RE: How to be a Computer Crime Investigator

From: D. Douglas Rehman (rehmanat_private)
Date: Mon Aug 27 2001 - 13:23:36 PDT

  • Next message: Ryan Russell: "RE: How to be a Computer Crime Investigator"

    > -----Original Message-----
    > From: dhibbelnat_private [mailto:dhibbelnat_private] 
    
    > C: I have no clue as to what kind of " Computer Crime 
    > Investigator certifiaction" he is referring to, but I will check.
    
    It sounds like he is referring to the certifications from the High Tech
    Crime Network (www.htcn.org)
    
    
    > D: Does any one have a clue about this porno stuff and its 
    > veracity? In a later post my source wrote:
    > 
    >  "In the Computer Crimes class we were told of a real Florida 
    > case (the Detective teaching was the arresting officer) where 
    > the individual had encrypted his child porn files with an 
    > encryption method that had no back door.  
    
    I believe the author was referring to me...
    
    1) I was the investigating/undercover agent (an FBI agent actually made
    the arrest)
    
    2) During the course of undercover investigation in the mid-90's, I had
    evidence of an Orlando area individual receiving a large amount of child
    pornography (AOL forwarding chains from email). The individual was
    spending a lot of time in hardcore child pornography trading rooms on
    AOL posing as a 15 or 15 year old boy.
    
    3) A federal search warrant on the individuals home recovered a Mac
    system with an external hard drive and a tape drive. The external hard
    drive was encrypted with a program (I don't recall what it was) that
    protected the entire contents of the drive. We were never able to
    decrypt the drive. There was no child porn found on the other hard
    drive(s) or diskettes.
    
    4) The individual regularly backed up all of his hard drives to tape.
    The backup contents were encrypted (again, I don't remember what program
    he was using). Unfortunately for the individual, the backup software
    created a catalog of the tape contents; the catalog was not encrypted or
    password protected. The catalog for the external hard drive showed the
    names of countless child porn image files, their size, and their
    creation date (date downloaded). This information was correlated to the
    child porn files that we knew he had received via AOL email.
    
    With the corroboration of the data, he was indicted federally. He
    pleaded guilty and got a couple years in federal prison. He should be
    back on the 'net by now...
    
    Best Regards,
    
    Doug Rehman
    (Retired Fla. Dept. of Law Enforcement Special Agent)
    (Founding member of the FBI's Operation Innocent Images)
    
    Rehman Technology Services, Inc.
    Specializing in Computer Forensics and Technology Related Investigations
    License A-9800119
    Mount Dora, Florida (Orlando Area)
    (352)357-0500
    http://www.surveil.com 
    
    President
    Florida Association of Computer Crime Investigators
    http://www.facci.org
    
    
    -----------------------------------------------------------------
    This list is provided by the SecurityFocus ARIS analyzer service.
    For more information on this free incident handling, management 
    and tracking system please see: http://aris.securityfocus.com
    



    This archive was generated by hypermail 2b30 : Mon Aug 27 2001 - 13:54:19 PDT