On the technical side, the first step we may want to consider is whether we have the ability to track down the IP addresses associated with “Ian” and the “eatmyjukt” email address. Unless it is encrypted (which will then require additional steps), you can learn just about anything about a particular person by their IP address, including their location, their internet provider, and yes, even their name and address. However, if “Ian” used anything to hide this information, such as a proxy or encryption, this would take a little more time to track down, but it is by no means impossible. And because it assumed that “Ian” is a possibly underaged amateur, it shouldn’t be difficult for a multi-million dollar company like ours to crack and track down. However, this makes me wonder if we should cover our own bases legally by researching what we can uncover from someone’s IP address without approval from a court.
Legally, however, the FBI will be able to change Ian through § 2703 of the Stored Communications Act as he (or they) “intentionally accesses without authorization a facility through which an electronic communication service is provided or … intentionally exceeds an authorization to access that facility; and thereby obtains, alters, or prevents authorized access to a wire or electronic communication while it is in electronic storage in such system shall be punished … .” However, before charging “Ian,” the FBI will have to track him down, which can be done by obtaining a warrant to compel Hiert to turn over any information it has on the “eatmyjukt” account. With the information already obtained, it seems as though both avenues may succeed as “Ian” overstepped numerous boundaries while attempting to extort Jukt Micronics for hundreds of millions of dollars.
Leave a Reply