By KI MAE HEUSSNER
Digital Forensics Experts Follow Trail of Cyber Breadcrumbs to Identify Individuals
He has been called a bounty hunter for the digital era, and for good reason.
After Michael Roberts' own name was smeared across the Internet by an online antagonist, crushing his successful business and threatening personal relationships, Roberts made it his mission to help other victims of online defamation rout out the anonymous Internet trolls trying to upend their lives.
The Australian native launched a Las Vegas-based company called Rexxfield, dedicated to digital forensic analysis and online reputation defense. (Nevada was chosen as the home base because its state laws are more favorable for those suing for libel damages.)
Since starting the firm in 2008, Roberts said he has helped more than 150 people unmask their online attackers. His firm boasts an 80 to 90 percent success rate for positively identifying anonymous Internet posters. He recently launched the non-profit FreespeechV3.org, a pro bono arm of his company, to give victims of online defamation even more support.
By the time people contact him, they've been branded whores, child abusers, liars and other vicious epithets on the Internet. They're spirits are so deflated, some consider ending their lives, he said.
"You can hear it in the voice of the people when they first contact you," he said. "And once the problem is solved they're like a different person."
Roberts counts billionaires and royalty among his clientele and two of the most recent high-profile cases involving unmasking anonymous posters were ones in which he was involved.
A couple of weeks ago, one of his pro bono clients, Carla Franklin, succeeded in obtaining a court order from a New York judge instructing Google to identify people who posted defamatory content about her on YouTube.
Another pro bono client, Vogue cover model Liskula Cohen, made headlines last summer when she successfully sued Google to uncover the name of an anonymous blogger who slandered her online.
But how does this modern-day bounty hunter track down his prey?
Roberts said it often starts with the Internet Protocol (IP) address, which is the unique number assigned to any device connected to the Internet.