I seriously doubt its the right guy... Hackers have two methods that I know of for not being detected.
1) Use Tor which is a massive network of proxies and if you get a hack coming from a tor user, YOU WILL NOT CATCH HIM.... Tor's downside is its slow, but I am not joking when I say the people using tor are right next to untraceable.
2) Use a victim computer which you've installed a trojan or a rootkit on to perform the hack for you.
Im guessing our friend in the US is probably number 2 as they frequently get arrested for things they didn't commit.







