Effective techniques for detecting and attributing cyber criminals