How Computer Data Helped Investigate Quebec Shooter

The criminal proceedings against Quebec City's mosque shooter provided a glimpse into how police use computers to extract information about a suspect, even if that data has been erased.

Alexandre Bissonnette's seized laptop was forced to reveal its secrets through a specialized internet evidence finder software called IEF, created by Canadian company Magnet Forensics, which was founded by former Ontario police officer Jad Saliba.

Bissonnette, 28, pleaded guilty earlier this year to six charges of first-degree murder and six of attempted murder. His sentencing arguments are set to begin Monday.

The demand for such software services is exploding, according to Genevieve Lajeunesse of Crypto.Quebec, an independent media focusing on digital security, information technology and intelligence.

"There isn't a single crime scene today that doesn't have a technological element," she said.

IEF's client list includes the FBI, the Danish and UK governments, as well as police in Lima, Peru and other Western countries.

In Canada, prosecutors in the case of Guy Turcotte used internet search data to show the former cardiologist had looked up methods of painless suicide before killing his two young children.

The information gleaned from computers is vital for mounting the prosecution's case.

In Bissonnette's case, the police looked for evidence that the murders were premeditated, and if they had been committed in the name of an ideology.

Concretely, the software provides access to the contents of zip files, RAM memory, directories, social media chat data, P2P file sharing, web mail, videos on YouTube, photos, the use of USB keys, how the info was shared, and the history of the internet browser - even if it has been deleted.

These digital research tools can save hours of work by sparing police officers the job of having to read everything on Skype, Facebook, or web browsers.

The amount of data can be imposing: in Bissonnette's case, the software detected 31,895 web links, 4,742 Google searches, 3,388 Facebook links and 60,417 images. The tool finds everything, even data that is invisible to the human eye or seemingly irrelevant.

The RCMP investigator tasked with investigating Bissonnette's laptop was able to see not only potentially incriminating videos of executions, but also searches for Halloween costumes or a recipe for vol-au-vent.

The data is also precise: it showed investigators that only an hour and a half before he gunned down six worshippers in a Quebec City mosque, Bissonnette had viewed a video on how to operate the Glock handgun he would use in the slaying.

While they save time, there's a risk that the results of searches can be taken out of context, Lajeunesse said. As an example, what do 20 searches on bombs mean, compared to a thousand for recipes?

"My internet search history looks quite a bit like Alexandre Bissonnette's," she said, noting that part of her job involves researching far-right groups.

Police forces are reluctant to discuss their investigation methods, in order to not divulge their methods to criminals.

RCMP declined to comment on the subject other to confirm it used certain tools by Magnet Forensics.

Quebec provincial police would not say what technology it used to uncover evidence.

Spokesman Hugo Fournier did say the force has a technology support unit comprised of some 40 police officers who, with support from computer scientists, target mainly organized crime.

Police forces aren't the only ones to use the technology.

Hexigent Consulting, a private specialty firm, is hired by lawyers and occasionally police to extract potentially incriminating information from cell phones and computers and pass it on to clients.

Founder Ryan Duquette, a former Ontario police officer, said criminals are increasingly learning new ways to cover their digital footprints, which increasingly makes investigators' jobs harder.

"But not impossible," he said. "We have to get more creative."

Lajeunesse, for her part, believes that it's impossible for someone to truly eliminate all traces of their history.

Most people end up making mistakes, she said, noting that the founder of AlphaBay, one of the world's biggest darknet website AlphaBay, was brought down after sending an email from a personal hotmail address.

"To connect is to commit," she said.

CTV News:

Police Are Mishandling Digital Forensic Evidence:

Canadian Police Uncover Dark Net Gun Market:

« Cryptocurrency Malware Theft Is Worth Millions
Business AI Platform For Commercial Development »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Lumeta

Lumeta

Lumeta’s cyber situational awareness platform is the unmatched source for enterprise network infrastructure analytics and security monitoring for breach detection.

TZ-CERT

TZ-CERT

TZ-CERT is the National Computer Emergence Response Team of Tanzania.

Cyber Security Malta

Cyber Security Malta

Cyber Security Malta is part of Malta's National Cyber Security Strategy which aims to combat cybercrime, strengthen national cyber defence and provide cyber security awareness and education.

Assystem

Assystem

Assystem delivers a comprehensive security approach for the industrial and service sectors that integrates physical security systems, industrial cyber-security, functional safety and dependability.

DeuZert

DeuZert

DeuZert is an accredited German certification body in accordance with ISO/IEC 27001 (Information Security Management).

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Bitbone

Bitbone

Bitbone develop IT infrastructure and IT security solutions that create long-term value.

CyberUK

CyberUK

CYBERUK is the UK government’s flagship cyber security event and the authoritative event for the UK’s cyber security community.

DoQubiz Technology

DoQubiz Technology

DoQubiz is using the idea of security through obscurity to develop their proprietary Fractal Security Engine that implements a highly resilient data protection protocol.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Cloud Range

Cloud Range

Cloud Range provides cybersecurity teams with access to the world's leading cyber range platform, eliminating the need to invest in costly cyber range infrastructure.

Identity Digital

Identity Digital

Identity Digital simplifies and connects a fragmented online world with domain names and related technologies that allow people and businesses to build, market and own their digital identities.

DarkFeed

DarkFeed

DarkFeed is a Threat Intelligence provider that monitors the darknet in real-time, where hackers and Cyber criminals are most active.

DynTek

DynTek

DynTek delivers exceptional, cost-effective professional IT consulting services, end-to-end IT solutions and managed IT services.

Downdetector

Downdetector

Downdetector helps people all over the world understand disruptions to vital services such as the internet, social media, web hosting platforms, banks, games, entertainment, and more.