Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Michael Calce
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
==Aftermath== The U.S. [[Federal Bureau of Investigation]] and the [[Royal Canadian Mounted Police]] first noticed Calce when he started claiming in [[Internet Relay Chat|IRC]] chatrooms that he was responsible for the attacks. He became the chief suspect when he claimed to have brought down Dell's website, an attack that had not been publicized at that time.{{Citation needed|date=March 2007}} Information on the source of the attacks was initially discovered and reported to the press by Michael Lyle, chief technology officer of [[Recourse Technologies]].<ref>{{Citation|title=Hot On the Trail of Mafiaboy|url=http://archive.wired.com/politics/law/news/2000/02/34354?currentPage=all|publisher=[[Wired (magazine)|Wired]] |date=2000-02-15}}</ref> Australian News Anchor Sandra Sully reported that it was apparently an Australian coder that initiated the sting performed in the IRC channel. Unreported using the nickname Ocker. Calce initially denied responsibility but later pleaded guilty to over 50 charges brought against him.<ref>{{Citation|newspaper=[[The Register]]|title=Mafiaboy given eight months|date=2001-09-13|url=https://www.theregister.co.uk/2001/09/13/mafiaboy_given_eight_months|accessdate=2007-03-27}}</ref><ref>{{Cite book |last=Shapiro |first=Scott |authorlink=Scott J. Shapiro |title=Fancy Bear Goes Phishing: The dark history of the information age, in five extraordinary hacks |date=2023 |publisher=Farrar, Straus and Giroux |isbn=978-0-374-60117-1 |edition=1st |location=New York |pages=252}}</ref> His lawyer insisted the child had only run unsupervised tests to help design an improved [[firewall (networking)|firewall]], whereas trial records indicated the youth showed no remorse and had expressed a desire to move to [[Italy]] for its lax [[computer crime]] laws.<ref name="wired">{{Citation|newspaper=[[Wired magazine]]|title=Prison Urged for Mafiaboy|date=2001-06-20|url=https://www.wired.com/politics/law/news/2001/06/44673|accessdate=2007-03-27}}</ref> The Montreal Youth Court sentenced him on September 12, 2001 to eight months of "open custody," one year of probation, restricted use of the Internet, and a small fine.<ref name="fbi" /><ref>{{Citation|newspaper=[[The Register]]|title=Mafiaboy given eight months|date=2001-09-13|url=https://www.theregister.co.uk/2001/09/13/mafiaboy_given_eight_months|accessdate=2007-03-27}}</ref> Matthew Kovar, a senior analyst at the market research firm [[Yankee Group]], generated some publicity when he told reporters the attacks caused US$1.2 billion in global economic damages.<ref>{{Citation|last=Niccolai|first=James|title=Analyst puts hacker damage at $1.2 billion and rising|publisher=InfoWorld|date=2000-02-10|url=http://www.infoworld.com/articles/ic/xml/00/02/10/000210icyankees.html|accessdate=2007-04-22|archiveurl=https://web.archive.org/web/20071112081103/http://www.infoworld.com/articles/ic/xml/00/02/10/000210icyankees.html|archivedate=2007-11-12}}</ref> Media outlets would later attribute a then-1.45:1 conversion value of 1.7 billion [[Canadian dollar|CAD]] to the [[Royal Canadian Mounted Police]]. Computer security experts now often cite the larger figure<ref>{{Citation|journal=Issues in Information Systems|last=Harris|first=James K.|title=Ethical Perspectives in Information Security Education|volume=VII|issue=1|pages=181|year=2006|url=http://www.iacis.org/iis/2006_iis/PDFs/Harris.pdf|url-status=dead|archiveurl=https://web.archive.org/web/20070929144818/http://www.iacis.org/iis/2006_iis/PDFs/Harris.pdf|archivedate=2007-09-29}}</ref> (sometimes incorrectly declaring it in U.S. dollars),<ref>{{Citation|journal=Alcatel Telecommunications Review|last1=Robert|first1=J.M.|last2=Cosquer|first2=F.|title=Protecting Data Network Availability|volume=2002|issue=Q3|pages=2|year=2002|url=http://www.securitytechnet.com/resource/rsc-center/vendor-wp/alcatel/T0210-Availability-EN.pdf|access-date=2007-03-28|archive-url=https://web.archive.org/web/20070927222632/http://www.securitytechnet.com/resource/rsc-center/vendor-wp/alcatel/T0210-Availability-EN.pdf|archive-date=2007-09-27|url-status=dead}}</ref><ref>{{Citation|title=Computer Crime (lecture slides)|author=Dept. of Computing Science|publisher=University of Alberta|url=http://www.cs.ualberta.ca/~wfb/300/schedule/lectures/L05-ComputerCrime.pdf|postscript=.}}{{dead link|date=December 2017 |bot=InternetArchiveBot |fix-attempted=yes }} </ref> but a published report says the trial prosecutor gave the court a figure of roughly $7.5 million.<ref name="wired" />
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)