.

Tuesday, February 5, 2019

USA vs Jeffrey Lee Parson :: essays research papers

linked States of AmericaVs.Jeffrey Lee ParsonUnited States of America, Plaintiff vs Jeffrey Lee Parsons, Defendant.With the service of the Cyber Squad in the Seattle Division of the FBI, United States Secret Service and victim, Microsoft Corporation, a complaint was bear downd on August 28, 2003. According to the plaintiff, this exclusive intentionally ca apply and act to cause damage to a protected computer. victimisation the Homeland security Act and the Cyber Security Enhancement Act, the complaint was fi guide under the U.S.C. Title 18, parts 1030(a)(5)(A)(i), 1030(a)(5)(B)(i), 1030(b), and 1030(c)(4)(A), and Section 2. On August 12, 2003, a computer pervert was released called MSBlaster.B, which was distributed through deuce files teekids.exe ( which included polity that directs compromised computers to attack the Microsoft domain name www.windowsupdate.com and a backdoor file Lithium ( which allows a way into a password protected system of rules without use of a pas sword and remote control a system). The worm itself fall guyed mostly Windows 2000 & Windows XP systems. If Windows NT or Windows 2003 servers do not have the appropriate patches, they similarly may be vulner fit. The function of the worm is to exploit the DCOM RPC vulnerability. All reading obtained about an IP address from where authorities suspected the worm had came from led them to obtain a search warrant on a one-on-one on August 19, 2003. On that day, FBI and USSS Special Agents seized seven computers throughout the household. The individual in question, Jeffrey Lee Parson, admitted to agents that he modified the Blaster worm and creating a variety of them including one named, W32/Lovesan.worm.b. Within the worm he placed code that would direct computers to his personal website, www.t33kid.com, so he could maintain a joust of compromised computers. According to authorities, with the use of the worm and its code named teekids.exe, he was able to infect at least seven gib ibyte computers upon releasing it to the internet. Using the Lithium file within the worm, he accessed the infected computers. He used those computers to launch and even larger attack called a DDos Attack (a target computer is inundated with requests from a overwhelming number of sources causing a computer to be overwhelmed and shut down). After he gained control, those seven thousand computers were used to launch the attack that contacted approximately 41,000 computers. Those were instructed to do an attack on the Microsoft web site. Federal investigators have estimated the cost of destruction to be about $1.

No comments:

Post a Comment