33 year old murderer identified by personal electronic equipment

Read this this morning, very sad story. She was absolutely stunning as well, what a crazy husband.
 
Why is it crazy? How else would the PC know what to do after a key has been pressed?
maybe more genius than crazy but still pretty cool.
In the power-line exploit, the attacker grabs the keyboard signals that are generated by hitting keys. Because the data wire within the keyboard cable is unshielded, the signals leak into the ground wire in the cable, and from there into the ground wire of the electrical system feeding the computer. Bit streams generated by the keyboards that indicate what keys have been struck create voltage fluctuations in the grounds.
[If the laptop is unplugged], attackers point a cheap laser, slightly better than what is used in laser pointers, at a shiny part of a laptop or even an object on the table with the laptop. A receiver is aligned to capture the reflected light beam and the modulations that are caused by the vibrations resulting from striking the keys.​
 
Why is it crazy? How else would the PC know what to do after a key has been pressed?
I think he was referencing the power from the wall to the PC, which sounds a little extreme and possibly a cover for something else.

Having said that it's been known for a while that if you set up a listening device of some kind and simply listen to a room with a computer in it you can eventually work out what was being typed on a computer because every keyboard is slightly different in the sound it makes, as are the individual keys so you can after a while do a comparison of the most commonly pressed keys, work out what they are (usually vowels), then work from that to complete words by using a program that compares them to a dictionary and work from there until you've got every key mapped, at which point you can work out what is being typed in near enough real time by using that look up of the keys combined with a dictionary and spelling/grammer checking.

From memory you can even work out who is typing what from several different computers because of the differences in the noise, especially if you have more than one bug so can localise the sound a bit.
 
I think there is a generational difference when it comes to being aware of the intrusion of technology.

Back in the day, early 90s, people were more aware of technology, especially Internet activity because it was all a new thing. But people born during that time and since then seem less aware. For them having technology in society is normal. So to be a young person today and be wary of technology I think would be a much rarer sight.

I was typing on another thread were someone thought a phone call was private information. It's not. Any time you use technology you're leaving an electronic trail behind you. Even these big hackers leave a trail, they just go through so many systems changing their ip's and the law enforcement can't dedicate enough time, or don't have the power to gather ip information from some far distant country (if that ISP even kept records). But if they did have the time and power they would be able to trace them.

Bitcoin transactions have been traced recently. It all depends how much of a target you are to law enforcement.
 
Bitcoin transactions have been traced recently. It all depends how much of a target you are to law enforcement.
bitcoin isn't really anonymous anymore governments took that way.

you cant buy or sell on exchanges without verifying ID so obviously they can track anyone who does

I guess if you have enough links back you can find the person who originally did the trade outside of the exchanges, the guy who must know some way of contacting this other person to arrange the transaction in the first place.

he snitches, yea we tracked him though bitcoin
 
"Alexa, who committed the murder?"

"Bing! I'm not telling you nuffink pig"

Reminds me of this

catsdogs.jpg
 
Criminals will soon wise up to it, immediately take any smart watches off your murdered victims and don't carry around any smart phones during the time you're claiming to be tied up. [..]

Leaving behind or turning off your tracker smartphone has already been treated as evidence of guilt. It's not yet considered proof of guilt by itself, but it is considered evidence of guilt.
 
There's supposed to be a way to tell tell whats being typed on a keyboard just from the power signal leading to a pc also which is kinda crazy.
but I guess you can make a computer network through the power sockets in your home to so seems more plausible.

pretty sure thats not how the key logging works though

You never got keylogged in world of Warcraft? That was 15 years ago! I am sure it is more advanced now.
 
Leaving behind or turning off your tracker smartphone has already been treated as evidence of guilt. It's not yet considered proof of guilt by itself, but it is considered evidence of guilt.

and like I posted in post #8, giving his phone to somebody else didn't work.
 
You never got keylogged in world of Warcraft? That was 15 years ago! I am sure it is more advanced now.
yea but the point was they don't need to actually access your computer to read the keyinputs... maybe I just explained it poorly I thought people would assume "power going to pc" is power from the wall not from the cord of the keyboard...

It was the earth signal they exploited apparently
In the power-line exploit, the attacker grabs the keyboard signals that are generated by hitting keys. Because the data wire within the keyboard cable is unshielded, the signals leak into the ground wire in the cable, and from there into the ground wire of the electrical system feeding the computer. Bit streams generated by the keyboards that indicate what keys have been struck create voltage fluctuations in the grounds.
[If the laptop is unplugged], attackers point a cheap laser, slightly better than what is used in laser pointers, at a shiny part of a laptop or even an object on the table with the laptop. A receiver is aligned to capture the reflected light beam and the modulations that are caused by the vibrations resulting from striking the keys.
 
What's the motive, or generally the motive in cases like these?

Got a great job.
Got a hot young wife.
Got a loving family.
Got a nice house in a nice area.

Yup, time for me to do some the ol' murderin!
 
What's the motive, or generally the motive in cases like these?

Got a great job.
Got a hot young wife.
Got a loving family.
Got a nice house in a nice area.

Yup, time for me to do some the ol' murderin!
I'm assume she was going to leave him, his manhood couldn't handle such a "betrayal" and the thought of another man maybe raising his child as the live in dad was too much.

pathetic either way whatever the reason, if she cheated them.... move on.... if you've money it's a hell of a lot easier to find someone else.

theres no "the one" there are literally millions on the planet you could have a great life with
 
That's what I don't understand, he's still in the prime of life. Let her go, build a good relationship with the family and start again, it's one of the perks of being male. Or at least an "alpha".

I guess that's why it's called a crime of passion and not a crime of rational thinking.
 
Back
Top Bottom