Feeds

UK cops: How we sniffed out convicted AnonOps admin 'Nerdo'

Hint: Sometimes gamer tags give the game away

Providing a secure and efficient Helpdesk

Leaderless collective? I don't think so...

"The wider collective might claim to be leaderless," Massie explained. "But the IRC channel had a power structure and hierarchy that was clear from looking at what was going on."

"There might be a debate on targets and whether to continue an attack against Mastercard, for example, was put to a vote. But when we arrested suspects we discovered private channels for ops and admins."

Analysis of copious volumes of IRC logs allowed police to identify leaders who suggested and organised attacks, shouted down dissenting voices, and directed discussions. Individuals who set up and maintained these channels were also of interest to police. Hundreds of thousands of lines of IRC chat log were presented as evidence in the eventual prosecution of suspects believed to be instigators and organisers of DDoS attacks.

At least a few of the individuals whom police investigated had made full use of TrueCrypt (for encryption) and TOR for anonymity, said the computer expert. However, Massie said, others erred in providing snippets of clues about their location and other information in idle chit-chat on the channel and, more particularly, by using well-established nicknames that they'd also used as XBox gaming tags or elsewhere on the 'net when they were still kids.

"We were able to tie their digital identities to real life identities," Massie explained. "Now that the suspects are in their 20s, they are security conscious, but they were using the same nick when they were a kid on gaming forums or elsewhere. They made mistakes."

Once individuals appeared to have links to an online identity, traditional methods of policing took over - including surveillance leading up to arrests at several residences when computer equipment was seized. Several suspects were later interviewed under caution. Meanwhile the painstaking work of computer forensics continued.

Weatherhead (Nerdo) said nothing except "no comment" during police interviews. He also made extensive used of TrueCrypt on his computers.

However innovative computer forensics work by Detective Constable Urooje Sheikh at the PCeU uncovered key fragments of evidence that became key in the subsequent prosecution.

"Nerdo made full use of TrueCrypt but DC Sheikh managed to identify what was going on, uncovering evidence a lot of people would have missed," Massie said, praising the expertise of his former colleague.

Among this evidence was a cease and desist letter sent to a Russian ISP called Heihachi, which offers so-called bullet-proof hosting. This allowed the prosecution to present evidence in court that Weatherhead had contracted services on behalf of the AnonOps group from Heihachi, which the prosecutor described as a "safe haven" for cybercrime.

Specifically Sheikh found "internet artefacts" relating to a cease and desist letter sent to Heihachi to its customers in data stored on one of Weatherhead's computers.

The jury accepted prosecution arguments that Weatherhead had served as the network administrator for the AnonOps group when it convicted him of conspiracy to organise DDoS attacks. It rejected defence arguments that although Weatherhead might have created the AnonOps channel, he was merely an observer who played no part in organising or participating in attacks.

Massie said those tempted to take part in so-called hacktivist actions needed to understand that there are "real life consequences to online actions" both to the organisations targeted as well as themselves.

While early cybercrime prosecutions in the UK were hindered by the unwillingness of victims to testify, or - in the case of viral outbreaks - the difficulty of identifying possible victims, police have adapted their procedures to cover this issue. Financial harm caused by attacks and the number of victims plays a key part in allowing judges to apply sentencing guidelines designed for conventional crimes to offences committed in cyberspace.

"Finding real world victims and estimating financial harm is very important in investigations," Massie concluded.

Judge Peter Testar warned Weatherhead to prepare for a possible jail sentence. Weatherhead and his three co-accused, who pleaded guilty at an earlier hearing, face a sentencing hearing in January at a date yet to be determined. ®

New hybrid storage solutions

More from The Register

next story
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
Google recommends pronounceable passwords
Super Chrome goes into battle with Mr Mxyzptlk
Reddit wipes clean leaked celeb nudie pics, tells users to zip it
Now we've had all THAT TRAFFIC, we 'deplore' this theft
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
TorrentLocker unpicked: Crypto coding shocker defeats extortionists
Lousy XOR opens door into which victims can shove a foot
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
Microsoft to patch ASP.NET mess even if you don't
We know what's good for you, because we made the mess says Redmond
NORKS ban Wi-Fi and satellite internet at embassies
Crackdown on tardy diplomatic sysadmins providing accidental unfiltered internet access
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.