Investigation Dashboard
The attack timeline spans 2012-06-19 to 2012-07-12. The earliest activity was Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com) (2012-06-19). The investigation subsequently uncovered LogKext Keylogger Installed on Tracy's MacBook Air; Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails; Tracy (Coral) Communicating with Perry About NGDC Insider Information. The most recent activity was NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x (2012-07-12).
- LogKext Keylogger Installed on Tracy's MacBook Air
- Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules')
- Tracy (Coral) Communicating with Perry About NGDC Insider Information
- Steganographic Covert Communications in Carry's Device Photos -- jphide Format
- Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site
-
LogKext Keylogger Installed on Tracy's MacBook Air
2012-06-28T15:41:39-04:00
-
Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules')
2012-07-09T09:22:10-04:00
-
Tracy (Coral) Communicating with Perry About NGDC Insider Information
2012-06-29T11:00:00-04:00
-
Steganographic Covert Communications in Carry's Device Photos -- jphide Format
2012-07-08T17:34:11-04:00 — 2012-07-11T11:47:47-04:00
-
Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site
2012-07-11T11:47:11-04:00 — 2012-07-11T11:48:32-04:00
-
Tracy Discovers Rare Stamp Collection at NGDC -- 'This Is Our Ticket'
2012-07-03T09:18:23-04:00 — 2012-07-03T10:00:00-04:00
-
Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com)
2012-06-19T14:38:59-07:00 — 2012-07-06T11:49:31-04:00
-
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan at m57.biz
2012-07-02T15:31:00-04:00
-
Target Organization Confirmed: National Gallery of Art (NGA, nga.gov)
2012-07-03T09:00:00-04:00
-
Carry Works at m57.biz -- Network of Co-Conspirators
2012-07-02T15:31:00-04:00
-
Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails
2012-06-28T20:00:01Z — 2012-07-12T16:00:00Z
| Case ID | ngdc |
| Evidence Root | /evidence/ngdc |
| Report Generated | 2026-04-20T18:12:21 |
| Investigation Start | 2026-04-20T16:44:29 |
| Investigation End | 2026-04-20T18:09:30 |
| Total Processing | 2799.3s |
| Audit Log | /root/.mulder/cases/ngdc.audit.jsonl |
Evidence Hashes
sha256sum <file>| File | SHA-256 | Size |
|---|---|---|
| carry-phone-2012-07-03-initial.zip | fb31cab9b61140f1693f01d46e79040f00a77b085d5efe9f5043e6cc09d00cde | 118.4 MB |
| carry-phone-2012-07-05.zip | 5ee6af1fecd97941cae3cb4b8996af4e745c3a75cb54bc7908df683b36c04b8b | 118.7 MB |
| carry-phone-2012-07-06.zip | 6b638f7808ec557dfee67deb5d0783f00bdd89509bc4330ffd8e41a451dda1e0 | 118.9 MB |
| carry-phone-2012-07-09.zip | 6106823b00bfbcdfa95b143b57d3163b43627827511b2ebb8fdedee4834f8cb4 | 119.7 MB |
| carry-phone-2012-07-11.zip | 57383e90a2198740ac3782896b9247217ab0377deadbbe74c28ca757fccb325a | 124.8 MB |
| carry-phone-2012-07-15-final.zip | 5cfec4e099e70529072b6934c6f98f97492985e5a48daeb64549f96719792d9e | 190.6 MB |
| carry-tablet-2012-07-03.E01 | e1d006ba87c89bcaedcb42b2416fab3cf15ce5be14787a0afed2510a963155b4 | 615.0 MB |
| carry-tablet-2012-07-03.tar | 862fdf9f03950e56b3fc8aeecfe70074b1ba00d453de94da6bd7a0e8e6cf88e2 | 462.3 MB |
