1102 users online (187 members and 915 guests)  


Websleuths News


Page 4 of 97 FirstFirst ... 2 3 4 5 6 14 54 ... LastLast
Results 46 to 60 of 1453
  1. #46
    Quote Originally Posted by technicalconfusion View Post
    I'm not in the business of writing viruses, but for someone who wants to pretend that they're emailing from address A, it is easily done. A virus writer makes it difficult, but he will use the addresses in your address book and use them as the from: if he doesn't use yours. He might use your machine as well.
    He may use a zombie machine. His virus may be written in a very complicated manner, it may not be. I've looked at hacks installed on websites that were so easy, that I probably could have written them, and I'm not a programmer.

    All a spammer does is use proxies, usually located overseas. The from address is any old address, whether they've harvested the email from websites, bought a list, or whatever. So if you look at the headers of a spam email you've received, you can trace the ip addresses and find out it's not from who it says it is.

    It is very easy.

    I do it at christmas time to make my son think he got a letter from santa

    Hey TC - had to comment that I love the Letter From Santa idea!

  2. #47
    Join Date
    Jul 2006
    Location
    LI, NY
    Posts
    3,268
    Quote Originally Posted by technicalconfusion View Post
    Aol users have an ip address that starts with 172. An ip address lookup will show the company address of aol out of Va.
    Just to clarify...

    172. is only ONE of the aol ip's.... they have quite a few & there is only more than one central location, not just the one based in VA.

    That said.... even though on the user's end you can't tell one aol ip from another, AOL can check their own records to see who was assigned the actual & complete ip assigned to each specific user.

    The fact is.... the average user is NOT anonymous on the internet... is easily traceable if LE gets involved.

  3. #48
    Join Date
    Aug 2008
    Location
    Orlando, FL
    Posts
    308
    Quote Originally Posted by RoseRed View Post
    Not that easy to do. How do you suppose a virus creator is traced back to the originator by FBI if it so easy? The virus creator tries to spoof his address but they are traced back and found.
    Sorry, but I have to throw my two cents in here. This forum caught my eye since I am studying digital forensics. Basically, I wanted to say that sometimes it is easy to trace a virus back to the origin but most the time it is not. You typically have a scale of mal-ware creators out there. This scale ranges from newbies to experts. Now, if it is a newbie, then it will be a piece of cake because they will probably forget to hide headers. Usually, these are kids and they might create something that infects a computer, but doesn't do much else. On the other hand, you can have a pro that will basically bring down the house, and they may not ever get caught. The FBI catches people who are careless. A hacker will think that what they have done is so funny that they need to boast about their work. That is when they get caught. People turn them into the authorities. Granted, there are ways to trace it back to origin (if there wasn't, I would be out of a job), but it is not always so easy.

    As far as Casey's computer networking skills, there should be some incriminating finds if she did anything. This girl was posting on Myspace and Facebook like nothing happened. If she knew anything about computer forensics, then she would have stayed away from the computer or destroyed the harddrive; that is, if she searched for anything that is telling about the case. However, if she has other parties involved (ie JP), then there might not be much info there. I did some research on JP (Ricardo M's roommate). Apparently, he is a computer science major at UCF. I believe it said that he was in his last year. Just so you know, I also attend this school, and used to major in CS and am full aware that you have to know your stuff to get through that program. UCF offers a very intensive Computer Science program, and most students will fail out or drop out before their junior year. Not to say that kid is actually involved with Caylee's disappearance, but if he is, then he probably guided her in what to do on a computer while her child is missing. All in all, I am more curious as to what is on TonE's computer (my guess is that it is probably a Mac since he goes to Full Sail). She was spending her days there while Caylee was missing, and he was allowing her to use his computer...

  4. #49
    Join Date
    Aug 2008
    Posts
    10,875
    Quote Originally Posted by Thinking_Out_Loud View Post
    All in all, I am more curious as to what is on TonE's computer (my guess is that it is probably a Mac since he goes to Full Sail). She was spending her days there while Caylee was missing, and he was allowing her to use his computer...
    Good point. I wonder if LE subpoenaed his computer. Anyone know?

    As for JP, it might seem to be a leap in logic to think she'd ask for help destroying her own back-trail, or that he would provide it without asking a lot of questions. I don't know of many computer professionals who would not question WHY they'd been asked for assistance like that by an average 22 y/o end user who seems to use the net for social aspects more than anything else.

