Case Histories

Here are a few case histories. Please remember that each case presents its own unique set of circumstances and outcomes. These are here to help give you a sense of what investigative experiences may be common at this time. Names have been changed to protect the identity of our clients.

Cybercrime Investigations

There were many ways to handle this case but the direction was determined based on the interview with the client. Things we considered:
1. Does he have access to her computer or has had access recently?
2. Is the email a local DSL, I.e. version or other cable email account?
3. Is the email yahoo, Google or another internet type account?
4. Is the password she uses a common one that he may be aware of? Or could have guessed?
5. Is her computer acting different in the last few weeks?

Based on what this particular client revealed, the following is how we handled the case. The client wanted immediate determination if their computer and or email was being monitored somehow.

We gained access to the computer and after using several investigative tools found that there were no “screen capture” software or remote access software on the computer. In addition we scanned the computer for any known phishing viruses and determined that none were present. The computer was not a joint computer however the husband had access to it recently. The email account was an internet based account, was not shared by both but the password was common to both and one she had used for many different accounts. We immediately changed her email account information, security settings and the password to something unique with a higher security setting and authentication. Upon completion, the client felt her information was secure and was thrilled with the outcome. She came back to the agency for additional work related to her divorce.

Sexting Investigation

After further questioning, Kate told her mom that “John” turned out to be a jerk and that he was not interested in her and she was so upset. Kate asked her Mom if she was pretty and wanted to know if she thought she was fat. Mom saw this as an opportunity to really sit down and talk to Kate based on the last few weeks behavior. They talked about this boy named John and why Kate was feeling so bad about herself. Mom reassured Kate that she was a beautiful, bright young woman and was not overweight. Mom confronted Kate about her recent behavior in hiding the phone and being very secretive with it. Kate admitted to sending messages to John in attempts to win him over and that some of which were “personal” in nature and that John had sent them around to his friends, which really upset Kate. Out of concern, Mom asked to see Kate’s phone and Kate agreed. Mom immediately saw a picture, sexual in nature of Kate that looked like she had taken it of herself and several messages that were inappropriate. Kate and Mom were both afraid it would be posted to other social networking sites. Mom called our agency for help.

One of our investigators specially trained in both investigations and counseling matters was sent to Kate’s house. The investigator was able to quickly access the phone and performed forensics to uncover deleted text messages and also any pictures. The investigator found two photos of Kate that showed her partially dressed and determined only one of those pictures was sent to John. There were also several texts that were recovered indicating messages of a sexual nature. The investigator logged onto the social networking site to perform a review of what may have been posted on there by John. No photos were found on her site, John’s and any mutual friends. The investigator increased her security settings on the social networking sites and also her computer and phone. The investigator contacted John’s parents and explained to them the issue. They were asked to speak with John and to review his phone for the picture. John’s parents asked the investigator to come to their house and speak with john about the incident and to assist in reviewing John’s Phone. The parents felt they were not technically savvy to look into the matter on the phone thus asked us for assistance with our expertise. Upon review of John’s phone and messages it was determined that John did forward some texts messages from Kate to a few of his friends but did not forward the elicit photo. The photo was immediately removed from the phone permanently and the other friends John had forwarded the texts messages were called by John’s parents to request they be removed.

This is an example of the best case scenario relating to a typical “sexting” case with teenagers. If John would have posted the photo on a social networking site, it could have gone viral extremely fast and lead to a criminal investigation and also subject to a school disciplinary hearing. Both Kate and John, in addition to ANYONE having the photo on a digital media, i.e. cell phones, PDA’s, computers and tablets COULD have been prosecuted for possession of child pornography. The investigator was able to use his (or her?)skills and knowledge as a school counselor and also an investigator to recognize the issues behind the actual incident to effectively gather the evidence and also council and direct the parents on what the law and policy is regarding this matter.

RESOURCES