Security Basics mailing list archives
Re: Hunting for Mr Badmouth
From: "Meritt James" <meritt_james () bah com>
Date: Wed, 27 Aug 2003 13:28:43 -0400
Just an idea, and not one (insert standard disclaimer suitable for lawyers here)... if this was posted on a yahoo message board, a search through the yahoo message boards for this individual might be informative (for instance, a search for 'JWMeritt' would be http://search.yahoo.com/search?x=op&va=JWMeritt&va_vt=any&vs=groups.yahoo.com&vd=all&fl=0&ei=ISO-8859-1&vm=p&n=20 ) The suggestions for reading headers would be good in those cases that headers are available, as would the yahoo logs for those times in which he/she/it was posting. And you may well get instances that he/she/it is talked about, and not just when he/she/it was doing the talking. Ask them. BUT if you want to pursue the course legally, the standards for "defamation" become much stricter, as are the rules for admissable evidence. Cybercrime is a very interesting, and extensive, topic and if that is the way you are going I echo the recommendation to bring in a lawyer (ack! cough!) NOW! Perhaps, if you are really, really ticked contact the FBI through Infraguard contacts. Jim "Champion, Steve" wrote:
An excellent comment Mr. James. Could you elaborate on what the differences in the approaches would be? Thank You Steve Champion Sr. Data Security Analyst The Methodist Hospital. -----Original Message----- From: Meritt James [mailto:meritt_james () bah com] Sent: Wednesday, August 27, 2003 11:40 AM To: Bob Walker Cc: security-basics () securityfocus com Subject: Re: Hunting for Mr Badmouth Welcome to the wonderful world to "track the hacker!" A relevant question: Do you desire just "tracking him down" or do you wish the evidence suitable for admission into a court of law? There are different requirements and if you start one without consideration for the other you may accidently "poison the well"... Jim Bob Walker wrote:I'm hoping this board can help me. I've been tasked with trying to track down an individual who posted some comments to a yahoo message board defaming a company. Is there any way to track this individual, short of a court order to yahoo? His profile is private, and (duh!) he's not responding to postings to email. Any ideas on a direction to look or a tool to use would be greatly appreciated. Bob---------------------------------------------------------------------------Attend Black Hat Briefings & Training Federal, September 29-30 (Training), October 1-2 (Briefings) in Tysons Corner, VA; the world's premier technical IT security event. Modeled after the famous Black Hat event in Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors. Symantec is the Diamond sponsor. Early-bird registration ends September6.Visit us: www.blackhat.com---------------------------------------------------------------------------- -- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566 --------------------------------------------------------------------------- Attend Black Hat Briefings & Training Federal, September 29-30 (Training), October 1-2 (Briefings) in Tysons Corner, VA; the world's premier technical IT security event. Modeled after the famous Black Hat event in Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors. Symantec is the Diamond sponsor. Early-bird registration ends September 6.Visit us: www.blackhat.com ---------------------------------------------------------------------------- ----------------------------------------- ____________________________________________________________________________________ ****CONFIDENTIALITY NOTICE**** This e-mail is the property of The Methodist Hospital and/or its relevant affiliates and may contain confidential and privileged material for the sole use of the intended recipient(s). Any review, use, distribution or disclosure by others is strictly prohibited. If you are not the intended recipient(or authorized to receive for the recipient), please contact the sender and delete all copies of the message. Thank you.
-- James W. Meritt CISSP, CISA Booz | Allen | Hamilton phone: (410) 684-6566 --------------------------------------------------------------------------- Attend Black Hat Briefings & Training Federal, September 29-30 (Training), October 1-2 (Briefings) in Tysons Corner, VA; the world's premier technical IT security event. Modeled after the famous Black Hat event in Las Vegas! 6 tracks, 12 training sessions, top speakers and sponsors. Symantec is the Diamond sponsor. Early-bird registration ends September 6.Visit us: www.blackhat.com ----------------------------------------------------------------------------
Current thread:
- RE: Hunting for Mr Badmouth Champion, Steve (Aug 27)
- Re: Hunting for Mr Badmouth Meritt James (Aug 27)
- Re: Hunting for Mr Badmouth Ryan B Lynch (Aug 28)
- <Possible follow-ups>
- Fwd: Re: Hunting for Mr Badmouth Rockit (Aug 28)
- Re: Fwd: Re: Hunting for Mr Badmouth (mostly O.T. and long) Charley Hamilton (Aug 28)
- RE: Re: Hunting for Mr Badmouth Bob Walker (Aug 29)
- Re: Hunting for Mr Badmouth Meritt James (Aug 27)