WAS DUMPED BY YOUR ITALIAN MAMA!!! SHE DIDNT WANT YOU AT ALL!!! SHE PUKED AFTER SHE GAVE BIRTH TO YOU!!!SHE WISHED SHE COULD SEND YOU BACK!!!
    THAT CAUSED HER TO VOLUNTARILY DUMP YOU!!! YOU WORTHLESS PIECE OF GARBAGE

  5. AJ says

    August 5, 2006 at 5:45 pm

    The latest documents on Rambam can be found at http://jdo.org/rambam

  6. bill diaperman says

    August 5, 2006 at 9:48 pm

    HEY SCUMBUM,

    YOUR MAMA SHOULD HAVE ABORTED YOU WHEN SHE DISCOVERED THAT SHE WAS ABOUT TO BRING AN UGLY, DISGUSTING RAt-faced asshole into the world..
    YOU MUST REALIZE YOU ARE NOTHING BUT A RECTAL DWELLER!!!
    YOU ARE A DISGUSTING WORM PLUCKED OUT OF YOUR MAMA’S COLON..NO WONDER YOU ARE SHIT!!!
    NO AMOUNT OF HYGENIC CLEANSING WILL REDEEM YOU!!!
    YOU ARE SLIME THRU AND THRU!!! YOU ARE A RAT FOR THE STATE!!1
    NOW THE STATE TURNED ON YOU!!! HA HAH HA!!!

Primary Sidebar

Search Darknet

  • Email
  • Facebook
  • LinkedIn
  • RSS
  • Twitter

Advertise on Darknet

Latest Posts

Systemic Ransomware Events in 2025 - How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

Views: 693

Jaguar Land Rover’s prolonged cyber outage in 2025 turned what would once have been a “single … ...More about Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like

SmbCrawler - SMB Share Discovery and Secret-Hunting

SmbCrawler – SMB Share Discovery and Secret-Hunting

Views: 721

SmbCrawler is a credentialed SMB spider that takes domain credentials and a list of hosts, then … ...More about SmbCrawler – SMB Share Discovery and Secret-Hunting

Heisenberg Dependency Health Check - GitHub Action for Supply Chain Risk

Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Views: 403

Heisenberg Dependency Health Check is a GitHub Action that inspects only the new or modified … ...More about Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk

Dark Web Search Engines in 2025 - Enterprise Monitoring, APIs and IOC Hunting

Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

Views: 1,643

Dark web search engines have become essential for enterprise security teams that need early … ...More about Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting

mcp-scan - Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Views: 503

mcp-scan is a security tool from Invariant Labs that can run as a static scanner or as a dynamic … ...More about mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers

Initial Access Brokers (IAB) in 2025 - From Dark Web Listings to Supply Chain Ransomware Events

Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Views: 577

Initial Access Brokers (IABs) have moved from niche forum actors to central wholesalers in the … ...More about Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events

Topics

  • Advertorial (28)
  • Apple (46)
  • Cloud Security (8)
  • Countermeasures (232)
  • Cryptography (85)
  • Dark Web (6)
  • Database Hacking (89)
  • Events/Cons (7)
  • Exploits/Vulnerabilities (433)
  • Forensics (64)
  • GenAI (13)
  • Hacker Culture (10)
  • Hacking News (237)
  • Hacking Tools (709)
  • Hardware Hacking (82)
  • Legal Issues (179)
  • Linux Hacking (74)
  • Malware (241)
  • Networking Hacking Tools (352)
  • Password Cracking Tools (107)
  • Phishing (41)
  • Privacy (219)
  • Secure Coding (119)
  • Security Software (235)
  • Site News (51)
    • Authors (6)
  • Social Engineering (37)
  • Spammers & Scammers (76)
  • Stupid E-mails (6)
  • Telecomms Hacking (6)
  • UNIX Hacking (6)
  • Virology (6)
  • Web Hacking (384)
  • Windows Hacking (171)
  • Wireless Hacking (45)

Security Blogs

  • Dancho Danchev
  • F-Secure Weblog
  • Google Online Security
  • Graham Cluley
  • Internet Storm Center
  • Krebs on Security
  • Schneier on Security
  • TaoSecurity
  • Troy Hunt

Security Links

  • Exploits Database
  • Linux Security
  • Register – Security
  • SANS
  • Sec Lists
  • US CERT

Footer

Most Viewed Posts

  • Brutus Password Cracker Hacker – Download brutus-aet2.zip AET2 (2,403,975)
  • Darknet – Hacking Tools, Hacker News & Cyber Security (2,173,904)
  • Top 15 Security Utilities & Download Hacking Tools (2,097,362)
  • 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) (1,200,192)
  • Password List Download Best Word List – Most Common Passwords (934,431)
  • wwwhack 1.9 – wwwhack19.zip Web Hacking Software Free Download (777,145)
  • Hack Tools/Exploits (674,084)
  • Wep0ff – Wireless WEP Key Cracker Tool (531,148)

Search

Recent Posts

  • Systemic Ransomware Events in 2025 – How Jaguar Land Rover Showed What a Category 3 Supply Chain Breach Looks Like November 26, 2025
  • SmbCrawler – SMB Share Discovery and Secret-Hunting November 24, 2025
  • Heisenberg Dependency Health Check – GitHub Action for Supply Chain Risk November 21, 2025
  • Dark Web Search Engines in 2025 – Enterprise Monitoring, APIs and IOC Hunting November 19, 2025
  • mcp-scan – Real-Time Guardrail Monitoring and Dynamic Proxy for MCP Servers November 17, 2025
  • Initial Access Brokers (IAB) in 2025 – From Dark Web Listings to Supply Chain Ransomware Events November 12, 2025

Tags

apple botnets computer-security darknet Database Hacking ddos dos exploits fuzzing google hacking-networks hacking-websites hacking-windows hacking tool Information-Security information gathering Legal Issues malware microsoft network-security Network Hacking Password Cracking pen-testing penetration-testing Phishing Privacy Python scammers Security Security Software spam spammers sql-injection trojan trojans virus viruses vulnerabilities web-application-security web-security windows windows-security Windows Hacking worms XSS

Copyright © 1999–2025 Darknet All Rights Reserved · Privacy Policy