cyberharassment   2

How One Woman's Digital Life Was Weaponized Against Her | WIRED
"Cyber Civil Rights Legal Project" "“You can tell people, ‘Don’t do anything that you wouldn’t want to have go public,’ ” McDonald says. “But what kind of life is that?”"

"The lawyers called Andreas Kaltsounis, a cyberforensics expert who used to work with the FBI and the Department of Defense. He explained to the jury how Tor networks and IP addresses function. He then presented a map showing that many of the seemingly separate accounts from which the Allens had received anonymous harassment were actually linked by overlapping IP addresses. One of the linked accounts was the Facebook page for “Jennifer Jones,” the account that used a picture of a tortoise. It could have been, as Zonis argued, an account that Steven, or some unknown person, created. But the lawyers were prepared. One day, months before the trial, as Van Engelen searched painstakingly through IP addresses associated with logins on the Jones account, she made a discovery: Among the many addresses, there had been one apparent slipup, a login not through Tor but from the Zonises’ home IP address. When she found it Van Engelen ran into Bateman’s office, yelling: “We’ve got him!” It would have been unheard of for someone to fake a login using Zonis’ IP address, Kaltsounis told the jury, because of a safeguard called the three-way handshake that requires hosts to establish a connection with the IP address belonging to the account before any information can be sent."
online-harassment  cyberforensics  cyberharassment  Wired 
december 2017 by jschneider

related tags

amplify  article  cyberforensics  online-harassment  wired 

Copy this bookmark:



description:


tags: