Virtual girlfriend 'inspired Internet attack'

Virtual girlfriend 'inspired Internet attack'

Summary: An attack that disabled the servers of a major US port was the result of a spat over the suspect's Internet girlfriend, say prosecutors

SHARE:
TOPICS: Security
1

A UK teenager on trial for allegedly launching an Internet attack on a US port on Friday admitted he had never met a key figure in the prosecution's case -- namely, his then-girlfriend -- in person.

The prosecution argues that Aaron Caffrey launched a distributed denial of service attack (DDoS) in reaction to what he perceived as criticisms of his girlfriend, Jessica. Prosecutors have produced records, or log files, of Internet chats that took place at the time of the attack, and which they say prove that Caffrey had a motive to carry out the attack.

Caffrey argues that the log files were altered or planted on his computer by hackers, who carried out the DDoS attack via his PC in order to cover their tracks.

According to evidence extracted from Caffrey's computer by the Computer Crime Squad at Scotland Yard, the teenager was in a South African chatroom nine days after the 11 September terrorist attacks when a chat participant named Bokkie made abusive remarks about the US. The court was told that because Jessica was from the US, Caffrey launched a revenge DDoS attack on Bokkie, which resulted in the Port of Houston's servers being knocked offline.

While giving evidence in Southwark Crown Court on Friday, Caffrey said that although Jessica was his girlfriend at the time, and he had known her for about a year, the relationship had been carried out solely over the Internet -- the two had never met in person.

Caffrey also disputed evidence given earlier this week by expert witnesses, including Detective Constable Paul Stunt and Professor Neil Barrett. According to Caffrey, none of the experts had carried out a "thorough investigation" of his computer and they had not allowed him to examine the contents of his hard drive personally.

"They think they know what a Trojan is, but it could be any executable file," said Caffrey. "Did they look at every executable file on my computer? I am sure the answer is no."

Caffrey also disputed Barrett's testimony that if a Trojan had infected Caffrey's computer, it would have left a trace. "It could have had a self-destruct mechanism. After executing, the file could run an algorithm that would write completely random data over its original file," he said.

The case continues.

Topic: Security

Munir Kotadia

About Munir Kotadia

Munir first became involved with online publishing in 1998 when he joined ZDNet UK and later moved into print publishing as Chief Reporter for IT Week, part of ZDNet UK, a weekly trade newspaper targeted at Enterprise IT managers. He later moved back into online publishing as Senior News Reporter for ZDNet UK.

Munir was recognised as Australia's Best Technology Columnist at the 5th Annual Sun Microsystems IT Journalism Awards 2007. In the previous year he was named Best News Journalist at the Consensus IT Writers Awards.

He no longer uses his Commodore 64.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

1 comment
Log in or register to join the discussion
  • Someone mail this guy a love doll. Make I-net safe for all
    anonymous