Hubbry Logo
search
logo

Pranknet

logo
Community Hub0 Subscribers
Read side by side
from Wikipedia
Pranknet
Pranknet logo
Founded2000[citation needed]
Founding locationOntario, Canada
Years active2000–2011
Membership100+
ActivitiesTelephone harassment and hoaxing, via social engineering; DDoS attacks

Pranknet, also known as Prank University,[1] was an anonymous prank calling virtual community that was involved in a string of malicious pranks and instances of telephone harassment, especially during 2009–2011. Their pranks were coordinated through an online chat room, and convinced others to cause damage to hotels and fast food restaurants of more than $60,000. The group was founded by a man who later referred to himself as "Dex1x1", later identified as a Canadian named Tariq Malik.[2][3][4] The group has been linked to nearly 60 separate incidents.[5]

Posing as authority figures, such as fire alarm company representatives and hotel front-desk/corporate managers, Pranknet participants called unsuspecting employees and customers in the United States and tricked them into damaging property, pulling fire alarms, setting off fire sprinklers, breaking out windows, and humiliating acts such as disrobing and the consumption of human urine. Pranknet members could listen in real-time and discuss the progress together in a private chat room.[6]

In 2009, a wave of the pranks across the United States prompted internal alerts by Choice Hotels, as well as advisories by the Sheriff's office of Orange County, Florida, and others.[7] At that time, law enforcement officials from a number of jurisdictions and the Federal Bureau of Investigation began investigating the various incidents as well as the identity of "Dex".[4][5]

Technology

[edit]

Pranknet initially operated through a chat room at Pranknet.org, and participants used Skype to make their calls. As of 2009, Skype used encryption and obfuscation of its communication services and provided an uncontrolled registration system for users without proof of identity, making it difficult to trace and identify users.[8] After Skype began an internal investigation, Pranknet left Skype and briefly used Paltalk for its chats and calls. However, Paltalk banned Pranknet after a February 2009 KFC incident. After Pranknet users were banned from Paltalk, the company was subjected to multiple DDoS attacks.[6] Beginning in 2009, members chatted before, during, and after each prank via the chat system of Beyluxe Messenger, which is owned and operated in Romania, and thus outside of North America. Audiences ranged from 40 to 200 people at any given time.

Pranks that created sufficient havoc were posted on YouTube.[9] Updates were also provided through a Twitter account.[10]

Notable Pranknet incidents

[edit]

In February 2009, "Dex" and a member called "PRANKSTER" called a KFC restaurant in Manchester, New Hampshire. Posing as a manager from the corporate office, he persuaded employees to douse the building with fire suppression chemicals and to then proceed outside, remove all of their clothing and urinate on each other. He claimed the chemicals were caustic and this would render them inert, similarly to a jellyfish sting.[10] When "Dex" posted the audio to YouTube he described it as "Epic KFC Prank Call (greatest ever)...dex successfully convinces the 3 female employees to undress fully nude outside and urinate on each other." Many months later "Dex", posing this time as an insurance adjuster, called the same KFC and had the victims describe their experiences while Pranknet members listened.[6]

On February 10, "Dex" and a member called "DTA_Mike", posing as hotel front desk employees, called two separate guests at the Best Western hotel in Shillington, Pennsylvania. Using the pretense of a ruptured gas line, the caller persuaded each guest to break a window and then throw the television out. "Dex" and his friend repeated the same stunt on February 19 with a Best Western in Santee, California.[6]

On April 30, a Pranknet member called "Rollin in the A" called Prejean's Restaurant in Lafayette, Louisiana posing as an official from the health department. This target was selected because the restaurant provided live video streaming of its dining area on their own website. The victim at this restaurant was told that Prejean's pork was tainted with the swine flu. "Rollin in the A" also told the manager to close the restaurant immediately and tell the customers (75 of them) that they may have eaten tainted food.[6]

On May 27, "Dex" called a Hampton Inn in York, Nebraska, and tricked an employee into setting off the fire alarm. As guests made their way to the lobby, a second call was placed to the front desk. "Dex" claimed that, to avoid alleged fines, the fire department should not be called. Instead, the caller gave various bogus instructions to turn the alarm off, including going to a website that only displayed pornography. The next suggestion from the caller was to break the front windows of the hotel. A truck driver staying at the hotel volunteered, and under direction from "Dex", the man drove his semi-trailer truck into the front door.[11] Later that night, "Dex" tweeted: "I just pulled off the most epic prank. I had a hotel guest back his truck into the hotel front window (in the lobby), and break the window." The post was deleted in late July.[10]

