You don’t want to get on the wrong side of the FBI, because when they decide to come after you it’s often just a matter of time.
Take for example the case with ‘Brian Kil’, who stands accused of extorting underage girls into sending him nudes.
It all started via Facebook around 2012, when a user operating under that name began to prey on his victims.
Gizmodo has the dirt:
He’d tell the minors that he had sexually explicit images of them and would send them to her family and friends if they didn’t send him more. Generally, this sort of action is known as “sextortion.” When the victim is underage, the crime is “sexual exploitation of a child,” a charge that can lead to a life sentence…
The first victim outlined in the FBI filing claims that Kil talked one girl into sending him naked pictures of herself which he then posted to a Facebook account, thus engaging in child pornography. When the victim started to resist, Kil allegedly threatened a Columbine-style attack on her high school, Plainfield High in Plainfield, Indiana, as well as neighboring [sic] Dansville High School the following day.
He wasn’t messing around – here’s a snippet of the threat he sent:
That would be where the terrorist tag comes from, with the schools in question shutting down amidst fear and chaos.
Kil then really upped the ante:
Kil eventually moved on from Plainfield and targeted more victims, the filing states. He introduced new aliases and created dozens of Facebook accounts to contact victims, while also using text messages, Twitter, and Dropbox to communicate with the victims.
He loved to brag to his victims about how he had never, and would never, be caught. Call it waving a red flag in front of an enraged bull, because the FBI came in all guns blazing:
So when the agency got in contact with one of Kil’s victims while she was still communicating with the suspect, the feds created a non-pornographic video and inserted a small piece of code known as a NIT into the file that would record the real IP address of the suspect and then send it back to the FBI. The victim sent the video to Kil using a Dropbox link only she and Kil had access to. Sure enough, the suspect watched it. The feds got the IP address and traced it to a house in Bakersfield, California.
But wait there’s more. In order to solidify their case against the suspect, the FBI agents installed a camera on a pole outside of the house linked to the IP address. They also added surveillance to the internet traffic coming and going from the location. Sure enough, the feds identified a 26-year-old man named Buster Hernandez who seldom left the house. But when his girlfriend went to work, Buster allegedly logged on to the Tor network. Using the wiretap, the FBI says it also found instances of the suspect’s IP address viewing images of Columbine on 4chan as well as what appears to be child pornography on imgur.
Nailed.
Buster was arrested on August 7, and will face a litany of charges that should see him locked up for life.
That above is really the abridged account of how this one played out, so if you’re interested you can find the FBI’s full case file HERE.
One less vile human on the streets.
[source:gizmodo]
[imagesource:flickr] South African courts are about to confront a life-or-death questio...
[imagesource:flickr] Cape Town will have more than just Vaalies floating around its bea...
[imagesource:aljazeera] There are currently hundreds if not thousands of miners trapped...
[imagesource: Sotano/Facebook] Brendon Crew isn’t new to the restaurant business – ...
[imagesource: Facebook/Modern Notoriety] Crocs have seamlessly infiltrated ma...