Feeds

Cybercops traced Toulouse massacre suspect through IP address

Slain soldier's ad for motorcycle had key role in manhunt

Intelligent flash storage arrays

The IP address of a computer used to view a motorbike sales ad posted by an early victim of the Toulouse gunman played a vital role in narrowing down Mohamed Merah as the main suspect in a series of attacks that have horrified France, it has emerged.

French soldier Imad Ibn-Ziaten posted a video of the motorbike he wanted to sell online. The paratrooper was killed on 11 March after he invited someone who posed as a prospective buyer to his house.

Le Monde reports (Google translation here) that the ad was viewed by about 500 people. Cyber police narrowed down the list of likely suspects to those who lived in and around Toulouse in south-west France. This search was intensified after Ibn-Ziaten's assassination was linked to the slaughter of three children and a rabbi at a Jewish school in Toulouse on Monday, 19 March.

In addition, Le Monde added, a motorcycle dealer had reported a suspicious conversation with someone who wanted to know whether it was possible to remove an anti-theft tracking device from a Yamaha scooter just days before the vehicle was stolen on 6 March and before the first attacks against French soldiers. The twin strands of evidence allowed police to compile a shortlist of suspects.

Merah was already under surveillance by French authorities and the use of an IP address, which was linked to his brother's house, to view Ibn-Ziaten's motorcycle video made him a prime suspect in the case.

In the early hours of Wednesday a French anti-terrorist unit surrounded a block of flats where the reportedly heavily armed Mohamed Merah lived, leading to a siege that ended after police stormed his flat on Thursday morning. Merah jumped out of a window while firing back at cops and was subsequently found dead on the ground. It is as yet unclear whether the fall or police snipers killed him.

During the firefight, Merah reportedly proclaimed allegiance to al Qaida and admitted responsibility for shooting dead of three French soldiers in two ambushes last week as well as the attack on the Jewish school. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.