On June 6, 2009, a prank was made on a Holiday Inn Express hotel in Conway, Arkansas. The caller posed as a representative from the company that installed the hotel's fire sprinkler and claimed the system needed to be reset by pulling the fire alarm. Once the alarm was turned on, the clerk was told that the sprinklers would activate unless windows were broken.[12] The same day, the pranksters called a Comfort Suites in Gadsden, Alabama, persuading a clerk to pull a fire alarm; sprinklers were subsequently activated, causing water damage.[13]

In July, a Pranknet member called a Hilton in Orlando, Florida, and, claiming there was a gas leak, convinced a family staying there to break windows with the lid for the toilet tank, destroy a mirror, bash in a wall using a lamp, and throw their mattress out the window.[14] The incident cost $5,000 in damages.[10]

Also in July, a Pranknet caller informed two hotel guests that deadly spiders were about to infest their room. The caller was able to manipulate the couple into breaking their window with the tank lid from their toilet.[10]

On July 5, Pranknet members Powell and Markle called an Arby's in Baytown, Texas (where Powell lives) and talked a worker there into triggering the fire suppression system, causing an estimated $4,600 in damages. Powell failed in his attempts to get any windows broken.[6] Powell was later arrested and charged with criminal mischief for the incident.[15]

On July 20, Markle tricked a desk clerk at the Homewood Suites in Lexington, Kentucky, into drinking another person's urine. The prank started with a call to a guest. The guest was told it was the front desk calling and that a prior guest had tested positive for Hepatitis C. The guest was then told there was a doctor on site and a simple urine test could determine if the guest was infected. The urine was to be brought to the front desk in a simple drinking glass, referred to by the code name of "apple cider" in order to not rouse suspicion amongst guests. Switching roles, Markle then called the front desk alleging to be an employee of Martinelli's Cider. He told the clerk that a representative from the company would like to come downstairs with a sample of their new drink. The guest from the previous call then arrived and handed the clerk his urine. Markle then coaxed the woman to try it. He asked how it tasted. "Horrible", she said. "That does not taste like cider. I'm not going to take another sip, that's horrible." Markle replied: "Well, I need to inform you of something, ma'am. I want you to understand that you just drank that man's urine."[6] In its investigation,[clarification needed] the cyber crimes division of the police department of Lufkin, Texas, requested a subpoena for Markle's Skype activities.[16] The police report classifies the Lexington incident as first-degree wanton endangerment, a Class D felony in Kentucky.[17] Markle was subsequently sentenced to a shock incarceration term of six months.[18]

Additionally, an employee at a Holiday Inn Express was persuaded by a Pranknet caller to set off a fire alarm, break windows, and set off sprinklers which flooded the building. Damages were estimated at $50,000.[9]

The Smoking Gun reported that Pranknet leader "Dex" was responsible for an October 21 hoax in which he phoned ESPN reporter Elizabeth Moreau, tricking her into breaking windows in her room at the Hilton Garden Inn in Gainesville, Florida. He then initiated a conference call with a front desk employee at the hotel, where he then claimed he was Moreau's boyfriend and that the damage was a result of them fighting, as well as making a number of vulgar statements.[19] As a result of the hoax, a Gainesville Police detective was assigned to the case.[19]

In November 2010, an elderly man staying at a Motel 6 in Spartanburg, South Carolina, was tricked by a Pranknet member posing as a hotel administrator into destroying his television set and smashing mirrors in his room with a wrench to destroy hidden cameras supposedly left by a previous guest.[1] The man, told that there was a "midget" trapped in an adjoining room, was then tricked into destroying a sheetrock wall behind his room door, almost making his way through to the next room.[1] As one of the prankster's returned calls was heard by police and other guests who received prank calls soon called the front desk, the hotel did not hold the man accountable for the damages, but did ask him to leave.[1] The pranksters called back on March 11, 2011, persuading a guest to "disable" a sprinkler head by smashing it with a toilet lid to prevent a 'toxic gas' from entering the room.[20] According to TSG, "Motel 6 is a preferred target because Pranknet members can call directly into rooms without having to know a guest's name"[1] As of November 1, 2011, this is no longer possible. After police arrived to answer a 911 call placed by the motel manager, they declined to press charges against the victim but noted that other similar phone calls had been received at the motel.[1]

