The Use of Cryptography in Real and Fictional Crimes
4. Crime, Computers, and the Internet
← 76 | 77 →
Crime, Computers, and the Internet
Like gods, we have created a new universe called cyberspace that contains great good and ominous evil. We do not know yet if this new dimension will produce more monsters than marvels, but it is too late to go back.
David Horsey (b. 1951)
In April of 2015, a horrific murder in East Baton Rouge, Louisiana caught the attention of the world, not only because of its hideousness, but also because its solution hinged on deciphering the victim’s cellphone messages. The case concerned the brutal murder of twenty-nine-year-old Brittney Mills, who was pregnant at the time, and her son, Brenton who was barely nine years old.1 Authorities believed that Brittney had opened the door of her home to someone who had asked to use her car; she was shot multiple times when she refused. Doctors delivered her baby, but Brittney and Brenton died on May 1.
Because she willingly opened the door, the police believed that the victim likely knew her killer. So, they checked her cellphone for ← 77 | 78 → possible clues to his identity; but the phone used encryption software blocking anyone from accessing its data without a password. Investigators tried over and over, but were ultimately unsuccessful in so doing, turning the case into a cold one. Frustratingly, the critical part of evidence was likely lingering somewhere in cyberspace for someone to...
You are not authenticated to view the full text of this chapter or article.
This site requires a subscription or purchase to access the full text of books or journals.
Do you have any questions? Contact us.Or login to access all content.