Monday, March 18, 2019
USA vs Jeffrey Lee Parson :: essays research papers
United States of AmericaVs.Jeffrey lee side ParsonUnited States of America, Plaintiff vs Jeffrey Lee Parsons, Defendant.With the help of the Cyber Squad in the Seattle Division of the FBI, United States Secret attend to and victim, Microsoft Corporation, a complaint was filed on August 28, 2003. According to the plaintiff, this individual by choice caused and attempted to cause damage to a protected computer. Using the motherland Security Act and the Cyber Security Enhancement Act, the complaint was filed under the U.S.C. ennoble 18, Sections 1030(a)(5)(A)(i), 1030(a)(5)(B)(i), 1030(b), and 1030(c)(4)(A), and Section 2. On August 12, 2003, a computer louse was released called MSBlaster.B, which was distributed finished two files teekids.exe ( which included code that directs compromised computers to assail the Microsoft domain name www.windowsupdate.com and a backdoor file Lithium ( which allows a way into a password protected system without use of a password and remote cont rol a system). The sucking louse itself targeted mostly Windows 2000 & Windows XP systems. If Windows NT or Windows 2003 servers do not have the withdraw patches, they too may be vulnerable. The function of the worm is to exploit the DCOM RPC vulnerability. each information obtained about an IP address from where authorities suspected the worm had came from led them to obtain a search warrant on a individual on August 19, 2003. On that day, FBI and USSS Special Agents seized septet computers throughout the household. The individual in question, Jeffrey Lee Parson, admitted to agents that he modified the Blaster worm and creating a variety of them including one named, W32/Lovesan.worm.b. Within the worm he fixed code that would direct computers to his personal website, www.t33kid.com, so he could maintain a list of compromised computers. According to authorities, with the use of the worm and its code named teekids.exe, he was able to infect at least seven thousand computers upon relinquish it to the internet. Using the Lithium file within the worm, he accessed the infected computers. He used those computers to launch and even larger attack called a DDos flack (a target computer is inundated with requests from a overwhelming number of sources do a computer to be overwhelmed and shut down). After he gained control, those seven thousand computers were used to launch the attack that contacted approximately 41,000 computers. Those were instructed to do an attack on the Microsoft web site. Federal investigators have estimated the cost of destruction to be around $1.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment