An Ohio man has been charged with hacking into two websites controlled by law enforcement groups after he posted Twitter messages boasting of the intrusions, which were carried out under the banner of "CabinCr3w," an offshoot of the Anonymous hacking collective.

John Anthony Borell III of Toledo, Ohio, was charged with two counts of computer intrusion, according to an indictment unsealed Monday in Federal Court in Utah. According to a separate criminal complaint that was also unsealed Monday, he exposed the names and private details of almost 500 police officers after using an automated script to carry out SQL injection attacks on websites belonging to the Utah Chiefs of Police and the Salt Lake City Police Department.

According to an Associated Press report, Borell appeared in federal court in Salt Lake City on Monday and pleaded not guilty. Prosecutors and a public defender handling the case weren't immediately available to comment, and court documents available at the time of this writing did not mention the hearing.

Borell is at least the second member of CabinCr3w to be criminally charged for taking part in "Operation Pig Roast," a coordinated hacking campaign that targeted police websites. 30-year-old Higinio O. Ochoa III was charged with gaining unauthorized access to four law-enforcement group websites, according to recently unsealed documents filed in federal court in Austin, Texas. Federal investigators tracked him down in part thanks to his posting of an image showing a scantily clad woman holding a sign saying the hack was carried out by W0rmer of CabinCr3w. Metadata in the image file, combined with other digital evidence he allegedly left, ultimately allowed prosecutors to tie W0rmer to Ochoa.

The 32-page complaint filed in Borell's case paints a series of similar gaffes that led investigators to the Toledo man. Among them was a leaked chat transcript in which someone identified only as Kahuna discusses website hacking. The document also raises the possibility Borell posted self-incriminating documents online after growing tired of running from law enforcement agents.

"I talked to my lawyer," Kahuna wrote in one IRC chat with someone using the handle Presstorm. "The benefit of having a father as an attorney is I have connections. He said when the FBI shows up dont tell them anything and give them his card and tell them if they need to talk they should go through him." Borell's father, John Anthony Borell, is an attorney in Toledo. He told Ars he is not representing his son in court but declined to comment further.

Investigators also benefited from tips that allegedly were made to the FBI in the younger Borell's name.

"The tips stated Borell has participated in numerous government agency intrusions as well as the leaking of classified documents," FBI Special Agent Eric R. Zimmerman wrote in the March 16 affidavit attached to the complaint. "Borell was active in anonops (Anonymous operations) and has aided in the hacking of multiple individuals as well. The tips further claimed that Borell was the lead in the satiagraha leaks of Brazilian files and hosted them on his website, satiagrahaleaks.org, and had been in contact with Sabu (Sabu is the leader of Lulzsec, a hacking group affiliated with Anonymous)."

The document goes on to say that Borell had knowledge of the inner workings of Anonymous and had grown "tired of running and hiding."

Investigators also subpoenaed Twitter for information linked to a user named @ItsKahuna, who used the account to announce the website intrusions and communicate with journalists covering the resulting information dumps. All four of the IP addresses that had been used to access the Twitter account had ties to Borell, Zimmerman said. One belonged to a Toledo resident who lived about 300 feet from him. During the time it was assigned to the resident, ItsKahuna issued a tweet that read: "Neighbors I thank you for installing a new router today and choosing WEP to protect it. I much appreciate the extra bandwidth for torrents." (Short for Wired Equivalent Privacy, WEP has long suffered from weaknesses that make it easy to break the cryptography protecting wireless traffic.)

Two other IP addresses belonged to a business and a church Borell had worked for, Zimmerman said.

Borell was arrested on March 20 and has been detained at a halfway house in Ohio. According to Zimmerman, Borell used an unidentified penetration testing tool to exploit vulnerabilities in the two websites he targeted. Direct messages ItsKahuna allegedly sent to the fiancée of Ochoa asked when the two planned to get married. A separate private message sent to a user named anon_cutie stated, with no apparent irony: "No one has any idea who I am or what I look like, so lets keep it that way and NOT share these with anyone mkay."