Global Free Press

Deception Dollars

Main
SGTV
Sections
911 Encyclopedia

Ewing2001 Has compiled a comprehensive list of links an articles pertaining to 911.

This is required reading for anyone interested in understanding that horrid day ESPECIALLY since the presstitutes refuse to their job.

more...

9/11 News and GFP-911 Archive


Mike Malloy

Mike Malloy pulls no punches with the FLYING MONKEY RIGHT. If you want to hear a REAL liberal tell it like it is don't miss his show!

Listen Daily 9pm to 12pm

One Year Later



Peter Werbe

Tune in to get a liberal helping of the TRUTH. Peter Werbe stands up to the neo-cons and for liberal cause daily while keeping us all informed on the daily events that are shaping our world.

Listen Daily 2pm till 5pm


The Guy James Show

Liberal Talk Radio In Florida!

Spread the word. Tell your friends to listen in. Call the station every Saturday and give them your supportive comments (239-732-9369). Call The Guy James Show live on the air (239-530-1660).


The Randi Rhodes Show

more...


Internet Radio/Tv For Progressives

Nostamj Comics
Books
All Books

Greg Palast:
The Best Democracy Money Can Buy

Updated: with %40 more pages than the hard cover.



War on Iraq: What Team Bush Doesn't Want You To Know
By William Rivers Pitt



The Greatest Sedition Is Silence:
Four Years in America

More...

 

 

Alex Jones Video

MUST SEE: Video

From infowars.com
psst... pass the word

Global Outlook

Michel Chossudovsky's Magazine on 911 and Post-911 Analysis

Issue No.5-out now:

Bush's "Project for a New American Century"

Was 9/11 a Hoax?

Diving up the Spoils of War

Website Topics of the month:

Was Kelly assassinated for "pulling the plug"

The Forged Intelligence on Iraq

Who's Who on the 9/11 "Independent" Commission

Hot ranking thread:

CIA closed friend with the finanzsystem of Al-Quida!

Counterpunch

FBI announced Arrest of Worm-Upgrader

posted by ewing2001 on Thursday August 28, @09:30PM
from the Reuters dept. News

Minn. Teen Faces Internet Attack Charges

Update: The strange delay of the FBI (08/30)

Reuters - Friday, August 29th

NEW YORK (Reuters) - U.S. cyber investigators arrested a Minnesota teenager Friday who the FBI said has admitted unleashing one version of a damaging virus-like infection weeks ago on the Internet.


A court official identified the teenager as Jeffrey Lee Parson, 18, of Hopkins, Minn., known online as "teekid." A U.S. official in Washington also confirmed an arrest was made early Friday.

Court papers said FBI and Secret Service agents searched Parson's home on Aug. 19 and seized seven computers, which are still being analyzed. In an interview with FBI Special Agent Eric Smithmier, Parson admitted modifying the original "Blaster" infection and creating a version known by a variety of different names, including "Blaster.B.," court papers said.

FBI Director Robert Mueller hinted earlier this week that an arrest was imminent, when he cited the damage from the recent Blaster and "SoBig" infections.

... Parson operated the t33kid.com Web site, according to Internet registration records.


Response at Slashdot

Accused MSBlaster Creator Placed Under House Detention

Techweb -August 29, 2003

A Minnesota teenager has admitted creating a copycat of the MSBlaster worm, Seattle-based U.S. Attorney John McKay said late Friday.

The 18-year-old, identified as Jeffrey Lee Parson of Hopkins, Minn., a middle-class suburb west of Minneapolis-St. Paul, was arrested early Friday morning on one count of intentionally causing or attempting to cause damage to a computer, and charged Friday afternoon in a St. Paul federal court.

“With this arrest, we want to deliver a message,” McKay said. “Hacking is a crime, and we will investigate, arrest, and prosecute hackers. To all hackers, the message should be: we have the capacity, the will, and the desire to find you and arrest you.”

Parson was placed under house detention and is being monitored electronically, said McKay. All computers in his home were seized by the FBI, and he has been denied access to the Internet. Parson will be transferred to Seattle, where the case will go to trial, beginning Sept. 19.

The maximum penalty for the crime is ten years in prison and up to $250,000 in fines, McKay said.

Parson is accused of modifying the original MSBlaster worm, and re-releasing it. The variant, second in a series based on MSBlaster, goes by the names W32.Blaster.B and Blaster.B, and was first detected on August 13, two days after the original appeared.

