Navigation
Recherche
|
Feds Bust Alaska Man With 10,000+ CSAM Images Despite His Many Encrypted Apps
vendredi 30 août 2024, 05:30 , par Slashdot
A recent indictment (PDF) of an Alaska man stands out due to the sophisticated use of multiple encrypted communication tools, privacy-focused apps, and dark web technology. 'I've never seen anyone who, when arrested, had three Samsung Galaxy phones filled with 'tens of thousands of videos and images' depicting CSAM, all of it hidden behind a secrecy-focused, password-protected app called 'Calculator Photo Vault,'' writes Ars Technica's Nate Anderson. 'Nor have I seen anyone arrested for CSAM having used all of the following: [Potato Chat, Enigma, nandbox, Telegram, TOR, Mega NZ, and web-based generative AI tools/chatbots].' An anonymous reader shares the report: According to the government, Seth Herrera not only used all of these tools to store and download CSAM, but he also created his own -- and in two disturbing varieties. First, he allegedly recorded nude minor children himself and later 'zoomed in on and enhanced those images using AI-powered technology.' Secondly, he took this imagery he had created and then 'turned to AI chatbots to ensure these minor victims would be depicted as if they had engaged in the type of sexual contact he wanted to see.' In other words, he created fake AI CSAM -- but using imagery of real kids.
The material was allegedly stored behind password protection on his phone(s) but also on Mega and on Telegram, where Herrera is said to have 'created his own public Telegram group to store his CSAM.' He also joined 'multiple CSAM-related Enigma groups' and frequented dark websites with taglines like 'The Only Child Porn Site you need!' Despite all the precautions, Herrera's home was searched and his phones were seized by Homeland Security Investigations; he was eventually arrested on August 23. In a court filing that day, a government attorney noted that Herrera 'was arrested this morning with another smartphone -- the same make and model as one of his previously seized devices.' The government is cagey about how, exactly, this criminal activity was unearthed, noting only that Herrera 'tried to access a link containing apparent CSAM.' Presumably, this 'apparent' CSAM was a government honeypot file or web-based redirect that logged the IP address and any other relevant information of anyone who clicked on it. In the end, given that fatal click, none of the 'I'll hide it behind an encrypted app that looks like a calculator!' technical sophistication accomplished much. Forensic reviews of Herrera's three phones now form the primary basis for the charges against him, and Herrera himself allegedly 'admitted to seeing CSAM online for the past year and a half' in an interview with the feds. Read more of this story at Slashdot.
https://it.slashdot.org/story/24/08/29/2320223/feds-bust-alaska-man-with-10000-csam-images-despite-h...
Voir aussi |
56 sources (32 en français)
Date Actuelle
dim. 22 déc. - 13:10 CET
|