  5. #50
    Join Date
    Aug 2008
    Location
    Azeroth
    Posts
    2,057

    Talking

    Quote Originally Posted by Chezhire View Post
    Hey TC - had to comment that I love the Letter From Santa idea!
    Oh it's effective! Especially when they're young and don't know any better and you need to get them into bed so you can wrap presents. A well timed email from Santa saying I see you, better go to bed can work wonders!
    Faxing death threats to a location near you!

  6. #51
    Join Date
    Feb 2005
    Posts
    1,860
    Regarding Facebook - apparently Casey Anthony posted this message to a Facebook member named Troy. Not sure but it seems to me this date and time is close to the date and time Casey went to her parents and the gas cans were discovered by George Anthony in the back of the car trunk. Anybody know exactly when George said Casey came over and he found the gas cans in the car's trunk? IIRC, it was about 2:25 pm on June 24th, the same day he reported them stolen. I'd be curious to know what computer Casey used to post this message which is something LE and her attorney would be able to determine by subpoena to Facebook. Did she post from the home computer or somewhere else?

    To Troy on Facebook
    Casey Anthony (Orlando, FL) wrote
    at 2:40 pm on June 24th, 2008
    she still has yet to move into the house. hell, in the past 9 days, i haven't even been living at the house. DRAMMMMMA. i'll fill ya in later on. miss ya, yo.

  7. #52
    Join Date
    Aug 2008
    Posts
    2,112
    Quote Originally Posted by Thinking_Out_Loud View Post
    Sorry, but I have to throw my two cents in here. This forum caught my eye since I am studying digital forensics. Basically, I wanted to say that sometimes it is easy to trace a virus back to the origin but most the time it is not. You typically have a scale of mal-ware creators out there. This scale ranges from newbies to experts. Now, if it is a newbie, then it will be a piece of cake because they will probably forget to hide headers. Usually, these are kids and they might create something that infects a computer, but doesn't do much else. On the other hand, you can have a pro that will basically bring down the house, and they may not ever get caught. The FBI catches people who are careless. A hacker will think that what they have done is so funny that they need to boast about their work. That is when they get caught. People turn them into the authorities. Granted, there are ways to trace it back to origin (if there wasn't, I would be out of a job), but it is not always so easy.

    As far as Casey's computer networking skills, there should be some incriminating finds if she did anything. This girl was posting on Myspace and Facebook like nothing happened. If she knew anything about computer forensics, then she would have stayed away from the computer or destroyed the harddrive; that is, if she searched for anything that is telling about the case. However, if she has other parties involved (ie JP), then there might not be much info there. I did some research on JP (Ricardo M's roommate). Apparently, he is a computer science major at UCF. I believe it said that he was in his last year. Just so you know, I also attend this school, and used to major in CS and am full aware that you have to know your stuff to get through that program. UCF offers a very intensive Computer Science program, and most students will fail out or drop out before their junior year. Not to say that kid is actually involved with Caylee's disappearance, but if he is, then he probably guided her in what to do on a computer while her child is missing. All in all, I am more curious as to what is on TonE's computer (my guess is that it is probably a Mac since he goes to Full Sail). She was spending her days there while Caylee was missing, and he was allowing her to use his computer...

    WOW ... Now this was about the most interesting post on this site, that I have read so far.. Thank you for all the information. Great Job..

  8. #53
    Join Date
    Feb 2005
    Posts
    1,860
    In Summary - (not verbatim)

    On July 16, 2008 George Anthony gave LE a laptop used by Casey. LE then obtained a search warrant on the laptop to see if anything could be found on it to help them find Caylee Anthony. A picture was found of Caylee with an elderly gentleman dated June 15, 2008. On July 21, LE showed this picture to George and Cindy Anthony who at first weren't sure of the accuracy of the date but being that it was Father's Day it could be.

    On July 29, 2008 Lee Anthony provided LE with a copy of a forwarded email to Casey from a "Thomas Franck" about an upcoming Universal event and what time to appear at said event. Upon further investigation and contact with Universal, it was determined no one by the name of Thomas Franck apparently worked for Universal and in fact, their Server Technology Dept. had never heard of @events.universal.com as one of their email addresses.

    See Search Warrant 08 07 08
    http://www.ocso.com/Default.aspx?tabid=547

    DT

    Edited to add: Still no mention of the DATE on the invalid email but I suspect it won't be long before we learn more about this particular email including whether LE was able to determine who might have actually created and sent it.

