Anthony Vs Mangione Case Study

Superior Essays
The internet is a rapidly expanding technology and is a global phenomenon utilizing a medium for sharing forms of digital communication. Underground classes of criminals leverage cyber technology in furtherance of their criminal goals while investigators attempt to parry by detecting and apprehending these criminals – this through a constant state of leveraging existing techniques or creating new ones. Developing investigative techniques requires experience and the ability to evolve – a reactive learning curve following behind the wake of a technocratic society. In United States v. Anthony V. Mangione, the defendant, Mangione, was sentenced to 70 months in prison after pleading guilty to one count of transportation of child pornography. …show more content…
While ICAC commenced with the preliminary steps of a cyber investigation – e.g., the subpoenaing of AOL records, account information, subscriber and IP logs, details of Mangione's law enforcement status had not yet been revealed to investigators. Based only on one digital image from AOL, the lead was filed as a non-priority. However, things changed during the course of the investigation when an analyst discovered that Mangione could possibly be a federal agent. The revelation immediately altered the priority and course of the investigation. Were Mangione's email communications part of some elaborate undercover operation that was sloppily done? Could someone else be using Mangione's account? Could the perpetrator be leeching off Mangione's home wifi? Eliminating the potential of a misidentification would be crucial for several reasons. Failing to do so could possibly implicate an innocent person. Also, if the government were to formally implicate Mangione and then later determine he was wrongfully accused, the stigma attached to a child sexual abuse case …show more content…
This incident offered Mangione two advantages he did not have before. First, this was quite possibly the first time he was alerted to the fact he was a subject of interest to someone. Second, if the someone was a law-enforcement official, it could offer to him conclusive proof the government was investigating him. Destroying evidence would be foremost on his mind. If he believed in the latter, as investigators postulated, destroying evidence would be his priority. The investigators were now in a crunch to wrap up lose ends and approach Mangione. By the time, the search warrant was signed, investigators anticipated Mangione was likely prepared. When the task force approached Mangione, they discovered a laptop in his work vehicle. According to his family members, the laptop was off limits because it was Mangione's work computer, although, authorities later showed it to have been purchased with his own funds. A forensic analysis of the computer, revealed something of interest, but not what investigators expected to find. Instead of child abuse images, the laptop had wiping software installed. An examination of the logs revealed multiple “wipings,” the remnants of additional screen names and fragmented chats indicative of child exploitation themes. Deeper analysis revealed hibernation files depicting child erotica. At this point in the investigation, David Osborne enters.

Related Documents

  • Superior Essays

    The loss of privacy has provided many companies to help the public keep their PII safe such as Lifelock a company invented by a former FBI identity theft agent. The usage of cryptography is a viable way to extract secret or confidential information in the case of US vs Snowden cryptography is how he was exposed as the source of this extraction of information, and the decrypting of this information allowed the US government to name him as the source which will in time become the information to convict him. The loss of privacy for the normal citizen has been comprised in this digital era, but the gain far outweighs what is…

    • 2226 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    However, the laptop has been formatted after the attack. The victim did not report the Ransomware case to the Malaysian Communications and Multimedia (MCMC) as he was obligated to do so by the cybercriminal. A livemap that tracking the spread of Ransomware has detected that it has appeared in Malaysia. Surprisingly, there is a new version of Ransomware called WanaCrypt0r 2.0 that has been found in the cyberspace. Other Asian country that has been threatened by Ransomware attacks are such as China, Japan, Indonesia and…

    • 1139 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    (Wells, 2014) Because of his position Winkler had access to multiple different financial statements. By stealing and destroying the documents he made it tough to prosecute. By adding an electronic filing system and backup copies non accessible to anyone other than top management, Mogel Inc. could have avoided this issue, and prevent it from happening again. 9) By adding computer programs that regularly audit the companies statements is another preventive control that could be set in place to detect fraud. Although Computer programs are only as good as the program itself, it still one step that could truly help prevent Winkler’s crime from happening again.…

