The U.S.
Federal Bureau of Investigation and the
Royal Canadian Mounted Police first noticed Calce when he started claiming in
IRC chatrooms that he was responsible for the attacks. He became the chief suspect when he claimed to have brought down Dell's website, an attack that had not been publicized at that time. Information on the source of the attacks was initially discovered and reported to the press by Michael Lyle, chief technology officer of
Recourse Technologies. Australian News Anchor Sandra Sully reported that it was apparently an Australian coder that initiated the sting performed in the IRC channel. Unreported using the nickname Ocker. Calce initially denied responsibility but later pleaded guilty to over 50 charges brought against him. His lawyer insisted the child had only run unsupervised tests to help design an improved
firewall, whereas trial records indicated the youth showed no remorse and had expressed a desire to move to
Italy for its lax
computer crime laws. The Montreal Youth Court sentenced him on September 12, 2001 to eight months of "open custody," one year of probation, restricted use of the Internet, and a small fine. Matthew Kovar, a senior analyst at the market research firm
Yankee Group, generated some publicity when he told reporters the attacks caused US$1.2 billion in global economic damages. Media outlets would later attribute a then-1.45:1 conversion value of 1.7 billion
CAD to the
Royal Canadian Mounted Police. Computer security experts now often cite the larger figure (sometimes incorrectly declaring it in U.S. dollars), but a published report says the trial prosecutor gave the court a figure of roughly $7.5 million. ==Significance==