Anthony's Computer Forensics

It is extremely easy to spoof an email. Extremely easy. Right from your own mail program.

Not that easy to do. How do you suppose a virus creator is traced back to the originator by FBI if it so easy? The virus creator tries to spoof his address but they are traced back and found.
 
Not that easy to do. How do you suppose a virus creator is traced back to the originator by FBI if it so easy? The virus creator tries to spoof his address but they are traced back and found.

I'm not in the business of writing viruses, but for someone who wants to pretend that they're emailing from address A, it is easily done. A virus writer makes it difficult, but he will use the addresses in your address book and use them as the from: if he doesn't use yours. He might use your machine as well.
He may use a zombie machine. His virus may be written in a very complicated manner, it may not be. I've looked at hacks installed on websites that were so easy, that I probably could have written them, and I'm not a programmer.

All a spammer does is use proxies, usually located overseas. The from address is any old address, whether they've harvested the email from websites, bought a list, or whatever. So if you look at the headers of a spam email you've received, you can trace the ip addresses and find out it's not from who it says it is.

It is very easy.

I do it at christmas time to make my son think he got a letter from santa:)
 
Not that easy to do. How do you suppose a virus creator is traced back to the originator by FBI if it so easy? The virus creator tries to spoof his address but they are traced back and found.

I agree that it is NEXT to impossible today to do almost anything anonymously on any computer. However, I recently read of a case where the FBI COULD NOT break the encryption on a highly dangerous man's computer who had no formal education..scary..
 
I'm not in the business of writing viruses, but for someone who wants to pretend that they're emailing from address A, it is easily done. A virus writer makes it difficult, but he will use the addresses in your address book and use them as the from: if he doesn't use yours. He might use your machine as well.
He may use a zombie machine. His virus may be written in a very complicated manner, it may not be. I've looked at hacks installed on websites that were so easy, that I probably could have written them, and I'm not a programmer.

All a spammer does is use proxies, usually located overseas. The from address is any old address, whether they've harvested the email from websites, bought a list, or whatever. So if you look at the headers of a spam email you've received, you can trace the ip addresses and find out it's not from who it says it is.

It is very easy.

I do it at christmas time to make my son think he got a letter from santa:)


Hey TC - had to comment that I love the Letter From Santa idea!
:crazy:
 
Aol users have an ip address that starts with 172. An ip address lookup will show the company address of aol out of Va.

Just to clarify...

172. is only ONE of the aol ip's.... they have quite a few & there is only more than one central location, not just the one based in VA.

That said.... even though on the user's end you can't tell one aol ip from another, AOL can check their own records to see who was assigned the actual & complete ip assigned to each specific user.

The fact is.... the average user is NOT anonymous on the internet... is easily traceable if LE gets involved.
 
Not that easy to do. How do you suppose a virus creator is traced back to the originator by FBI if it so easy? The virus creator tries to spoof his address but they are traced back and found.

Sorry, but I have to throw my two cents in here. This forum caught my eye since I am studying digital forensics. Basically, I wanted to say that sometimes it is easy to trace a virus back to the origin but most the time it is not. You typically have a scale of mal-ware creators out there. This scale ranges from newbies to experts. Now, if it is a newbie, then it will be a piece of cake because they will probably forget to hide headers. Usually, these are kids and they might create something that infects a computer, but doesn't do much else. On the other hand, you can have a pro that will basically bring down the house, and they may not ever get caught. The FBI catches people who are careless. A hacker will think that what they have done is so funny that they need to boast about their work. That is when they get caught. People turn them into the authorities. Granted, there are ways to trace it back to origin (if there wasn't, I would be out of a job), but it is not always so easy.