According to court papers, federal agents first searched Parson's home less than a week later, and seized several computers. During an interview with the FBI, Parson admitted to changing MSBlaster, then releasing the new worm back into the wild.

W32.Blaster.B shared the same destructive characteristics as its parent, attacking PCs which had not been patched against a vulnerability in the Windows operating system. The worm, which according to security firm Symantec infected more than 500,000 systems worldwide, caused some computers to constantly reboot, snarled enterprise network and Internet traffic, and forced Microsoft to take the unusual step of disabling one of the addresses used to connect with its WindowsUpdate service. Estimates by analysts as to the damage done by MSBlaster and its follow-ups range as high as $1.3 billion.

The FBI complaint accused Parson of infecting at least 7,000 computers, and causing “significant damage, without authorization, to Microsoft and other victim computers.”

“The damage done to Microsoft is but a small tip of the larger iceberg of damage done to individuals and businesses,” said Brad Smith, the general counsel for Microsoft, who also stressed the close cooperation between his company and law enforcement agencies that led to the arrest. “Microsoft engineers, for instance, disassembled the [worm's] code.”

No additional arrests have been made, although others were named in the complaint, including a group of Chinese hackers who originally posted code that led to the MSBlaster exploit of the Microsoft vulnerability.

Parson, who goes by the online handle of 'teekid,' seems linked not only to the worm variant -- the file placed on infected machines by W32.Blaster.B was named teekids.exe -- but also to other hacker activity.

The Web site t33kid.com is registered to Parson at a Hopkins, Minn. address. Although the site is now offline, a cached version stored by the Google search engine refers to several hacker-like programs, including one called p2p.teekid.c, which Parson bragged was “my little p2p worm spreads via kazaa and imesh, downloads a file from web. No biggie.”

While neither the original MSBlaster now Parson's alleged variant were distributed via peer-to-peer networks such as Kazaa, the tactic has been used by other attackers.

Teekid also appears on several discussion forums related to Trojan horses, including Trojanforge.net, where he posted a message as recently as August 3 saying he was “looking for a tiny irc bot that all it does is have a web download.” Such bots can be used within a worm to enable an attacker to place other code in an already-compromised PC.

The alias also appears to be behind a defacement last year of a Web site belonging to the Minnesota Government Finance Officers Association (MnGFOA), said Tom Kelly, the group's president.

It all points to someone who knew what he was doing. “Mr. Parson is a key and significant player in the Blaster worm problem,” said U.S. Attorney McKay.

Ken Dunham, the malicious code intelligence manager at iDEFENSE, a Reston, Va. security firm, agreed. “Parson's activities online indicate that he was very experienced in working with malicious code and Trojans. He knew enough to know better, but opted to make a new worm. This was not the first time Parson's had delved into code -- his website hosted a P2P worm in addition to other malicious code and underground website links.”

The U.S. attorney's office in Seattle has been leading the investigation because the worm targeted Windows, the operating system software made by Microsoft, which is based in nearby Redmond.

The arrest comes hard on the heels of claims by Robert Mueller, Director of the FBI, that his agency was “confident” that it would find and prosecute the makers of the MSBlaster worm and the Sobig.F virus.

However, the FBI and other law enforcement agencies are still looking for the creators of the original MSBlaster worm and the Sobig.F virus. While McKay admitted that law enforcement has evidence it's pursuing, he wouldn't comment about possible future arrests.

The hunt may prove difficult. “We're not aware of any connection between Blaster and Sobig,” said McKay.


The strange delay of the FBI

Wagkingdom.com -30th August, 2003

by Fintan Dunne

The high profile arrest of Jeff Parson on charges of writing a variant of the Blaster worm raises more questions than it answers. How come the FBI took so long? The culprit was immediately obvious.

Let's say you are a greenhorn FBI agent.
This is your first day working for the FBI.

It's August 13th, 2003, and you've been at your desk since 09:00am, with nothing to do. You play with your pencils and rearrange you desk layout five times. Eventually....

12:00pm: An office messenger drops a memo on your desk. It says that new variants of the Blaster worm have been identified by anti-virus company McAfee Associates. You read:
"Update 13 August 2003. Two new variants were discovered.. teekids.exe (5,360 bytes) [detected as W32/Lovsan.worm.b] ...functionally similar to the original worm."
12:01pm: So, one new variant creates a file called teekids.exe. You try Google for the search term "teekid" It's a pretty obvious place to start.

