![]() They may have also determined that the WEP network wasn't coming from the property, but rather the WPA2. It wasn't 100%, but the purpose was merely to determine whether they should risk the search or not. That there was _some_ security, even of the "please keep out" sort, diminished the odds that they'd be going to the wrong house. The point is whether it was enough to merit and execute a search warrant. There's no excuse for anyone to be running WEP networks any more, but if people are, law enforcement should at least acknowledge how trivially easy it is to break a WEP network WEP "protected" networks really should be treated by everyone, and especially law enforcement, as unsecured. One used WEP encryption, the other had the more robust WPA2, but the key point from the FBI's perspective was that neither network was unsecured. Noted the existence of two WiFi networks reachable from the property. His photo and biography have already been removed from OSU's website. Until his arrest, he was Director of Training at the Oklahoma State University Center for Improvised Explosives Research and Training (OSU-IMPEX). CNN notes that he investigated both the Unabomber case and the Oklahoma City bombing. Sachtleben had a 25-year career with the FBI, mainly in explosives and forensics (watch video of him blowing up a car here). His case, currently proceeding in Indiana's Southern District, could result in a maximum 20 years of prison for distribution and another 10 for possession-along with a $250,000 fine. Sachtleben was arrested and charged both with possession and distribution. ![]() The FBI's own analysis of GigaTribe-the Bureau apparently keeps a database of files, usernames, and IP addresses traded through the service-found that Sachtleben's IP address had traded numerous files through the P2P network in addition to his e-mails. Sachtleben's wife told investigators at the scene that her husband generally used a laptop computer and that she knew nothing about any child porn. According to agents, onsite triage of his computers immediately revealed "approximately 30 image and video files containing child pornography," generally featuring kids under the age of 12. The FBI and the Indiana State Police then executed a warrant on the home on May 11, just minutes after Sachtleben returned home from the Indianapolis airport. Sachtleben, as defendant and as professor ![]() This IP address also resolved to the city of Roscoe, but now it pointed to a home on Summerwood Drive-less than a block away from the first home. Not until Decemdid a special agent working at a national operations unit get a new IP address for the target. So it was back to GigaTribe in search of another IP address for "pedodad36569." Investigators had trouble finding one, though. Investigators finally realized that the home had an open wireless router and that anyone in the nearby area could have been responsible. All computers at the residence were examined, but no child pornography was discovered. (Including any variant of "pedo" in your online user name no doubt invites this sort of extra attention from law enforcement, but people just keep doing it.)īut police found nothing-except, we imagine, one terrified homeowner. But before a search warrant could even be obtained, a separate law enforcement agency gave the same information to the Illinois Internet Crimes Against Children task force, which got a warrant and conducted a search. "Pedodad36569" had hundreds of child pornography images in his share folder, and he had a publicly viewable IP address that resolved to a home on Fig Tree Lane in Roscoe, Illinois. The case didn't look to be a difficult one. Case in point: an undercover FBI agent was using the GigaTribe P2P program back in September 2010 in order to observe the material being shared by “pedodad36569." Logging in to file-sharing networks has become a routine part of online child pornography investigations-so routine that multiple agencies sometimes target the same person without knowing it. How would-be pedophiles use Craigslist-and how they get caught.How a fake Justin Bieber "sextorted" hundreds of girls through Facebook.Prosecutors: "pedodave69" was former top FBI agent.Laptop theft leads to "sextortion"-and arrest of family friend. ![]() If arrested for child porn, don't e-mail threats to rape, kill a federal agent.Photo illustration by Aurich Lawson reader comments 72 Law enforcement v. ![]()
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |