Creating an Internet Alibi ...

A term often used in crime novels and in the movies, an alibi is a claim; which may be evidence or a witness testimony that an accused individual was elsewhere when a criminal act took place.
We have all experienced classics like … “It wasn’t me guv, I was down the pub with the lads when it ‘appened. You can ask ‘em.”
The challenge for any investigation is proving that a suspect was at the scene of the crime. Beyond doubt, where an alibi, either valid or false serves to create reasonable doubt and may alter the outcome of an investigation.
What about technological alibis? Forensic Science has moved on a couple of steps over the last ten years. While we cannot expect the CSI experience of the geek hacker guru finding the answer in a few short keystrokes. Digital Forensic experts will systematically explore all manner of systems for evidence.
Your computer and smart phone often gives more away about you than you are aware. Therefore criminals are becoming equally savvy in creating false trails, diverting the course of critical investigations.

Stop and think … what if you could create a false alibi, creating an impression you are one place when you are in fact elsewhere. This is no alias nor nom de plume, using an existing identity you convince the virtual world of social media that you are where you want them to believe.

This presents an interesting idea, what could this deception be used for?

Apps exist to create false GPS readings. Twitter no longer publicises what application presents the update. There are many pre-tweeting applications out there. Other factors could also be tampered with. As an established pre-tweeter, some souls (even the technical) are fooled into thinking that I am personally posting some updates in real time. Life is too short for that many.

For those of you more technically inclined, I am aware that social media entities like twitter will still record IP address, api key for app, authorisation credentials etc. But as many law enforcement souls know it is not always easy to get the information needed as the system is stored in another jurisdiction

Worse, there are libraries for many programming languages that use the API’s of these social media platforms. If you were determined you could easily obfuscate any trail.

But let us face it the average soul is unlikely to go to these lengths. But, there are free tools that could give the committed individual the opportunity along with the means irrespective of their motive.

However, it isn’t going to stop me from exploring.

Comments

Post a Comment

Popular posts from this blog

If airlines offer in-flight Wi-Fi, they should invest in an extra black box for security ...

Wikipedia editors never walk alone: Hillsborough changes can be traced ... from @ConversationUK

Highlights and lowlights of 2014, a golden year for cybercrime from @ConversationUK