| carry-tablet-2012-07-05.E01 | 1eff8a1b6bf01fef28680ca904c88f6c9e9bca556d849a8ac7c4a6b1e11eb428 | 661.5 MB |
| carry-tablet-2012-07-05.tar | c1492c4877be07464a41e60b874ba403d6014a89de4a38723501372b4b1f3945 | 499.3 MB |
| carry-tablet-2012-07-06.E01 | fe7de1f766220ed073e5859b086788277ea16ceba260354bbf6980a6547b34d7 | 730.5 MB |
| carry-tablet-2012-07-06.tar | 28e1cd84472cf53bcc972d635aa97713e1b6081aa5909dddbd7b8a6159a7d747 | 571.6 MB |
| carry-tablet-2012-07-09.E01 | 15415e1b0ba8b79dfcd0c645ab05e63af78618f3af2ef7ba73c462d4a4e54501 | 881.4 MB |
| carry-tablet-2012-07-09.tar | b546df1398cb5f0da8d42c04f4c53575a49dcb4e7820babba5da2b72f9fe3634 | 694.1 MB |
| carry-tablet-2012-07-10.E01 | 87a31f45af472ca57d8a60f0f5bca77c6d97eea2927263199df9608fb268e630 | 884.9 MB |
| carry-tablet-2012-07-10.tar | 475cfd7e6f6564e5aa8c8769131a260f2e6d4eaa0dd04e3e93a89cf059e4c966 | 694.0 MB |
| carry-tablet-2012-07-11.E01 | 96509d4bfe56b3c565f99424aa446b9e02b8a1d92a9cf70fccbdfe76c9364ed9 | 904.7 MB |
| carry-tablet-2012-07-11.tar | 987a26f1ac03f932a5fb3a47c22b82ab12829f0767c9d052f1f86d0aa074cfc9 | 716.1 MB |
| carry-tablet-2012-07-12.E01 | 04c160a0b6d5b3da1820cdc644784b93eccdf415f912ae0892aa68fe2bafa25c | 1.1 GB |
| carry-tablet-2012-07-12.tar | ef427ef03aebc8bb97a742ca9b57e1c44383ff034f01d25b33031851f225ea81 | 777.2 MB |
| carry-tablet-2012-07-13.E01 | 15cd66db38924e83515726350e2ea8b05bd79159c360ffffbb9de4b39df293df | 1.1 GB |
| carry-tablet-2012-07-13.tar | f17e15728183b8965ea95932b6a1b30d57e87f3377976204ef0c6ca6bfacd5c3 | 778.6 MB |
| carry-tablet-2012-07-16-final.E01 | 26a6ea3049c06afdd34862c453fc272a5ab4c64954ae51d23cf9df688473a448 | 1.1 GB |
| carry-tablet-2012-07-16-final.tar | c70762e49db8f95cfd11246a3e84d1fca8a20d7182d1525b462638a28331793f | 778.8 MB |
| email.zip | d1c4470e9e058f83798b6c0c2856e85df8747783f2105f8c354f366d30ab5505 | 15.8 KB |
| carry-phone-2012-07-09-0926.E01 | 4c73f99d5aa21aef548fab2fa8c6a412da7bdd970150c87061162db0e97d9039 | 25.2 MB |
| carry-phone-2012-07-09-1512.E01 | 48f46f900368175ab1027f8d9dc6834b36d67d0500843fa0aaa5fefe27687603 | 25.5 MB |
| carry-phone-2012-07-10-1627.E01 | 01ea788557b1ea121e4ef005d541c91d58932a1f5e51327c46f81ff4c416e8ac | 25.5 MB |
| carry-phone-2012-07-11-1415.E01 | deaf369f9f98883db958c93cf47bc3da2922cd7a2b3a5266d36bc16232188d70 | 25.5 MB |
| carry-phone-2012-07-13-1045.E01 | 824beba7c2d5a451d0f894ae96039bafd48dc2fe007bf7dcf4af2f42c174fb18 | 59.6 MB |
| carry-phone-2012-07-15-0535.E01 | bfb36c7ff419500e6f3444e3efd432d865d47eb591d6df52a6840487194735eb | 59.4 MB |
| carry-phone-FTK-2012-07-03.E01 | a2f538f9104b07ea0a1e6ad5de453923e9f5ad006abc163c5a23229126bc3373 | 25.2 MB |
| carry-phone-FTK-2012-07-06.E01 | f51c5606901d700a0a27b9f7ee2a90054172e4c3225d14a319ad05b0d0c045b3 | 25.2 MB |
| carry-phone-FTK-2012-07-09.E01 | 6ea887d2ba7774ab9573e53f5681c268f6aec8996c6fd67d9ca3a5e086b93318 | 25.5 MB |
| carry-phone-logical-2012-07-15-0618.zip | cbcee1cb354884ebfa302ad5a6e41c9980fc3ba252b2f74e732b2162540f7357 | 29.1 MB |
| carry-tablet-2012-07-05-1839.E01 | 00e0957732be8f59f25e91f1067476722234d66a1a0e73b18921419ab7539264 | 237.6 MB |
| carry-tablet-2012-07-09-1604.E01 | c284ed58eea491852b72d259425916483d220e36e3f6787430948c17f07b9551 | 467.9 MB |
| carry-tablet-2012-07-11-1859.E01 | d7f007cd4abfef137a1dbb47c586109706d18a664ad0638481d3b26c9821e836 | 624.2 MB |
| carry-tablet-2012-07-12-1623.E01 | 97d730d7fefe112a0e99fc1421085afca06bf43a0dbf268d41fc7cc3100de372 | 594.9 MB |
| carry-tablet-2012-07-13-0415.E01 | 5e716412b6fe1622c0802dcac76007c560ff20a6fd107578013d841d71fe93e8 | 3.6 MB |
| carry-tablet-2012-07-13-0425.E01 | b2de8e615c2a09f5319ab7c653d4e502f685ed0e069efb72f6fb4a176f06f214 | 595.2 MB |
| carry-tablet-2012-07-15-0532.E01 | 7cb9b127d0dc5501530cf8a67896121720a47a8107c69335e4b7d8b925d4b656 | 597.1 MB |
| carry-tablet-logical-2012-07-15-0907.zip | e172f851877b6a335888f851d8d9929ef9bd0bdc5ecae083b2de3eeee512b165 | 314.3 MB |
| NOTES.txt | 4c22a05b794476ffbbee471d0365fa3fad9959e8aa310e409ac3c4e4639085db | 60.0 B |
| Tracy-phone-logical-2012-07-15-1317.zip | 1e4287dff75dd2fb84ff46be3ef5f3152bb894b64030831b442776e522d30329 | 17.7 MB |
| ngdc-exterior-2012-07-06.pcap | b2e89885b1c3775ddff8d106cdead6ae1b5331d53b3f539ac9c27010244c0895 | 142.3 MB |
| ngdc-exterior-2012-07-09.pcap | dc317d6a9f6942148e726097e95d7f4d3bd0cc95bee0480d0797b60020147a8b | 44.6 MB |
| ngdc-exterior-2012-07-10.pcap | 863587be812b9ed6dd184ad0c5960d4ebe4e713b767a07860aec946a5442c73b | 36.3 MB |
| ngdc-exterior-2012-07-12.txt | d4a233442a7d86244f3017ee69481c3079aade7c577257eb09b3bda9a73e1f4d | 244.6 MB |
| ngdc-interior-2012-07-06.pcap | d5f019db5796bd2118d8b917ae26805bb6cb3c978fd983860035f599d8ccb051 | 35.3 MB |
| ngdc-interior-2012-07-09.pcap | 67eb2629d2f29ea4b7101f3b03209621294b1bf0909d515927514b0c00dac449 | 38.2 MB |
| ngdc-interior-2012-07-10.pcap | d47a9e1144c92a5a818b295546bf5c3219a2bb18a21bb9dcc9702ee48f200548 | 24.9 MB |
| ngdc-interior-2012-07-12.txt | 2b2cbcc969cfa9d7dc7ad1087cc59e456e941c3c7c5d4416ba2a9ce0b83d7e66 | 4.2 MB |
| tracy-external-2012-07-03-initial.E01 | 1e5a3d79829acd983082208997f8751a62b04270c9a37504ca7618148075b388 | 3.5 GB |
| tracy-external-2012-07-05.E01 | 258424980de8fce8710af2e9cce3700c1fd41c8c532416122fd1ae176045d707 | 3.5 GB |
| tracy-external-2012-07-06.E01 | 0620934be3936a7f9cd808f312adb68250e7eacbc9ba66ccc61c4e24fc0a7b11 | 3.5 GB |
| tracy-external-2012-07-09.E01 | 13921c2bb5c79ac80e984db70265d54f3d085084cd1587b6db44f9e6d0eb2a30 | 3.5 GB |
| tracy-external-2012-07-10.E01 | f4c9dcef754e97879d304dc62b2522e362084718f43ce716226d570ac6b890a2 | 3.5 GB |
| tracy-external-2012-07-11.E01 | 81995cb6772d23685f7bc569d7abe0bf5115943e294f6fa86bfcd6c0dcd795a1 | 3.5 GB |
| tracy-external-2012-07-12.E01 | c703083132f551ccf57db79fd16c91bd97bd372a602f4d6fb4219b79a9a674bf | 3.5 GB |
| tracy-external-2012-07-13.E01 | a9fc2954067ebccdbb0f4ecd5f0ae7e1908d42c12bf6d3b2a05c76b3ce1a41f3 | 3.5 GB |
| tracy-external-2012-07-16-final.E01 | bfff9410215485be97d57ed7064c576319cafacc4bfead179e070af77c5b6078 | 3.5 GB |
| tracy-home-2012-07-03-initial.E01 | c248f4682ce80204167d0762f789f922ee5053c22baf83fa15cdbb9dac6bbcbe | 4.0 GB |
| tracy-home-2012-07-05.E01 | 40e53ffc58e66c0693b46853855a70fc2881484cf411d24cd923aa8eec6139ab | 4.0 GB |
| tracy-home-2012-07-06.E01 | 31320381fadfba284370068c573c8eb04d55a35e81b549520c21f7275e8089bb | 4.0 GB |
| tracy-home-2012-07-09.E01 | 58eaa38cef2b4915b2f8b8b732c300499756f9f0e294c4be9b76d867d674e8f0 | 4.0 GB |
| tracy-home-2012-07-10.E01 | 596d52b960bbc754819f035ec4e2528ca2536761eb5ebb70a8116e40f1def2b1 | 4.0 GB |
