Feeds

Melissa author helped Feds track other virus writers

A snitch in time saves jail time

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

David Smith, author of the Melissa virus, assisted computer crime authorities in the investigation and prosecution of other virus writers.

Within weeks of Smith's arrest by the FBI in 1999, he was using a fake identity to communicate with and track virus writers around the world, according to court documents released yesterday.

According to these documents, Smith gave the FBI the name, home address, and email address of Jan de Wit (also known as "OnTheFly"), the Netherlands-based author of the Anna Kournikova virus. The FBI passed the information on to authorities in the Europe, who arrested de Wit. The Dutchman was ultimately sentenced to 150 hours community service for his actions.

In 2001, David L Smith is claimed to have assisted investigators in recording online discussions with Welsh virus writer Simon Vallor. The FBI shared the information with British detectives, who arrested Vallor in February 2002. Vallor subsequently pleaded guilty and was sentenced to two years imprisonment for computer crime offences earlier this year.

The revelations that Smith had turned informant come in court documents relating to probation bargaining between Smith's New Jersey attorney, Christopher Christie, and Judge Joseph Greenaway, who sentenced Smith to 20 months in prison in 2002.

Christie claimed Smith "provided timely, substantial assistance to the United States in the investigation and prosecution of others," in the court documents, AP reports.

"Both Jan de Wit and Simon Vallor showed extraordinary levels of stupidity, helping the authorities track them down," said Graham Cluley, senior technology consultant for Sophos Anti-Virus. "Jan de Wit's Kournikova virus contained his nickname 'OnTheFly'. Unfortunately he also had a website with that name, complete with downloadable images of the tennis pinup. You wouldn't have had to have been Sherlock Holmes to solve that riddle."

"Vallor, meanwhile, appears to have done himself no favours by writing viruses which included messages to his mates, and bragging about his achievements online. Hollywood's depiction of virus writers as geniuses could hardly be further from the truth," Cluley added.

Vallor was released from prison earlier this month, but is being electronically tagged, and forced to obey a curfew which prohibits him from leaving his Welsh home after 7.15pm.

David L Smith continues to serve his sentence in federal prison at Fort Dix, New Jersey. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.