12:02pm: Some of the first few Google search results don't look relevant. They seem to be about a tee-shirt for kids.....

But... Bingo! The seventh Google reference is to a website called t33kid.com. OK. Now "33" is the reverse of "EE," so t33kid.com is really tEEkid.com. This has got to be the guy. You click on the website link.... The site is about viruses. Paydirt!

12:03pm: A quick check of the Whois domain name registration record for t33kid.com shows it is registered to: Jeff Parson, 603 8th Ave S. Hopkins, Minnesota 55343 US. The registration also gives Mr. Parson's email address. Gee, you never figured that being an FBI agent was this easy!

12:04pm: Time to send an email to Teekid:
Dear Jeff,
Hey dude, looks like you wrote that
Blaster variant going around.
Get back to us, ASAP.
regards
THE FBI
12:05pm: You just cracked your first case. Took 5 minutes. You deserve an early lunch.

From the above, it's clear the culprit was identifiable on August 13th/14th, 2003. Yet two weeks were to elapse before an arrest was eventually made.

Did the FBI use Google to trace Mr. Parson? It doesn't look like they did. The Washington Times reported the proximate cause of Parson having become a suspect was that:
According to the official, a witness reported having seen the teen testing the Blaster worm. http://washingtontimes.com
But another take on the story tells a different tale:
According to the complaint, FBI agents traced traffic the Blaster worm generated back to a Web site of a similar name to Parson's online alias. "I wouldn't characterize the work as being easy," U.S. Attorney John McKay said, but "he obviously left clues. news.com
Parson left clues a lot more obvious than just worm traffic leading back to his site. However, the FBI's talk of "tracing traffic" makes their investigation sound sophisticated and high-tech.

The same high-tech nonsense pervades the comments by FBI Director Robert Mueller three days before Parson was arrested, who said his agency was working with the US Department of Homeland Security to track down suspects.
"We employ the latest technology and code analysis to direct us to potential sources, and I am confident that we will find the culprits."
-- FBI Director Robert Mueller
news.com
But even Parson himself knew the game was up two weeks before his arrest. He knew from the moment anti-virus software experts found his variant of Blaster. As a friend of Parson recounted:
"Two weeks ago he said he was going to get caught," she said. Startribune.com
The FBI has stage-managed the trivial arrest of the dumbest copycat virus writer ever to come to public notice --into a high-tech, sleuthing triumph.

For the sake of argument the FBI could claim to have been sitting on young Mr. Parson in the hope he would lead them to some network of organized criminals behind Blaster. That don't hunt. Parson is clearly an incredibly dumb pimply virus-writer wannabee.

Think of the FBI budget. Think of the Homeland Security budget. Then go figure the delay in his arrest.

Meanwhile if the FBI want a real investigatory challenge they should chase down the author(s) of the Sobig worm-virus.

You know... The one who used a stolen credit card and who hijacked an innocent party's computer to upload the worm. Say FBI, let us know when the press conference is scheduled to announce that arrest.

Weapon- and OilIndustry supports Deibold | Popular German 9/11 Skeptics: Lawsuit against German TV-Show  >

 

 

Global Free Press Login
Nickname:

Password:

[ Create a new account ]

Related Links

FBI announced Arrest of Worm-Upgrader | Login/Create an Account | Top | Search Discussion
Threshold:
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.

"The liberty of a democracy is not safe if the people tolerate the growth of private power to a point where it becomes stronger than their democratic State itself. That, in its essence, is Fascism — ownership of government by an individual, by a group or by any controlling private power."
-FDR

I'm not a robot like you. I don't like having disks crammed into me... unless they're Oreos, and then only in the mouth. -- Fry

[ home | contribute story | older articles | past polls | faq | authors | preferences ]

FAIR USE NOTICE: This site contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in our efforts to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml
If you wish to use copyrighted material from this site for purposes of your own that go beyond 'fair use', you must obtain permission from the copyright owner.


Powered by daVinci Interactive and Slashcode

Add GFP to your PALM via AvantGo
Add GFP HeadLines to your site XML or RDF

Questions or Comments Regarding This Site
webmaster@globalfreepress.com