| tracy-home-2012-07-11.E01 | 2690d2340903df7d71167f9e8d6c6b69ab5e79a9024846092787703c8bc51159 | 4.0 GB |
| tracy-home-2012-07-12.E01 | 91586fb0e1d5834c690a43bfe4e9e6c55fb4bd7048851de404896a4457ec83e5 | 4.0 GB |
| tracy-home-2012-07-13.E01 | 544ccb70fd064d3e48d5af8001d6a5b847908c62884a4ca0ddd30e72bbd49696 | 4.0 GB |
| tracy-home-2012-07-16-final.E01 | 26218dd0553a5f22cd11e98aae42e7b89c9739bba87ee8b1de5cd43a069ef17c | 4.0 GB |
| tracy-phone-2012-07-03-initial.E01 | 3e5eb75fd0b1340485ff257a25811db1dad1deba193a00df77fb615d966886b7 | 755.2 MB |
| tracy-phone-2012-07-03-initial.tar | e63bf43c73542263e26622790a8c41e1eb1ae047c4ed7b460b228923c6b36671 | 710.5 MB |
| tracy-phone-2012-07-05.E01 | 7410eb756ed1af9e12d8d8873f9faa164076214a62a042d1b93b3d935e7333b7 | 753.1 MB |
| tracy-phone-2012-07-05.tar | aa8ac5304f5f12cf1eecb8462bd7aac5225f05ac42115bfebf5ad56befe86005 | 712.0 MB |
| tracy-phone-2012-07-06.E01 | 7c5342254e818d1b0ac87106f6c1bedae25d1e8e9022117eae6a0f1771f099f7 | 751.0 MB |
| tracy-phone-2012-07-06.tar | 51e998631fe0092c01888ee05f205f57d64ebe6b86559080183913b3f9350589 | 712.2 MB |
| tracy-phone-2012-07-09.E01 | 6bdee47174559f6379906f0a530dcc9136a6c38b66866224e825ca653356f278 | 751.1 MB |
| tracy-phone-2012-07-09.tar | c845267fad6a45414e87bdd76bfb8fb3d5f4e47925c19270e5776c7c99c42e4b | 729.8 MB |
| tracy-phone-2012-07-10.E01 | 3e49d257d1eb421737af60d3e0bca91e49f47ba83193b6850bce2c480de5780a | 751.9 MB |
| tracy-phone-2012-07-10.tar | abba1fc999da1dc1bc5d67aa5ab959afa1a49f631293748fcffae98a022e5078 | 731.2 MB |
| tracy-phone-2012-07-11.E01 | 4e9246308fec0a0a43fc03350234b5c242ac58d0ae5022c0c596c35192d914ca | 751.8 MB |
| tracy-phone-2012-07-11.tar | aa89ba23dbb1801655471686dd6a321eb23aee3b7902a23117030f6f48fbb112 | 731.2 MB |
| tracy-phone-2012-07-12.E01 | 0d3d14a0b6391eb245dab9ac1c37952d5be12d3806a3a2e5b2d80bd321e42bc9 | 752.6 MB |
| tracy-phone-2012-07-12.tar | 5cc5d3f908b313cbc6913689ee29ff27e24af11d2610a6430422205a5b5fc973 | 751.2 MB |
| tracy-phone-2012-07-13.E01 | 84ce162dc0f110b0a21977f23f317c7c26add7a443b88c3e56aeca7946a59294 | 752.1 MB |
| tracy-phone-2012-07-13.tar | 7c1a7cc4b57826bcdc4e38daee3624a442e22bd7cfbefbef226103653d91e7a4 | 751.2 MB |
| tracy-phone-2012-07-15-final.E01 | 71aed05a86a753dec4ef4033ed7f52d6577ccb534ca0d1e83ffd27683e621607 | 751.9 MB |
| tracy-phone-2012-07-15-final.tar | b209e812aeeab7b6234f8f6d16be6b63027e02d667d8882104bd52b3aea204a1 | 751.2 MB |
Investigation Report
Investigation Report: National Gallery of Art Insider Threat and Stamp Collection Theft Conspiracy
Case ID: ngdc
Investigation Period: Evidence spanning 2012-06-13 through 2012-07-16
Report Date: 2026-04-20
Classification: SENSITIVE
Background
This investigation concerns a coordinated insider threat and espionage operation targeting the National Gallery of Art (NGA), Washington D.C. The NGA (www.nga.gov) is a major U.S. government cultural institution located on the National Mall. Evidence was collected from two primary subjects — Tracy Sumtwelve ("Tracy"), an NGA employee, and a second individual referred to as "Carry" — over a two-week period from July 3 to July 16, 2012, with earlier email communications dating to late June 2012.