On December 5, 2010, two Pranknet members identified by The Smoking Gun collaborated to humiliate an Iraq War veteran, 22, at a Motel 6 in Amarillo, Texas. One, posing as the hotel receptionist, informed him that the prior occupant of his room had been diagnosed with "H1N1 flu virus", and transferred him to the other, posing as a physician, who over the course of half an hour directed him to induce vomiting, then to consume some of his own urine to "kill the incubation period", and finally to collect a stool sample in a pillowcase, which he was to bring to the front desk. A prankster then called the hotel's actual front desk, identifying himself by the guest's full name and claiming to be so angry with the service that he would leave a pillowcase full of fecal matter at the front desk. The receptionist locked the door and called police, so the veteran returned to his room, where his conversation with police officers the receptionist had summoned became audible to the pranksters' followers. They finished by calling other visitors at the hotel describing aspects of the prank until the police were called again half an hour later. With voice electronically altered and posing as the mother of a boy making prank calls, one of the pranksters managed to convince police to put the victim back on the phone, who unwittingly recounted his experience to the pranksters.[21]

On January 9, 2011, a Holiday Inn in Omaha, Nebraska, was targeted. Taking advantage of the ability to call guests of the hotel directly, the prankster pretended to be a Fire Department employee reading instructions from a computer checklist to prevent an explosion from a gas leak. These instructions included to "break the red glass vial in the sprinkler", leading to $115,000 in water damage in seven guest rooms and a conference room. The guest was also persuaded to rip a mirror from his wall to find the (non-existent) shutoff valve.[22]

Phone and computer hijacking

[edit]

Beginning in July 2009, "Dex" began hijacking phone numbers of U.S. businesses and had them forwarded to his Skype account. Pretending to be an authority from a particular business, he would first call a phone company and claim they have no dial tone, then request that all calls be forwarded to the number he provided.[6]

On July 7, "Dex" took over incoming calls of the Olympic Game Farm in Port Angeles, Washington, making obscene sexual comments to customers who called. On July 11, he repeated the stunt with the Fun 4 All amusement park in Chula Vista, California. On July 13, he took over incoming calls to a Best Western in Jacksonville, Florida for over 12 hours. In one interaction, a woman called to find out if her husband had arrived and was told first that he had been in an accident, and then that he was having sex with a man in his room and did not wish to be disturbed. On July 15, "Dex" controlled incoming calls to a Hilton Garden Inn in Tulsa, Oklahoma. He told people inquiring about a shuttle to take a cab and they'd be reimbursed. He told some callers the hotel had a swine flu outbreak and told other callers the hotel was in the midst of a hostage situation.[6]

Talking hotel front desk clerks through a series of steps using TeamViewer, "Dex" has posed as a corporate headquarters IT supervisor and taken remote control of hotel computers.[6]

Craigslist abuse

[edit]

Pranknet members frequently placed Craigslist ads offering free tickets or items. Inquirers were bombarded with obscene sexual rants and racial epithets. A 12-year-old girl called about a free trampoline, and "Dex" told her not to get pregnant by a black man because "they have AIDS". Markle frequently called women who were selling household items on the site, and after getting the home addresses of victims, told them he was on his way over to rape them and kill their children.[6]

Smoking Gun investigation

[edit]

"Dex" and other Pranknet members had regularly taunted victims and others, saying they were untraceable.[6] In an interview with The Smoking Gun on June 17, 2009, "Dex" exhibited no worries about being tracked down or caught. In a July co-interview with Markle, he boasted: "It's too difficult to find me. I'm a ghost on the Internet. I do pretty much everything I can to keep anything out of my computer that would lead it back to my actual computer. I'm not a stupid individual, like I said."[6]

In June 2009, The Smoking Gun launched an investigation that lasted nearly two months and included travel to Windsor, Ontario and a stakeout outside Malik's mother's home. Smoking Gun editor William Bastone emailed "Dex", and during a Skype interview provided URLs on the Smoking Gun website. The URLs were unique; when Malik viewed them, it revealed his IP address and location.[23][24] The names, biographies and locations of Pranknet's founder "Dex" and a number of prolific members, and their other findings, were published on their website and provided to the FBI in August 2009.[11] A 2016 article by the BBC noted Bastone's outing of Pranknet's members and also referred to Pranknet as "long gone".[25]

Members

[edit]

According to crime reporting website The Smoking Gun, key members included:

  • Tariq Malik, also known as Pranknet leader "Dex" (a tribute to the character Dexter Morgan, a fictional serial killer).[6] In an interview with The Globe and Mail, "Dex" denied he was Malik (but confirmed he is Canadian).[26]
  • William Marquis, Pranknet's "second in command".[6] Known as Hempster, Marquis was previously convicted in 2004 for drunk driving and in 2005 for marijuana production.[6] CBC News attempted to interview Marquis regarding the Pranknet allegations. However, he did not answer his door.[5]
  • James "Tyler" Markle, one of the group's most prolific callers. Markle was already a person of interest in a Lufkin Police investigation involving a phone call to a local McDonald's,[27] and was arrested for this subsequently.[28] The Smoking Gun had based the claim upon information from old MySpace and Facebook pages, and people from the area who identified Markle in photos.[29] The Smoking Gun also published official documents showing that Markle pleaded guilty to aggravated sexual assault of a child in 2005, serving two years in a juvenile detention facility for sexually abusing a 5-year-old girl and then threatening to kill her if she told anyone about the incident.[30] In an interview with The Lufkin Daily News, Markle denied that the person described on TSG was him, claiming instead it was another person called the Samoan Prankster.[27] He was charged with felonies in two separate states: for making a felony terroristic threat in the Lufkin McDonald's case and for terrorizing and criminal damage (both felonies) in a separate incident involving a Wendy's restaurant in Gretna, Louisiana.[31] He was later extradited to Louisiana as a result of the charges filed in the Gretna incident.[32] In December 2010, Markle was sentenced to 5 years imprisonment in Texas for the prank call to the Lufkin McDonald's.[33]
  • Shawn Powell, previously imprisoned for indecency with a minor (for taking nude photos of an 8-year-old female relative), a felony that put him in custody for 13 months. He specialized in racist and threatening calls.[6] He was charged with criminal mischief for his part in a hoax call to the Baytown Arby's restaurant, resulting in the fire suppression system being activated and resulting in $1,350 worth of damage.[15]
  • LeeAnn Jordan, who had used her PayPal account to receive international money transfers and to pay for Paltalk.[6]

A former member, Jericho Batsford, left the group in 2009 after the incident in Conway, Arkansas, and contacted local FBI agents.[3] She told them she knew Dex's identity to be that of Malik[3] and that he was responsible for many incidents.[10] In response to her defection, Pranknet members have constantly harassed her home and her workplace via Skype and Beyluxe. Malik told members to be patient, that she would not answer the phone and let them get to her, and to instead "get her later on down the road, when she least expects it."[6] Batsford had participated in some phone pranks, but left when she witnessed members encouraging children to make bomb threats.[3]

Officials in at least four U.S. States and six U.S. cities stated that they were considering charges against "Dex" and his possible extradition from Canada to face trial.[26]

References

[edit]
[edit]
Revisions and contributorsEdit on WikipediaRead on Wikipedia
from Grokipedia
Pranknet was an anonymous online forum and virtual community active in the late 2000s, where members coordinated elaborate prank telephone calls that escalated into criminal acts of harassment, vandalism, and property destruction, often broadcast live to an audience for entertainment.[1] Founded in an online chat room and led by Tariq Malik, a 25-year-old from Windsor, Ontario, known online as "Dex," the group targeted businesses and individuals across the United States, posing as authority figures to deceive victims into committing destructive behaviors.[2] Notable incidents included tricking motel guests into believing there was a gas leak, prompting them to smash windows and televisions in locations such as Shillington, Pennsylvania, and Santee, California, in early 2009, causing significant damage and distress.[1] Other pranks involved fast-food employees activating fire sprinklers, stripping in public, or destroying restaurant interiors, with one 2009 case leading to the conviction of participant James Markle, who received a five-year prison sentence for damaging two U.S. restaurants.[3] Similar hoaxes continued into 2016, such as at a Burger King in Coon Rapids, Minnesota, where employees smashed windows after a fake emergency call, though Pranknet itself had become defunct by then.[3] Investigations by outlets like The Smoking Gun identified Malik and involved the FBI, but no arrests of core members were reported, highlighting challenges in tracing VoIP-based calls; the group's activities underscored the dangers of anonymous online coordination for real-world harm.[1][2]

Background and History

Founding and Origins

Pranknet was established in November 2008 in Windsor, Ontario, Canada, by Tariq Malik, who operated under the online aliases "Dex" or "Dex1x1". The group originated as a splinter from the Appleinsults online chat room and functioned as an anonymous virtual community centered on sharing prank calls, initially serving as a forum for enthusiasts to exchange recordings and ideas for telephone-based hoaxes.[4][1][5] In its initial months, Pranknet's activities focused on phone pranks, such as simple hoax calls to businesses that involved no property damage or serious harm. Members coordinated these efforts through basic internet chat rooms, where they planned calls in real time and shared audio clips afterward. Pranks were often posted on personal websites or emerging video-sharing platforms, allowing the community to build a modest following around humorous, non-malicious deceptions.[1] Shortly after its founding, the group's pranks escalated into more malicious forms of harassment, marking a rapid shift from playful interactions to targeted and destructive schemes. This progression reflected growing participation and the adoption of online tools for broader coordination, though the core remained rooted in anonymous telephone trickery.[5]

Community Development

Pranknet expanded rapidly from a small core of online prank enthusiasts into a broader virtual community in early 2009, primarily through anonymous chat rooms and voice platforms that facilitated real-time collaboration.[6] By mid-2009, the group had attracted participants drawn to increasingly elaborate and malicious schemes, evolving from casual calls to coordinated operations involving property damage and psychological manipulation.[2] This growth was fueled by the anonymity and accessibility of internet-based tools, allowing members to join without formal barriers and contribute to live sessions.[3] The community self-identified as "Pranknet University" or "Prank U," functioning as an informal training hub where newcomers learned to develop prank scripts, impersonate authorities, and execute calls effectively through shared tips and observed demonstrations in chat forums.[6] Established norms emphasized collective participation, with pranks broadcast live in dedicated chat rooms to engage the audience in real time.[2] Creativity and the intensity of victim reactions—often termed "rage" or "epic" outcomes—were rewarded with informal recognition and status within the group, encouraging escalation while discouraging overt identification to maintain anonymity.[3] By mid-2009, Pranknet had grown to include over 100 active participants, with peak audiences exceeding 200 during broadcasts, though the core operational team remained smaller.[6] While centered in North America, particularly around Windsor, Ontario, the network drew international interest, enabling remote contributions from various locations but focusing targets primarily on U.S. and Canadian businesses.[2] Platforms like Skype were briefly referenced for voice coordination, supporting the group's shift toward more sophisticated, multi-member executions.[6]

Technology and Methods

Communication Platforms

Pranknet members coordinated their activities through various online platforms, enabling real-time collaboration and live broadcasting of prank calls to audiences of up to dozens of participants. The group initially relied on Paltalk chat rooms, where individuals gathered to listen in on calls, provide suggestions, and execute pranks collectively, fostering a communal environment for their operations.[6] In February 2009, following a ban from Paltalk due to involvement in a disruptive incident at a KFC restaurant, Pranknet migrated to Beyluxe Messenger, a Romania-based chat service that offered similar real-time text and voice features while operating beyond North American jurisdiction. This shift allowed the group to evade immediate oversight and continue coordinating pranks without interruption. Tariq Malik had orchestrated multiple denial-of-service (DoS) attacks on Paltalk's servers, which the platform's CTO described as sophisticated efforts that incurred significant mitigation costs.[7] For voice-based coordination, Pranknet increasingly turned to Skype after the Paltalk ban, using its conferencing capabilities to direct participants during live calls while masking caller identities through voice-over-IP technology. This platform became central to their workflow, supporting anonymous international connections that aligned with the group's cross-border membership.[6][5] Pranknet also leveraged YouTube for archiving audio and video recordings of successful pranks, creating dedicated channels to share content with a broader online audience and preserve their exploits for replay and discussion. Complementing this, the group promoted activities via Twitter, where Malik posted teasers about impending "social engineering" efforts to attract followers and build hype around their operations.[8][6]

Prank Execution Techniques

Pranknet members primarily utilized Voice over Internet Protocol (VoIP) services, such as Skype, to place prank calls while maintaining anonymity and low costs.[6] These calls were often routed through Skype numbers, allowing perpetrators to impersonate authorities or businesses by exploiting the service's ability to cloak caller identities and locations.[5] For instance, in one technique, members posed as telecommunications representatives to convince hotel staff to forward incoming business lines to a controlled Skype account, effectively hijacking the establishment's phone system for hours or even days.[7] This rerouting enabled caller ID to display the victim's own business number, enhancing the deception and making the calls appear legitimate.[7] To gain control over victims' computers, Pranknet operators frequently employed remote desktop software by tricking targets into granting access. Posing as IT support personnel, callers directed hotel employees or business staff to download and install programs like TeamViewer, a free remote access tool that permits full control of a machine over the internet.[7] Once installed, the software allowed perpetrators to mirror or directly manipulate the victim's screen, such as accessing guest databases to retrieve personal information like names and credit card details.[7] This method was used to escalate pranks involving sensitive data. Prank execution relied heavily on scripted dialogues designed to simulate urgent scenarios and build compliance from victims. Members prepared detailed "protocol sheets" outlining step-by-step instructions, often impersonating officials from police, fire departments, or health agencies to fabricate emergencies like gas leaks, fire hazards, or contamination risks.[6] For example, in fire-related pranks, callers acting as alarm company representatives or emergency service workers convinced staff to damage sprinkler systems under the pretense of resolving a critical fault, leading to widespread property destruction.[6] These scripts were rehearsed in advance and adapted in real-time based on victim responses, ensuring a gradual escalation that pressured targets into irrational actions.[7] Audio elements in Pranknet calls were enhanced through live recordings and basic manipulation during broadcasts, though advanced tools were not prominently documented. Calls were captured and replayed in online chat rooms for audience participation, with operators using authoritative tones and simulated background noises to heighten realism.[6] In some instances, multiple participants contributed voices to mimic coordinated official responses, such as overlapping "emergency" communications from supposed police or fire units.[6] This real-time audio layering helped maintain the illusion of legitimacy without relying on sophisticated editing software.[7]

Notable Incidents

Restaurant and Hotel Pranks

Pranknet members frequently targeted restaurants and hotels with phone-based deceptions that escalated into physical destruction and humiliation, often by impersonating authority figures to exploit victims' compliance. These pranks relied on voice-altering technology and real-time coordination in online chat rooms to direct employees or guests toward damaging actions, such as activating alarms or breaking fixtures under false pretenses of emergencies like gas leaks or contaminations.[9] One prominent example occurred in February 2009 at a KFC in Manchester, New Hampshire, where callers posing as corporate representatives convinced three female employees to release fire suppression chemicals, evacuate the building while partially disrobed, and perform degrading acts outside, resulting in thousands of dollars in cleanup and repair costs from the chemical discharge and lost business.[9] The incident, broadcast live in Pranknet's chat room, highlighted the group's focus on recording victims' distress for entertainment.[10] Hotel pranks followed a similar destructive pattern. In July 2009, at the Homewood Suites in Lexington, Kentucky, a Pranknet caller deceived a front desk clerk into serving a guest's urine as "apple cider" under the guise of a corporate promotion, leading to felony charges of wanton endangerment against the perpetrator, though no property damage was reported.[11] Earlier, in February 2009, a guest at the Best Western in Santee, California, was tricked by a fake front desk call about a gas leak into smashing a window and television for "ventilation," causing significant but unspecified repair expenses.[10] Similarly, on May 27, 2009, at the Hampton Inn in York, Nebraska, a caller impersonating hotel management prompted an employee to trigger the fire alarm and break lobby windows, while a confused trucker drove his vehicle through the front door, resulting in $5,000 in damages from shattered glass, with additional costs from the vehicle impact and repairs.[10][1] These incidents exemplified Pranknet's broader strategy of over 20 similar deceptions across U.S. fast-food chains and lodging facilities in 2009, where callers often spoofed caller ID using VoIP services to mimic police or managerial voices, inducing panic that led to self-inflicted property damage.[12] By the end of 2009, the collective damages from such restaurant and hotel pranks were estimated in the hundreds of thousands of dollars, prompting investigations by local police and the FBI into the group's coordinated activities.[12][1]

Craigslist and Online Scams

Pranknet members exploited Craigslist by posting fraudulent advertisements for free or discounted items, such as electronics and tickets, to lure potential victims into contacting a controlled phone number where they faced intense verbal harassment, including obscene sexual rants and racial slurs.[7] This tactic, prominent in 2008 and 2009, allowed the group to amplify their reach by turning the classifieds platform into a gateway for psychological abuse, often broadcast live to online audiences for entertainment.[13] A notable example occurred in early 2009 when Pranknet placed a Craigslist ad in Denver offering a free 32-inch flat-screen television at a specific residential address, directing inquiries to a hijacked Skype number.[7] Callers, including families and individuals seeking a bargain, were subjected to abusive tirades, while the targeted address—monitored remotely via webcam—experienced disruptions as people arrived expecting to claim the item, resulting in wasted travel and unnecessary disturbances.[7] In parallel, group members contacted legitimate Craigslist sellers, particularly women advertising children's toys or baby clothes, by posing as interested buyers to extract home addresses under the pretense of arranging pickups.[10] Once obtained, this personal information fueled follow-up threats, such as vows to rape and murder the sellers' children, escalating the scams into targeted doxxing and intimidation campaigns.[10] These Craigslist operations integrated seamlessly with Pranknet's broader social engineering strategies, where fabricated buyer personas not only gathered sensitive details but also set the stage for prolonged harassment via repeated calls or coordinated ambushes.[7] For instance, in 2009 cases involving fake transaction inquiries, victims reported hours of psychological torment after sharing contact information, contributing to indirect losses through time wasted on nonexistent deals and the emotional toll of sustained abuse.[13] Such tactics mirrored common online fraud patterns but were uniquely twisted for prank entertainment, often resulting in victims abandoning legitimate sales or altering their online behavior out of fear.[10]

