Fascinating Glimpse Into Police Investigation

How an abused child was located and rescued using obscure clues

thaddeus t. grugq
7 min readAug 18, 2017

A few years ago I wrote about the extreme security practices of the YardBird child abuse media trading group. The security rules they developed and, for the most part, followed enabled a significant portion of the group to evade capture even though they were thoroughly penetrated by law enforcement who passively collected data for about a year.

This post is not going to examine the security procedures they used, but rather look at the investigative work that police conducted in order to rescue one child who was being abused. I will state up front that I do not know if the media documenting her abuse was available via other channels or exclusively to the YardBird group. Also, I will admit that I am not entirely sure that this investigation is related to the YardBird group, although it seems to be an exact match. Finally, given the nature of this crime, I will not be providing any suggestions on mitigations to protect against these investigative techniques.

Anyone that would learn from decade old investigation did so long ago, and anyone else is unlikely to use this post as a guide.

The affidavit is here: http://media.timesfreepress.com/docs/2009/03/Husky_Complaint.pdf

And an unredacted version is here (warning, significantly more disturbing): http://www.northwestgeorgianews.com/affidavit-in-bart-huskey-child-porn-case/article_89a08ef4-b5d7-5f94-9fb6-48208ee12e9e.html

Probably linked to YardBird

There are a few things which stand out in the description of the group which I think sound remarkably similar to the YardBird group. In particular the use of Usenet, procedure to join the group, and the security rules governing members actions. The original investigation was conducted by the Australian police which also matches with the YardBird investigation.

Inband Clues

The police have nothing but the content of the pictures to go on. Somehow, they link the location of the abuse victim to the state of Georgia in the US. Fortunately the press filled the details of the process that the investigators followed. Analyzing the complaint, affidavit and article allows us to extract the critical elements which were used to locate the abuser and rescue the child victim.

At each step remember that the police are constructing a sieve that they can pass data through which narrows down the potential suspects. They have only the content of the media produced by the abuser, and he took security precautions to protect himself (wearing a mask, pixelation, staying out of frame, etc.) Essentially, the only data available to the police is the background content of the videos and images. With persistence and the assistance of experts on very mundane items, it is enough.

The Investigation Process: Track One

To start with, the investigators know that the abuser and the victim are somewhere in the US. That narrows the potential pool of suspects, but clearly they need a much more specific sieve to locate and rescue the child.

The Blue Ribbon

The first significant data point is a blue ribbon visible on a wall. The image
is enhance and manipulated to clarify it. The words “It’s a boy!” are visible. Clearly this is an item given to a new mother. Using their resources the police locate the manufacturer of the ribbon which provides their customer list: hospitals and florists in the 17 south eastern states

Selector: 17 South Eastern Stats

The Hotel

One sequence of abuse images was produced in a hotel room. The police use the extremely limited number of unique identifiers visible in the images to attempt to identify which hotel. Firstly determining the hotel chain, and if possible the room. Given how generic and bland most hotel rooms are anyway, plus the limited views available in the images, this is a daunting task.

During the course of the investigation the police gain access to someone who works at a fabrics company. This person is an expert on fabric and provides crucial information about some of the content visible — the fabric.

Fabrics

The photos show the hotel room’s bed linen and drapes. The fabric expert is able to identify the hotel chain via their bed linen — The Jameson Inn. This gives the investigators another data point from which to build their sieve.

Selector: The Jameson Inn

Additionally the hotel chain only used that bed sheet in South Carolina and two locations in Georgia — Carrollton and LaGrange.

Selector: Carrollton, Georgia
Selector: LaGrange, Georgia

The Artwork: “Inspired Hillsides

In the background of one series of images from a hotel room a piece of artwork is visible. The painting is “Inspired Hillsides.” Police used a spreadsheet of all sales of the artwork and contacted the hotels in Georgia and South Carolina.

Selector: Inspired Hillsides

The Jameson Inn in Carrollton, Georgia, had purchased a print of “Inspired Hillsides.”