  9. #54
    Join Date
    Aug 2008
    Posts
    149

    Computer forensics

    Please post things here regarding the computer forensics.
    Were there any revelations regarding these in the documents released?
    We know the young cop lost his job because they found his communication with Casey on there. What else might be on there? You KNOW when someone lives their life online like Casey does, they wouldn't be able to help 'googling' whatever is on their mind. I wonder what else was up on that computer? Was she searching anything regarding getting out of the country? Or about drugs being found in systems, or about "accidental" deaths or about hiding evidence?
    I didn't really see anything in the docs that related to the forensic computer stuff, just the downloaded pictures from the camera and the fake email stuff.

    Interesting.

  10. #55
    Join Date
    Jul 2004
    Location
    Dana Point,CA
    Posts
    52,752
    HI nobody. I am going to ask the mods to merge with the existing thread on this topic. Thanks for reposting the idea

    http://www.websleuths.com/forums/sho...light=computer


  11. #56
    Join Date
    Aug 2008
    Posts
    149
    Quote Originally Posted by JBean View Post
    HI nobody. I am going to ask the mods to merge with the existing thread on this topic. Thanks for reposting the idea

    http://www.websleuths.com/forums/sho...light=computer
    Thanks, didn't realize we had a thread for this already.

    SO, for the optimists in the group, the computer forensics SHOULD probably solve once and for all the issues of whether the child was kidnapped. If she was, or if Casey gave her to someone, I imagine she would be doing research online about it. As "sloppy" as she appeared to be with much of her coverup, I seriously doubt that she would understand that "deleted" computer info can generally be retrieved.

  12. #57
    Join Date
    Feb 2005
    Posts
    1,860
    In the docs, it's revealed Cindy Anthony gave LE her Compaq laptop and that this laptop was being analyzed.

    DT


    “Do you not know that there comes a midnight hour when every one has to throw off his mask? Do you believe that life will always let itself be mocked? Do you think you can slip away a little before midnight in order to avoid this? Or are you not terrified by it?" - Soren Kierkegaard

  13. #58
    Join Date
    Aug 2008
    Posts
    3,873
    Thought the post fit here as well as anywhere.

    There are some key items from the computer forensic report that was released w/ the 600pgs that still don't appear on the WS calendar (e.g. IIRC, 6/17 download of pics from 6/15, 7/2 draft of "Diary of Days", etc.).

    I just thought I'd throw it out there if anyone want to plow some time into it.

  14. #59
    Join Date
    Aug 2008
    Posts
    5,492
    Quote Originally Posted by imnotheonlyone View Post
    There are many email anonymizers out there on the net - anyone can send someone an email anonymously by funneling it though the anonymizer ... the send can make it look like the email came from any given name/company, etc. that they choose...
    I believe Casey sent those to herself thorough an anonymizer and put in the name she wanted so she could "show" her mother something from work which said she needed to be out that night and CA would keep Caylee for her.

  15. #60
    Join Date
    Sep 2008
    Location
    Bunbury
    Posts
    977
    Hi, all!

    I skimed the first page and the last. It does seem that much of this info/questioning has been covered before. Ie, the faked message from Universal, etc. I think it is covered in the discussion of the first doct drop (400 pp).

    While related, I do not think it is appropriate to discuss sim cards here. That goes into another thread, with the ping people, perhaps.

    Let's discuss what we have about searches on the computer HD: ZFG, chloroform, missing children, "escort" sites, facebook/photobucket.

    Thanks....waiting to hear from you all... : )

Page 4 of 97 FirstFirst ... 2 3 4 5 6 14 54 ... LastLast


Similar Threads

  1. Sandra [Cawn] Osborne testimony (computer forensics)
    By Chiquita71 in forum Witness Testimonies and Closing Arguments
    Replies: 21
    Last Post: 07-01-2011, 04:35 PM
  2. Kevin Stenger testimony (Superviser, OCSO computer forensics)
    By wenwe4 in forum Witness Testimonies and Closing Arguments
    Replies: 10
    Last Post: 07-01-2011, 04:12 PM
  3. Computer Forensics Discussion
    By Kimster in forum General Information & Discussion
    Replies: 0
    Last Post: 01-24-2011, 02:06 AM
  4. Terri's Computer forensics
    By SurfieTX in forum Kyron Horman
    Replies: 81
    Last Post: 08-01-2010, 02:54 AM
  5. Ricardo's Computer Forensics
    By Woe.be.gone in forum Caylee Anthony 2 years old
    Replies: 57
    Last Post: 03-27-2010, 07:11 PM

Tags for this Thread