Tech Forensics, computers cel phones, texts,

A refresher on pen registers and trap and trace devices, [ame="http://en.wikipedia.org/wiki/Trap_and_trace_device"]from this article at Wikipedia[/ame]:

"From Wikipedia, the free encyclopedia

A trap and trace device is an electronic device used to record and trace all communication signals from a telecommunication system. An analogous feature available (usually at an additional charge) for use by the general public would be Caller ID.

Title 18 of the United States Code defines a trap and trace device as follows:

The term “trap and trace device” means a device or process which captures the incoming electronic or other impulses which identify the originating number or other dialing, routing, addressing, and signaling information reasonably likely to identify the source of a wire or electronic communication, provided, however, that such information shall not include the contents of any communication [1]

A trap and trace device is similar to a pen register. A trap and trace device would show what numbers had called a specific telephone, i.e. all incoming phone numbers. A pen register rather would show what numbers a phone had called, i.e. all outgoing phone numbers. The two terms are often used in concert, especially in the context of Internet communications. They are often jointly referred to as "Pen Register or Trap and Trace devices," to reflect the fact that the same program will probably do both functions in the modern era, and the distinction is not that important. The term 'pen register' is often used to describe both pen registers and trap and trace devices."
 
I am really chomping at the bit to discover what was gleaned from these search warrants.

Have they been able to establish if EB was in contact with AY as they suspected? If so how often, duration of calls, were there texts? If so what do they consist of?

Same questions regarding T"S"Y. The search warrants mention a sexual and drug relationship has been learned of. Wonder if that means LE had actual evidence of such relationships at the time they requested the warrants or if they were requesting the warrants based off of the tip they received about the cousins and the rape allegations?

Also very interest to learn the dates of communications regarding the mattress exchange with AF. I think all of the above will play a huge role in helping nail down timeframe of both death and disposal.
 
http://www.wsoctv.com/download/2011/0104/26368824.pdf

starts page 23. Affidavit states this number was dialed by both EB and AB on their respectives cells

..why would they single out this particular one number?----i would think that EB and AB had at least a few common numbers between them.

828-***-0316

Phone Type:Cell Phone
Carrier:BELLSOUTH MOBILITY, LLC - GA
Location:VALDESE, NC

( hickory---valdese--16 miles.)

http://www.peoplefinders.com/phone/?utm_source=wp&utm_campaign=revphone&utm_content=current&vw=people&Search=People&Input=phone&phone=(828)%20368-0316&
 
Great thread TLC, thank you. Thanks for the information below NoeticSoul and may I add further, in all likelihood AB, EB, AY and KF would have had passwords for certain on line sites. I'm wondering if they gave these passwords freely to LE? LE would still be able to get around the password problem, although it would take a little longer. If they didn't offer up their passwords (can't remember etc.) that's a red flag right there IMO.



I was asking myself this morning about things they may have deleted from Windows via their trash and wondered if it was retrievable..

I was glad to learn this (because I didn't know) and thought I would share for others who don't:

"Users may think that when files are deleted and the trash can is emptied, that they are permanently erased, but this isn’t so. When files are erased on DOS, Windows, Windows 95, Windows 98 and Windows NT, the data from the file remains on the unallocated storage space.

That is, unless of course, DiskScrub, M-Sweep or other DoD certified file deletion software has been used. The data that is left behind is retrievable through system recovery and computer forensics software utilities.

The data that is retrieved is coded in computer language, which must be decoded either by the system recovery or data forensic specialist."

How Unallocated File Space Can Help Your Case

http://www.expertdataforensics.com/...how-unallocated-file-space-can-help-your-case
 
Lauriej, I'm taking it that this particular number is the Baker's home (landline) number.


..why would they single out this particular one number?----i would think that EB and AB had at least a few common numbers between them.

828-***-0316

Phone Type:Cell Phone
Carrier:BELLSOUTH MOBILITY, LLC - GA
Location:VALDESE, NC

( hickory---valdese--16 miles.)

http://www.peoplefinders.com/phone/?utm_source=wp&utm_campaign=revphone&utm_content=current&vw=people&Search=People&Input=phone&phone=(828)%20368-0316&
 
Don't recall the warrant but I need to put this out here before I forget. EB supposedly has several AOL nick names err alias accounts (if you will.) Those AOL nick names have profiles which might prove interesting. I'm not sure if we have an AOL member here who could look up her profiles if they haven't been removed by LE.

Just a thought!
 