Computer and Device Hijackings

Pranknet members utilized Voice over Internet Protocol (VoIP) services like Skype to hijack telephone numbers, enabling them to intercept incoming calls to businesses and impersonate staff or authorities during pranks. Starting in July 2009, a key participant known as "Dex" conducted at least six such hijackings, redirecting U.S. business phone lines to his Skype account to simulate emergencies and manipulate victims remotely.[6] This technique allowed the group to exert control over victims' communications devices without physical access, often escalating to instructions for destructive actions under false pretenses like gas leaks or security threats.[6] In several 2009 incidents, phone hijackings combined with deceptive calls led victims to damage their own electronic devices in compliance with fabricated urgent scenarios. For instance, on February 10, 2009, at a Best Western hotel in Shillington, Pennsylvania, pranksters hijacked the line to pose as staff, convincing a guest to smash a window and hurl a television from a room to "ventilate" a supposed gas buildup.[6] Similarly, on February 19, 2009, at another Best Western in Santee, California, victims in one room were coerced into breaking windows and destroying a TV set through the same ruse.[6] These acts of self-inflicted device destruction exemplified Pranknet's method of using hijacked phones to force compliance, resulting in property damage while the calls were live-streamed to the online community.[14] The hijackings extended beyond isolated events, contributing to over 15 documented cases of harassment where VoIP-enabled phone control played a central role, often tying into larger campaigns of psychological manipulation.[6] By forwarding business lines to personal computer-based VoIP accounts, Pranknet achieved anonymity and scalability, turning everyday telephones into tools for remote coercion without deploying malware or direct PC access.[6]

Investigation and Aftermath

Smoking Gun Exposé

In August 2009, The Smoking Gun published an investigative article titled "Telephone Terrorist," which exposed the inner workings of Pranknet and unmasked its founder and leader, Tariq Malik, who operated under the online pseudonym "Dex." Through a seven-week investigation involving IP address tracing and analysis of chat logs from Pranknet's online forums, reporters identified Malik as a 25-year-old resident of Windsor, Ontario, coordinating the group's activities from his apartment. The article detailed how Malik had built Pranknet into a network of over 100 members who executed elaborate phone pranks, often resulting in property damage and financial losses for victims.[1] The exposé highlighted The Smoking Gun's collaboration with the FBI, in which investigators shared evidence compiled from more than 60 documented incidents, including audio recordings of prank calls and digital traces linking members to specific acts. This material also revealed the identities of several key participants, providing law enforcement with actionable leads to pursue criminal charges related to the group's operations. By infiltrating Pranknet's chat rooms, the journalists uncovered a culture of escalation, where members shared detailed targeting lists of businesses and individuals vulnerable to scams, such as hotels and restaurants referenced in prior incidents.[1] Internal communications exposed in the article included members' boasts about the scale of destruction, with claims of causing millions in damages through coordinated hoaxes that prompted victims to vandalize their own properties or engage in fraudulent activities. Malik himself was portrayed as actively encouraging these "epic" pranks, mocking victims in real-time chats and prioritizing high-impact schemes over ethical concerns. The revelations painted Pranknet's dynamics as a tightly knit online community driven by a desire for notoriety and amusement at others' expense.[1] The publication of the article triggered an immediate backlash within Pranknet, leading to the shutdown of several chat platforms as administrators scrambled to evade detection. Malik exhibited signs of paranoia, implementing stricter IP monitoring and limiting discussions on damaging pranks, which contributed to the rapid dispersal of active members and a significant decline in the group's cohesion. This exposure marked a turning point, curtailing Pranknet's unchecked operations and drawing broader media and law enforcement attention to online prank networks.[1] Following the 2009 exposé that unmasked key members of Pranknet, the Federal Bureau of Investigation (FBI) and local law enforcement in multiple U.S. jurisdictions launched probes into the group's activities, focusing on charges of harassment, terroristic threats, and property damage across at least four states.[9][14] These investigations extended to Canada, where authorities examined potential extradition for Pranknet's founder, Tariq Malik (known as "Dex"), though no arrests of Malik were reported.[15] In the United States, one prominent prosecution targeted James Tyler Markle, a 19-year-old Texan operating under the alias "Prankster," who was linked to several destructive pranks broadcast in Pranknet chat rooms. In October 2010, Markle pleaded guilty in Angelina County, Texas, to felony criminal mischief for a June 2009 call that tricked a Lufkin McDonald's employee into causing approximately $5,000 in damage by pouring bleach into the fryer; he was sentenced to five years in prison in November 2010, but served approximately six months before being granted shock probation, followed by five years of probation, and ordered to pay restitution.[16][17] Separately, in March 2010, he entered a guilty plea in Jefferson Parish, Louisiana, to two felonies—terrorizing and simple criminal damage—stemming from a prank at a Wendy's restaurant, receiving a three-year probation term.[16] The combined legal actions contributed to Pranknet's dissolution, with the group ceasing organized operations by 2011 amid arrests, platform bans, and public scrutiny; the pranks had caused over $60,000 in documented property damage to hotels and restaurants.[12] No major activity from the core network has been reported since the dispersal of its members.

Key Members and Profiles

Leadership Figures

Tariq Malik, known online as "Dex," founded Pranknet and served as its primary strategist and main coordinator, directing the group's operations from his residence in Windsor, Ontario.[6] At 25 years old and unemployed in 2009, Malik lived with his mother in a modest apartment, maintaining a reclusive lifestyle centered around online activities.[5] An avid gamer immersed in first-person shooter titles like Counter-Strike, Halo, and Crossfire, Malik's interests shaped Pranknet's tactics, emphasizing immersive, high-stakes scenarios that mirrored gaming dynamics of strategy and confrontation.[6] Under Malik's guidance, Pranknet evolved from basic telephone hoaxes to increasingly severe pranks, with him actively escalating their intensity to achieve greater chaos and audience engagement, such as orchestrating hotel evacuations and property destruction through manipulated calls.[13] He promoted a philosophy of unrestricted creativity within the group, encouraging participants to pursue "epic" outcomes without boundaries, which directed the community's focus toward more destructive and elaborate schemes.[6] William Marquis, operating under the alias "Hempster," functioned as Pranknet's co-leader, specializing in scripting prank dialogues and moderating live chat rooms to maintain order and momentum during broadcasts.[13] Based in Toronto, Ontario, the 51-year-old Marquis contributed to the group's infrastructure by enforcing participation rules, bouncing disruptive members, and incentivizing bold actions, including offering financial rewards for high-impact pranks like vehicle crashes into hotel lobbies.[13] His role complemented Malik's vision, ensuring scripted elements aligned with the no-limits ethos that propelled Pranknet's direction toward escalating severity.[4]

Other Notable Participants

Shawn Powell, a 24-year-old using the online pseudonym "Slipknotpsycho," was a Texas-based participant in Pranknet who frequently executed restaurant pranks through voice impersonations, often posing as authority figures to manipulate victims.[18] In one notable instance, Powell collaborated with another member to call an Arby's restaurant in Baytown, Texas, on July 5, 2009, convincing an employee to activate the fire suppression system, which caused $1,384 in damage and temporarily closed the business.[18] Powell's activities led to his arrest on August 26, 2009, on a misdemeanor criminal mischief charge related to the Arby's incident; he was released on $1,000 bond and faced a court date the following month.[18] LeeAnn Jordan, known online as "Veruca," served as a supportive member from Lewiston, Maine, handling financial logistics for the group rather than direct prank execution.[6] At age 28 during the group's peak activity, she permitted the use of her PayPal account to receive international money transfers from participants and to cover costs for Paltalk, the chat platform central to Pranknet's coordination.[6] This role facilitated the group's operations without involving her in voice-based impersonations or on-the-ground scouting. James Tyler Markle, operating under the pseudonym "Prankster," was a prolific Texas resident from Diboll who specialized in hotel and restaurant hoaxes, conducting multiple calls that resulted in property damage before his apprehension.[16] Markle, then approximately 19 years old, partnered with Powell in the Baytown Arby's prank and independently targeted a McDonald's in Lufkin, Texas, in June 2009, tricking employees into causing approximately $5,000 in damage through destructive actions like smashing equipment.[19] He also executed a similar scheme at a Wendy's in Jefferson Parish, Louisiana, prompting further investigation.[16] Authorities identified Markle via Skype records subpoenaed by Lufkin police; initially named a person of interest in late August 2009, he was arrested in September 2009 in multiple cases.[20] He later pleaded guilty to felony charges in both Texas and Louisiana, receiving a five-year prison sentence in Texas in November 2010 but granted shock probation after serving about 90 days and placed on five years' probation, along with three years of probation in Louisiana. In 2017, Markle was rearrested for failing to comply with sex offender registration requirements.[16][21][22] Other participants contributed behind-the-scenes support, such as editing prank audio recordings and scouting potential victims through online directories, though specific identities beyond core operational roles remain less documented in investigations.[6]
User Avatar
No comments yet.