> -----Original Message----- > From: dhibbelnat_private [mailto:dhibbelnat_private] > C: I have no clue as to what kind of " Computer Crime > Investigator certifiaction" he is referring to, but I will check. It sounds like he is referring to the certifications from the High Tech Crime Network (www.htcn.org) > D: Does any one have a clue about this porno stuff and its > veracity? In a later post my source wrote: > > "In the Computer Crimes class we were told of a real Florida > case (the Detective teaching was the arresting officer) where > the individual had encrypted his child porn files with an > encryption method that had no back door. I believe the author was referring to me... 1) I was the investigating/undercover agent (an FBI agent actually made the arrest) 2) During the course of undercover investigation in the mid-90's, I had evidence of an Orlando area individual receiving a large amount of child pornography (AOL forwarding chains from email). The individual was spending a lot of time in hardcore child pornography trading rooms on AOL posing as a 15 or 15 year old boy. 3) A federal search warrant on the individuals home recovered a Mac system with an external hard drive and a tape drive. The external hard drive was encrypted with a program (I don't recall what it was) that protected the entire contents of the drive. We were never able to decrypt the drive. There was no child porn found on the other hard drive(s) or diskettes. 4) The individual regularly backed up all of his hard drives to tape. The backup contents were encrypted (again, I don't remember what program he was using). Unfortunately for the individual, the backup software created a catalog of the tape contents; the catalog was not encrypted or password protected. The catalog for the external hard drive showed the names of countless child porn image files, their size, and their creation date (date downloaded). This information was correlated to the child porn files that we knew he had received via AOL email. With the corroboration of the data, he was indicted federally. He pleaded guilty and got a couple years in federal prison. He should be back on the 'net by now... Best Regards, Doug Rehman (Retired Fla. Dept. of Law Enforcement Special Agent) (Founding member of the FBI's Operation Innocent Images) Rehman Technology Services, Inc. Specializing in Computer Forensics and Technology Related Investigations License A-9800119 Mount Dora, Florida (Orlando Area) (352)357-0500 http://www.surveil.com President Florida Association of Computer Crime Investigators http://www.facci.org ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Mon Aug 27 2001 - 13:54:19 PDT