Originally Posted By: frog51
but I'd rather have them all doing interesting things rather than helping agencies with nonsense like botnet closedowns, relay shutdowns and cutting off malware and warez storage.

I was amazed at how quickly systems can be taken over after seeing it first hand. I was helping to set up a new ISP in the early months of 1999, and was working on a new server running some Linux distribution. I completed the base install pretty late on a Friday, and decided to call it a day. I forgot I had it directly connected to the T1 connection, and by Monday the box had been taken over, and the FBI was calling me. I worked with them to pull log files off, and sure enough, the initial intrusion happened only a few hours after I had left. Whoever did it didn't cover their tracks well, and was using the box to then attack some college system on the east coast.