Actually, even information from a reformatted computer hard drive can be retrieved with a fairly high accuracy. Even if the hard drive has been fried there are ways and even programs that are used to retrieve information.

What does usually take the time is retrieving information from various sites such as MS, FB etc as those are on backups and like many of you have said could depend on whether there is one account or a number of accounts

We all leave what i call "ip fingerprints" where ever we go. What you do on the internet is actually for the most part quite easy to trace
 
We all leave what i call "ip fingerprints" where ever we go. What you do on the internet is actually for the most part quite easy to trace

Sniped by me. Yikes!!!! :eek: I would be in DEEP trouble for the stuff on my computer because of WS's!!! That is one of the reasons my family and friends think I am crazy. I tell them about the cases here - even when they don't want to hear it!!! If I am ever "accused" of anything unsavory.... I have LOTS of people to testify about my insane interest that leads me down dark alley's. :crazy:
 
Actually, even information from a reformatted computer hard drive can be retrieved with a fairly high accuracy. Even if the hard drive has been fried there are ways and even programs that are used to retrieve information.

What does usually take the time is retrieving information from various sites such as MS, FB etc as those are on backups and like many of you have said could depend on whether there is one account or a number of accounts

We all leave what i call "ip fingerprints" where ever we go. What you do on the internet is actually for the most part quite easy to trace

Anybody, please PM me on retrieving info on fried computers. My daughter's thesis is on a fried computer. Thanks.
 
Anybody, please PM me on retrieving info on fried computers. My daughter's thesis is on a fried computer. Thanks.

Yikes!!! :eek: I thought it was horrible that I have to do a "science project" by Tuesday that I did not know about until today (Saturday) - thanks to my 10 year old!! Computers are amazing - they can help sometimes - and they can damn you sometimes..... Good luck Hickory Born. I would PM you if I had any clue of how to help.
 
Anybody, please PM me on retrieving info on fried computers. My daughter's thesis is on a fried computer. Thanks.
Google "data recovery" and your city or zip code. It's not cheap and could cost $300 or more. Some companies charge less. But it works. Unless the hard drive has been run over by a steam roller, your daughter's these is stil there and can be recovered with the right tools.
 
Lauriej, I'm taking it that this particular number is the Baker's home (landline) number.
Actually, it's a cell phone registered to an individual in Connelly Springs, NC, about 13 miles from Hickory. The name is not one I've heard in this case. I think I've located the person on MS, but other than NC, I haven't found a connection to the B's yet. But the user name is initials followed by 666, so there might be something there. I'm going to keep looking.
 
Actually, it's a cell phone registered to an individual in Connelly Springs, NC, about 13 miles from Hickory. The name is not one I've heard in this case. I think I've located the person on MS, but other than NC, I haven't found a connection to the B's yet. But the user name is initials followed by 666, so there might be something there. I'm going to keep looking.

Oops, my mistake. Thanks for clearing that up Bessie.
 
I'm curious as to what kind of information they got off the computers. I don't think these people are smart enough to destroy their hard drive to hide information.

I am also interested in the cell phone records. Not necessarily the call records, but what towers their cell phones pinged.

I read somewhere that the parents had an online family and liked to role play. If they were acting out their role plays and killed Zahra, then I'm sure that there was other kinds of abuse in the beginning and maybe other people were involved in these "role plays"

This thread grabbed my attention because I have a degree in Computer Forensics. I don't practice it now because computers aren't really my passion.
 
Actually, it's a cell phone registered to an individual in Connelly Springs, NC, about 13 miles from Hickory. The name is not one I've heard in this case. I think I've located the person on MS, but other than NC, I haven't found a connection to the B's yet. But the user name is initials followed by 666, so there might be something there. I'm going to keep looking.

Bessie, I am not even gonna ask where you gleaned this info (didn't see the party named in SW). You are supersleuth of my day ;)
 
Did anyone else notice there were no computers or laptops taken from the home? :waitasec:
 
Did anyone else notice there were no computers or laptops taken from the home? :waitasec:

I also noticed any sign of computer, desk or laptop, was absent on the list of items seized from the home.

I am glad I am not the only one who is confused by this. The Bakers obviously had access to a computer regularly based on the amount of time EB spent and the large number of different usernames on varied social network sites. The absence of computer taken from the home has me stymied. Unless the computer was destroyed or hidden somewhere prior to the 911 calls on the day this all broke.
 

Staff online

Members online

Online statistics

Members online
211
Guests online
500
Total visitors
711

Forum statistics

Threads
625,780
Messages
18,509,868
Members
240,844
Latest member
wanda9511
Back
Top