Open Menu
AllLocalCommunitiesAbout
lotide
AllLocalCommunitiesAbout
Login

Whenever there is a shooting/terrorism/assassination/killing, how did they know about the (alleged) perpetrator's online accounts? Would they have found them if the perp posted them over Tor?

⁨29⁩ ⁨likes⁩

Submitted ⁨⁨13⁩ ⁨hours⁩ ago⁩ by ⁨DeathByBigSad@sh.itjust.works⁩ to ⁨[deleted]⁩

source

Comments

Sort:hotnewtop
  • Fyrnyx@kbin.melroy.org ⁨3⁩ ⁨hours⁩ ago

    People aren't that smart.

    source
  • FriendOfDeSoto@startrek.website ⁨13⁩ ⁨hours⁩ ago

    The dipshit could’ve been using services under their actual name. I sadly don’t remember which shooting it was but the shooter streamed it on Facebook live. So that’s easy for a journalist.

    If you posted a deranged manifesto anonymously on 4chan or similar but mention the gruesome deed before it happens that’s a good link to your dipshit’s online history.

    There is a show on German TV that is a rough copy of Last Week Tonight. Every once in a while they surprise their audience with a show that’s about the audience. You need to register for tickets with your name and email and then the researchers mercilessly dig through all the stuff people have been posting online or stuff posted about them by others. And then they gently rib them or surprise them on the show and to compensate for the public embarrassment they get a prize. It’s a concept inspired by the Snowden leaks. It’s unreal how easy it is to link people to their digital footprints. Even anonymous accounts on reddit or whatever. Armed with face recognition and syntax analysis it’s almost trivial to uncover these links. This is the sort of digging modern journalists need to do. So it is not surprising that they quickly find any dipshit’s profiles after they shot innocent people.

    source
    • ComfortableRaspberry@feddit.org ⁨4⁩ ⁨hours⁩ ago

      There is a show on German TV that is a rough copy of Last Week Tonight. Every once in a while they surprise their audience with a show that’s about the audience.

      It’s the “Lass dich überwachen” Special from (ZDF) Magazin Royal. I liked the episode from Q1 (?) this year where they went through a guests whole last FM history and created a kind of music show segment of if it.

      source
    • elvith@feddit.org ⁨7⁩ ⁨hours⁩ ago

      This is a nice demonstration - and it probably isn’t even much work to run this segment in the show. Those people do not think about covering their tracks, as they do not have “anything to hide”. Also you only need to find a few easy targets in the whole audience group.

      As for shooters and such - some have a message to broadcast with their actions and make it easy to link those posts to them. Others may not grasp the amount of tracking and surveillance and may be just bad at covering their tracks. Also they probably didn’t factor in OpSec that much. Granted, they might cover up in the days or weeks before, but there may still be some (years) old posts that they didn’t think about that makes them easy to identify.

      source
  • radix@lemmy.world ⁨12⁩ ⁨hours⁩ ago

    Seize all electronic devices and scan for logged-in accounts, cookies, browsing history, etc.

    Depending on the severity of the crime (if NSA gets involved, for instance) there are ways to defeat Tor, anyway. They have historically maintained backdoors (technical and human) into most telecom networks, and can always “ask” ISPs for a ton of information on a suspect.

    source
    • Fyrnyx@kbin.melroy.org ⁨3⁩ ⁨hours⁩ ago

      It mostly helps that TOR is majorly funded by the government. So of course they'd know about it more than anyone else.

      source
  • Korhaka@sopuli.xyz ⁨7⁩ ⁨hours⁩ ago

    They only know about the things they find, largely by turning the devices on and see what is there

    source
  • Zwuzelmaus@feddit.org ⁨9⁩ ⁨hours⁩ ago

    Palantir.

    source
  • WhatGodIsMadeOf@feddit.org ⁨12⁩ ⁨hours⁩ ago

    Yes nothing is hidden online.

    source