The FBI followed the same steps that you outlined to locate Jeffrey Parson according to his indictment papers. The FBI also got an IP address for Jeffrey which traced back to his house from the hosting service for t33kid.com.
Moral of the story: If you want to be a successful cybercriminal, remember to always hide behind proxy servers and don't use your real name and address when registering a domain name. If found guilty, I think an appropriate sentence is to make him clean up virus infected computers in public schools for a year. Richard -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Jerry Heidtke Sent: Friday, August 29, 2003 4:47 PM To: the lumpalaya Cc: [EMAIL PROTECTED] Subject: RE: [Full-Disclosure] Authorities eye MSBlaster suspect It looks like it took the FBI 6 days to find what took 10 minutes on Google. Let's see, executable name is teekids.exe, here's a script-kiddie that goes by teekid, he's got a web site called t33kid.com, the whois for the domain gives his real name and address. Enough probable cause to get a warrant right there. Jerry _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html