As far as Casey's computer networking skills, there should be some incriminating finds if she did anything. This girl was posting on Myspace and Facebook like nothing happened. If she knew anything about computer forensics, then she would have stayed away from the computer or destroyed the harddrive; that is, if she searched for anything that is telling about the case. However, if she has other parties involved (ie JP), then there might not be much info there. I did some research on JP (Ricardo M's roommate). Apparently, he is a computer science major at UCF. I believe it said that he was in his last year. Just so you know, I also attend this school, and used to major in CS and am full aware that you have to know your stuff to get through that program. UCF offers a very intensive Computer Science program, and most students will fail out or drop out before their junior year. Not to say that kid is actually involved with Caylee's disappearance, but if he is, then he probably guided her in what to do on a computer while her child is missing. All in all, I am more curious as to what is on TonE's computer (my guess is that it is probably a Mac since he goes to Full Sail). She was spending her days there while Caylee was missing, and he was allowing her to use his computer...
 
All in all, I am more curious as to what is on TonE's computer (my guess is that it is probably a Mac since he goes to Full Sail). She was spending her days there while Caylee was missing, and he was allowing her to use his computer...

Good point. I wonder if LE subpoenaed his computer. Anyone know?

As for JP, it might seem to be a leap in logic to think she'd ask for help destroying her own back-trail, or that he would provide it without asking a lot of questions. I don't know of many computer professionals who would not question WHY they'd been asked for assistance like that by an average 22 y/o end user who seems to use the net for social aspects more than anything else.
 
Hey TC - had to comment that I love the Letter From Santa idea!
:crazy:

Oh it's effective! Especially when they're young and don't know any better and you need to get them into bed so you can wrap presents. A well timed email from Santa saying I see you, better go to bed can work wonders!
 
Regarding Facebook - apparently Casey Anthony posted this message to a Facebook member named Troy. Not sure but it seems to me this date and time is close to the date and time Casey went to her parents and the gas cans were discovered by George Anthony in the back of the car trunk. Anybody know exactly when George said Casey came over and he found the gas cans in the car's trunk? IIRC, it was about 2:25 pm on June 24th, the same day he reported them stolen. I'd be curious to know what computer Casey used to post this message which is something LE and her attorney would be able to determine by subpoena to Facebook. Did she post from the home computer or somewhere else?

To Troy on Facebook
Casey Anthony (Orlando, FL) wrote
at 2:40 pm on June 24th, 2008
she still has yet to move into the house. hell, in the past 9 days, i haven't even been living at the house. DRAMMMMMA. i'll fill ya in later on. miss ya, yo.
 
Sorry, but I have to throw my two cents in here. This forum caught my eye since I am studying digital forensics. Basically, I wanted to say that sometimes it is easy to trace a virus back to the origin but most the time it is not. You typically have a scale of mal-ware creators out there. This scale ranges from newbies to experts. Now, if it is a newbie, then it will be a piece of cake because they will probably forget to hide headers. Usually, these are kids and they might create something that infects a computer, but doesn't do much else. On the other hand, you can have a pro that will basically bring down the house, and they may not ever get caught. The FBI catches people who are careless. A hacker will think that what they have done is so funny that they need to boast about their work. That is when they get caught. People turn them into the authorities. Granted, there are ways to trace it back to origin (if there wasn't, I would be out of a job), but it is not always so easy.

As far as Casey's computer networking skills, there should be some incriminating finds if she did anything. This girl was posting on Myspace and Facebook like nothing happened. If she knew anything about computer forensics, then she would have stayed away from the computer or destroyed the harddrive; that is, if she searched for anything that is telling about the case. However, if she has other parties involved (ie JP), then there might not be much info there. I did some research on JP (Ricardo M's roommate). Apparently, he is a computer science major at UCF. I believe it said that he was in his last year. Just so you know, I also attend this school, and used to major in CS and am full aware that you have to know your stuff to get through that program. UCF offers a very intensive Computer Science program, and most students will fail out or drop out before their junior year. Not to say that kid is actually involved with Caylee's disappearance, but if he is, then he probably guided her in what to do on a computer while her child is missing. All in all, I am more curious as to what is on TonE's computer (my guess is that it is probably a Mac since he goes to Full Sail). She was spending her days there while Caylee was missing, and he was allowing her to use his computer...