    • 1002 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    and how to protect from it ?. More susceptible to this malware who browser suspicious sites which mean some sites are already get hacked from hackers and the hackers have hidden ransomware. To be more safe , users and employments should not visit a susceptible sites and if they need to visit make sure that browser is updated and do not download any execution file. As I mentioned the common attack method of ransomware. So we can always have seen that attack come in after the victim accept which mean the attacker convince the victim to open the link or the execution file.…

    • 1452 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Freedom Of Expression

    • 1472 Words
    • 6 Pages

    However, his inclusion of WikiLeaks in his list of websites that promote freedom of expression misrepresents his position. WikiLeaks is, according to their main website, “a multi-national organization and associated library.” In other words, it publicizes censored or restricted information for the public. Though the website is for the right cause to counteract corruption and spying, the methods to obtaining the information are often controversial as they are acquired through hacking personal social media tools. For example, Sarah Palin’s personal email was hacked and released on WikiLeaks before the 2008 election in September when she was running as John McCain’s vice president. The emails proved to be harmless with no incriminating evidence, but were still released.…

    • 1472 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Hackers Threat Analysis

    • 1037 Words
    • 5 Pages

    Introduction To understand threat actors and their motivation to hack into a system, we have first to examine their background, psychological factors and culture environment. Understanding threat actors include elements such as personality characteristics, motivations, and what drives or influence these criminals. Hackers break into systems for profit, thrills, bragging rights, and curiosity. There are several psychological factors which can often motivate hackers which can be money, fame, revenge, and personal thrills. Organizations today face many ominous cybersecurity concerns that must be addressed systematically and effectively to protect the organization, their customers, and employees.…

    • 1037 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Did they try and conceal their actions or did they simply make a mistake in which they didn’t realize a breach existed? In other words, were they breaking the law unwittingly? Answering these questions should greatly help our examination in trying to reasonable determine if Mr. Snowden leaked NSA files with criminal intent or out of sincere concern for the public. The first question is difficult to answer. Did…

    • 884 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    But there are some scholars who argue differently that hackers must rely on both their telecommunication skills along with their technology knowledge to successfully cause harm. Michail Tsikerdekis, author of the article Online Deception in Social Media, argues that hackers employ the use of deception to gain access to another’s account. Tsikerdekis states, “In social media, deception can involve content, sender, and communication channel or all three together (Tsikerdekis 72).” While these sorts of attacks may rely on telecommunication skills, there are still methods of which people can work to protect themselves from being potential targets. Tsikerdekis mentions, “Training and raising awareness (such as might be taught to security personnel) could help protect users of social media (Tsikerdekis 72).” Tsikerdekis’ point serves to show the reader that hackers employ much more than just their technical skills. The scholar provides evidence to the readers that even on social media they must be aware of hackers impersonating someone and trying to trick them into giving up their personal…

    • 1542 Words
    • 6 Pages
    Great Essays
  • Superior Essays

    People assume that these are private one-on-one conversations with each other, but little do they know that there is a third party monitoring their conversations. After 9/11 occurred, the Bush Administration designed a law called the “Patriot Act.” The purpose of the Patriot Act is to surveil cellphones, tablets and anything that has a connection to the internet without you knowing. It is unconstitutional…

    • 1280 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Kevin Mitnick Analysis

    • 1193 Words
    • 5 Pages

    As mentioned in the previously, making copies of information without a company’s knowledge is definitely theft, especially in this case where the information was private. Now, if he were to make copies of information already known to the public, then I could see where it could be perceived that he did not actually take anything. Unfortunately, that is not the case. Moreover, I believe that his motives for hacking were for intellectual challenges. I believe that he got a high off of successfully manipulating someone into leaking private information and from successfully coping said information without anyone’s knowledge.…

    • 1193 Words
    • 5 Pages
    Improved Essays