Series Metadata

The series of images taken in the hotel was titled: “2007 [Victim is abused] July 21, 2007”

Selector: 2007–07–21

Police contacted the manager of the Carrollton Jameson Inn who confirmed that they had the print and the bed linen. The manager said that on July 21st 2007 a “kinda creepy guy” paid cash for a room. The room was registered to James Bartholomew Huskey of Highway 193, LaFeyette, Georgia. He drove a white van.

Potential Suspect

The background content of the images provided sufficient data identify a potential suspect.

  1. blue ribbon sold only in south eastern states
  2. bed linen and drapes used by a hotel chain
  3. only a few hotel properties in those states used those fabrics
  4. artwork was only present at one hotel property
  5. metadata provided timeframe during which the suspect stayed at the hotel

Additional content from the images and videos produces a additional sequences of selectors that identify the same suspect. This is sufficient for a warrant.

Investigation Process: Track Two

This used the content produced when the victim was abused at home or in a car.

Fabrics (again)

A series of images produced in a bedroom show a distinctive bed spread. The fabric expert identifies it as the product of a mail order company. The police contact the company which produces a customer list who purchased that bedsheet.

Selector: purchased bedsheet from mail order company

The Car: Sunburst Orange Aztek 2003–2005

In the background of some images the interior of a car is visible. Police extract the interior and show it to a car dealer who is able to positively identify the car as being a particular model, year, and paint job. Bear in mind that the police probably asked a lot of car dealers before they found one who could identify it.

With this information about the car they trawled through the sale logs of all
vehicles and got a list of owners of this particular model and color.

Selector: Sunburst Orange Aztek 2003, 2004, 2005

Myspace

The police correlate the bed sheet customers in Georgia with owners of a Sunburst Orange Aztek which produces: Sherri Huskey of 193 Highway, LaFeyyette. They find her MySpace page which contains pictures of the inside of her home which match the background of some of the child abuse images.

Sherri’s husband is registered as owning a white van. The have a daughter who’s name is the same as the victim.

Positive ID

In certain images the abuser had pixelated his face to obscure his identity.
This pixelation obviously would leave certain traits still visible, primarily
coloration (e.g. hair color, beard vs shaved, possibly eyeglasses, etc.). The
police took the drivers license photo of the suspect and matched the picture
against the pixelated images to see if there was any resemblence. There was.

The Sieve

What I find so interesting about this investigation is how law enforcement officers were able to extract clues from the background data of the images and use that to construct a series of lists of potential suspects. Those lists were correlated and the suspect was identified. I picture this style of investigation as essentially constructing a sieve that eliminates people who can’t be suspects, creating a smaller and smaller set of potential suspects until only one remains.

Help police conduct similar anti child abuse investigations.

Support more analysis like this.

Appendix: Its YardBird

The group employs highly technical and advanced security measures to avoid law enforcement detection. Such techniques include, but are not limited to, password protection to the group’s pre-designated newsgroup where they conduct text postings (i.e. chat) with each other, PGP encryption of text and binary files, and the swapping of file extensions which subsequently must be re-swapped in order to successfully download a particular picture or movie file.

This individual identified a newsgroup titled “alt.anonymous.message” as the location where members of the group conduct/upload text postings to communicate with each other. At this same newsgroup location, members inform each other as to the location of where they have uploaded child pornography for members to go to download for their own personal collection. The child pornography binary files, either still pictures or video files, are never uploaded to the newsgroup reserved for text communications between members. The child pornography is uploaded to other innocuous newsgroup locations were members can go to download.

The group currently consists of approximately 48 members. There is a defined hierarchy or structure to the group and all members must abide by strictly enforced written security measures and standard operating procedures in order to retain their membership status. To become a member of the group, one must be invited in by an existing member, and must pass a timed written test to determine their knowledge of child pornography material (e.g. knowledge of the names of various child pornography series; must be able to describe a particular series in question, etc.). The test also serves as an measure to assess whether the interested party could be a law enforcement officer attempting to infiltrate the group. Members of the group are told to never provide their true identities to another member of the group. They are never to communicate with one and other using traditional email, chat, Yahoo!, ICQ, or telephone. For the security of the group as a whole, their relationship with other members of the group is strictly cyber in nature. This way, if one of the members of the group is ever arrested by law enforcement, they cannot provide any identifying information to law enforcement on other members of the group.

Support more content like this.

--

--