WOW ... Now this was about the most interesting post on this site, that I have read so far.. Thank you for all the information. Great Job..
 
In Summary - (not verbatim)

On July 16, 2008 George Anthony gave LE a laptop used by Casey. LE then obtained a search warrant on the laptop to see if anything could be found on it to help them find Caylee Anthony. A picture was found of Caylee with an elderly gentleman dated June 15, 2008. On July 21, LE showed this picture to George and Cindy Anthony who at first weren't sure of the accuracy of the date but being that it was Father's Day it could be.

On July 29, 2008 Lee Anthony provided LE with a copy of a forwarded email to Casey from a "Thomas Franck" about an upcoming Universal event and what time to appear at said event. Upon further investigation and contact with Universal, it was determined no one by the name of Thomas Franck apparently worked for Universal and in fact, their Server Technology Dept. had never heard of @events.universal.com as one of their email addresses.

See Search Warrant 08 07 08
http://www.ocso.com/Default.aspx?tabid=547

DT

Edited to add: Still no mention of the DATE on the invalid email but I suspect it won't be long before we learn more about this particular email including whether LE was able to determine who might have actually created and sent it.
 
Please post things here regarding the computer forensics.
Were there any revelations regarding these in the documents released?
We know the young cop lost his job because they found his communication with Casey on there. What else might be on there? You KNOW when someone lives their life online like Casey does, they wouldn't be able to help 'googling' whatever is on their mind. I wonder what else was up on that computer? Was she searching anything regarding getting out of the country? Or about drugs being found in systems, or about "accidental" deaths or about hiding evidence?
I didn't really see anything in the docs that related to the forensic computer stuff, just the downloaded pictures from the camera and the fake email stuff.

Interesting.
 
HI nobody. I am going to ask the mods to merge with the existing thread on this topic. Thanks for reposting the idea :)

http://www.websleuths.com/forums/showthread.php?t=69288&highlight=computer

Thanks, didn't realize we had a thread for this already.

SO, for the optimists in the group, the computer forensics SHOULD probably solve once and for all the issues of whether the child was kidnapped. If she was, or if Casey gave her to someone, I imagine she would be doing research online about it. As "sloppy" as she appeared to be with much of her coverup, I seriously doubt that she would understand that "deleted" computer info can generally be retrieved.
 
In the docs, it's revealed Cindy Anthony gave LE her Compaq laptop and that this laptop was being analyzed.

DT
 
Thought the post fit here as well as anywhere.

There are some key items from the computer forensic report that was released w/ the 600pgs that still don't appear on the WS calendar (e.g. IIRC, 6/17 download of pics from 6/15, 7/2 draft of "Diary of Days", etc.).

I just thought I'd throw it out there if anyone want to plow some time into it.
 
There are many email anonymizers out there on the net - anyone can send someone an email anonymously by funneling it though the anonymizer ... the send can make it look like the email came from any given name/company, etc. that they choose...

I believe Casey sent those to herself thorough an anonymizer and put in the name she wanted so she could "show" her mother something from work which said she needed to be out that night and CA would keep Caylee for her.
 
Hi, all!

I skimed the first page and the last. It does seem that much of this info/questioning has been covered before. Ie, the faked message from Universal, etc. I think it is covered in the discussion of the first doct drop (400 pp).

While related, I do not think it is appropriate to discuss sim cards here. That goes into another thread, with the ping people, perhaps.

Let's discuss what we have about searches on the computer HD: ZFG, chloroform, missing children, "escort" sites, facebook/photobucket.

Thanks....waiting to hear from you all... : )
 

Members online

Online statistics

Members online
154
Guests online
3,818
Total visitors
3,972

Forum statistics

Threads
591,684
Messages
17,957,448
Members
228,586
Latest member
chingona361
Back
Top