Recently, high school kids were caught misbehaving in a bus.
The students were eating the forbidden fruit alongside abusing narcotic drugs, marijuana.
Female students were
handled inappropriately, something that raised eyebrows. The ‘pioneers’ of the
first pictures and videos on the same were bitterly condemned.
The police have been on the lookout investigating on how the
pictures leaked. Many citizens too were disgusted in the manner in which the
activity was conducted.
EAHD did its research
and filed the following report:
Independent
Computer Forensics Report
“The report is meant to highlight the authenticity of technology more so computer forensics to establish the original individual(s) who may have distributed the contents illegally.”
“The report is meant to highlight the authenticity of technology more so computer forensics to establish the original individual(s) who may have distributed the contents illegally.”
“EADH
investigated all the facts surrounding the story and tested their authenticity
and validation. From our initial investigation, we have a list of more than 150
web pages who covered
this story along with the pictures. These websites includes various news sites, blogs, Facebook pages, twitter accounts, Google + profiles and many more.”
this story along with the pictures. These websites includes various news sites, blogs, Facebook pages, twitter accounts, Google + profiles and many more.”
“Since more than 140 of these web pages and other
media covered the story on August 7, 2015 and onwards we were able to dig out
some personal user profiles who had shared this story way
before it came into media. This gives us as well as local police a major lead in narrowing down the scope of investigation and helping them investigating those few people who had shared the story way before it made any headline.”
before it came into media. This gives us as well as local police a major lead in narrowing down the scope of investigation and helping them investigating those few people who had shared the story way before it made any headline.”
“Names
and other details of such users have been successfully obtained by EADH and
will be presented to the local police shortly. EADH firmly believes that after investigating
those few people (not more than 5) the truth will be presented to the people
about the person who actually publicized the pictures which should have never
come in public.”
“EADH
has solved lots of cyber forensics cases for the government agencies along with
the other private corporations and has a proven track record of 100% success. We
believe we will also explain the untold story behind this case shortly to the
world and will help the authorities bringing the actual culprit down to justice.
Proof of Concept (POC):- Under this section EADH is disclosing the users details
and their public profile who shared the story on August 6, even before some of
the leading media houses of the country and were amongst the very few to post
the pictures online.”
Dagitari
Wanjohi @Wakigogoine
The
above person is believed to the be among the first people who initially posted
the photos on social media the authenticity and verification of their source of
the
file would clearly prove who had passed the images to him.
file would clearly prove who had passed the images to him.
BRIAN!!
@Ichieni
The above person spearheaded the spread of the
file to other internet users and thereafter the file took a life of its own
trap
a velli @BoiBlunt
Krystal Joe Google +
The person above did the most initial post on Google plus All these users hared these pictures online very early which can help the authorities getting close of the suspects and nipping dow the one who made the first uploads over the internet.
Krystal Joe Google +
The person above did the most initial post on Google plus All these users hared these pictures online very early which can help the authorities getting close of the suspects and nipping dow the one who made the first uploads over the internet.
“If
East African Data Handlers Ltd. Gets a chance of further investigating into the
case, we shall be able to provide enough evidence to prove the original person behind
uploading these pictures online and we shall be in a position to disclose all
the details of the device with which these pictures were taken and uploaded.”
“We
believe East African Data Handlers Ltd. Will assist the authorized authorities
in every possible way to get the culprit down to justice and setting an example
across the country so that every individual thinks twice before doing such a
sin in future.”
Disclaimer:-
1. East African Data Handlers Ltd. Does not declare the above-mentioned profile owners as the suspects in this case in any regards. However we believe that a digital forensics examination of their gadgets can lead us to the original culprit behind this.
1. East African Data Handlers Ltd. Does not declare the above-mentioned profile owners as the suspects in this case in any regards. However we believe that a digital forensics examination of their gadgets can lead us to the original culprit behind this.
2.
East African Data Handlers Ltd. Does not take responsibility for the admissibility
of this report in any courts of law until and unless contacted by the right
authorities. In that case EADH shall
present a comprehensive forensics report with the proof of concept of all the evidences prepared in accordance with the U.S. Cyber Laws.
present a comprehensive forensics report with the proof of concept of all the evidences prepared in accordance with the U.S. Cyber Laws.
EmoticonEmoticon