I want to talk about the trail that led to the arrest, because it's an interesting example of detection in an internet world.
So, now we start detecting...
Keep in mind that the extortionist had to access that gmail account to see if his victims had replied.
Every machine connected to the internet has assigned a unique number called its IP address. If you think of it as being like a telephone number, you'd not be far wrong.
The IP numbers have to be unique, because these things are what the internet uses to send messages to the right place. Imagine if two people had exactly the same phone number; it's the same logic. The machine you're using to read this blog has a unique IP address.
IP addresses are always broken into four parts, written as A.B.C.D, purely to make them easier to manage. Each of A, B, C and D is a number from 0 to 255. So, for example, the site FBI.gov, has an IP address of 220.127.116.11.
It should come as no surprise that Google logs the IP address of everyone who uses its email accounts.
So the Australian police called Google and asked, who had accessed that email account. Google replied with three IP addresses, and the dates and times of access.
The first IP address had been assigned to an internet kiosk at O'Hare airport in Chicago. The email account had been set up from that kiosk, before the crime occurred. Of course they didn't know who had used the kiosk, but they knew for sure the extortionist had been at O'Hare at that date and time.
The second IP address had been assigned to a computer at a public library at Kincumber, on the central coast of New South Wales. Incidentally, this is close to where my mother lives, but I don't suspect her.
The third IP address had been assigned to an internet kiosk at a video store not far from the library.
The second and third access had been to see if there was any mail. And they were accessed after the crime.
Clearly the extortionist had flown from Chicago to Sydney, committed the crime, and then gone north to Kincumber, and the police knew dates, times and places of where he'd been. This, plus travel records and some video camera footage from the locations was enough to find their suspect.
How did they know where to find the computers with those IP addresses? Since every number must be unique, a central authority called ICANN allocates them. ICANN, through third parties, allocates them in blocks. A small ISP might ask for a block of IP addresses for its customers to use, and be allocated for example every address that begins 10.20.30. That's called a class C block because the A, B and C parts of the addresses are all the same, and only the D part varies. (Remember I said IP addresses are always written in four parts? This is why.) The ISP in this example has available to allocate every number from 10.20.30.000 to 10.20.30.255.
ISPs, in turn, keep a record of which of their customers have been assigned which numbers.
When the police got the three IP addresses from Google, they could immediately look up which ISPs owned the blocks in which those numbers sat. They then had to get from the ISPs which computers had those numbers assigned at that particular time.
So in summary, the web site owner can tell the police the IP address of the criminal. ICANN tells the police which ISP controls that address, and the ISP tells the police precisely which computer was using the address at the moment of the crime.
IP addresses are, therefore, very much like fingerprints on the internet.