Getting Evidence from the Computer of the Boston Bombing Suspects

Are You Being Geo-Located On Social Networks?
May 8, 2013
5 Things a PI Must Have Authorization to Obtain
June 5, 2013
Show all

Getting Evidence from the Computer of the Boston Bombing Suspects

Federal and state law enforcement agencies have recovered one of the Boston bombing suspect’s laptop in an effort to obtain essential clues about the case. They are hoping to find any information to determine exactly how these two suspects became radicalized. Even though the Federal Bureau of Investigation has the laptop in their possession, investigators in the case are not speaking out publicly about any of the information found on the computer.

Reports are indicating that the suspect’s laptop might play a crucial role by providing information of how each one was radicalized, along with all of the efforts required to learn how to make their devastating bombs. Investigators in the case are coming to believe that both suspects had become more religious, and that the two were highly inspired to perform their deadly attack because of the Internet sites they had viewed. It is possible that they communicated with overseas jihadists in an effort to hatch their plan.

A Wealth of Hidden Information

Digital forensic investigators interested in the case believe that the acquisition of the suspect’s laptop will provide a wealth of information concerning the case. It is their belief that the hard drive holds the potential of providing pertinent information that would be otherwise unavailable to obtain.

At nearly every level, it is usually impossible for any individual to hide their past activities on their laptops, desktops or mobile devices completely. These digital forensic investigators believe that it takes a high amount of effort to fully protect historic information stored in unobvious places on the drive.

Today, there are basic forensic tools that investigators use every day to read all of the contents on the hard drive to capture all the hidden data. It is their belief that by not using high-volume encryption technology every moment while on a laptop, desktop or mobile device, there is really no way to circumvent a forensic investigator’s tools.

Some investigators believe that the data captured from the suspect’s cell phone will also provide a huge volume of clues. The stored text messages on the account will be able to assist law enforcement officers in their effort to piece together the actions of both suspects. Every time the brothers sent text messages between each other, they left a trail of their conversations that can now be viewed by law enforcement.

“Helpful” Friends

The three “helpful” friends of the younger of the two brothers – that have remained in custody – also texted at least one of the suspects. In filed court documents, investigators have stated that the three other suspects hid the laptop and backpack of the younger brother that contained empty cases of fireworks that had once held explosive powder. Authorities in the case are making indications that these three suspects assisted the younger brother in the days following the bombings.

Two of the three friends of the living suspect in the case have been charged with conspiracy. The charge states that they obstructed justice when they hid the laptop along with their efforts to dump the suspect’s backpack that was full of empty firework casings. So far, the three new suspects deny knowing that the younger brother was involved in the Boston Marathon attack, at least at the time of their alleged crimes and did not believe they were hiding or eliminating evidence.

In an effort to wrap up their investigation, the legal authorities are working to identify all valuable clues concerning the Boston Marathon bombings, including what is hidden on the hard drive of the suspect’s laptop. There were 264 injured individuals and three killed when both bombs exploded near the finish line of the marathon, on April 15.

Image CreditThe Daily Beast