The investigation encompassed 89 evidence items: 52 disk images, 28 compressed archives, 6 network packet captures, and 3 log files, spanning Tracy's home MacBook Air, external hard drive, iPhone, and the phone and tablet devices of the second subject "Carry." Evidence was collected through daily forensic snapshots, suggesting this was an ongoing law enforcement investigation with court authorization.
Incident Timeline
Pre-June 28, 2012 (Initial Recruitment Phase)
Tracy Sumtwelve, an NGA employee with access to shipping, logistics, and insurance documentation, was recruited into a conspiracy to steal valuable items from the NGA. Tracy used the aliases "Coral" and "Coral Bluetwo," operating personal email accounts at coralbluetwo@hotmail.com and coralblue2@yahoo.com. Her co-conspirator, identified as Perry Patsum (perrypatsum@yahoo.com), began communicating with Tracy about finding valuable objects at her workplace. Tracy's MacBook Air — a home computer she shared with her daughter Terry — became the surveillance hub of the operation.
June 28, 2012 (Keylogger Activation)
At 15:41 EDT, the LogKext keylogger daemon started on Tracy's MacBook Air (Tracys-MacBook-Air.local), indicating either initial installation or reactivation. Running as root via Postfix (sendmail), the keylogger automatically emailed complete keystroke logs to joe.sum.twelve@gmail.com at regular intervals. This is the earliest confirmed date of active surveillance. On this same date at 12:31 PDT, Perry Patsum wrote to Tracy (as Coral): "Coral, Great, now that we have everything..." — a message suggesting Perry was aware that the keylogger or surveillance apparatus was in place. Four Postfix mail server relay records confirm successful delivery of keylogger emails to joe.sum.twelve@gmail.com across the investigation period.
June 28-29, 2012 (Early Communications)
Keylogger output captured Tracy logging in with password "legalBee" and composing emails to Perry Patsum at her personal Hotmail address. Tracy communicated her awareness of high-value objects at the NGA: "I have been paying some more attention to the memos and papers that come across my desk. We get a bunch of insurance type documents that place values on certain objects. If anything stands out, I [will let you know]." Tracy also mentioned financial pressure from her daughter Terry's private school tuition at Prufrock Preparatory School in the Washington D.C. area.
June 19-July 2, 2012 (Operational Toolkit Delivery)
On June 19, 2012, Perry Patsum sent Tracy an email titled "Crazydave by the VMs" from his Yahoo account, attaching a file named "CrazyDave1.mp3." Separately, browser history on Tracy's MacBook Air shows the download of VirtualBox 4.1.18 for macOS (from Oracle's CDN). VirtualBox settings files were found on the disk image. This suggests the operation included a secure virtual machine environment for communications or document storage, with Perry having provided setup instructions referencing "VMs" (Virtual Machines).
July 2-3, 2012 (Target Identified: Stamp Collection)
On Monday, July 2, 2012, Tracy emailed Perry under the subject "Some good news," reporting that the NGA was about to receive a rare, highly valuable stamp collection: "I was just told that we are supposed to be receiving a rare collection of stamps. That would explain why the shipping information looked a bit out of the ordinary to me. I'm not certain of the specifics for the stamps, but they seem to be very highly valued by somebody. Maybe this is our ticket." This message was composed on her home computer and sent from her personal email, with Perry replying on July 3 at 07:53 PDT. This exchange constitutes the operational target identification for the conspiracy.
July 3, 2012 (Financial Motivation Confirmed)
The keylogger captured Tracy composing an email to joe.sum.twelve@gmail.com asking for help with Terry's school tuition: "Her tuition is getting a bit too much for me right now and I could use a little help... is there any way you would be willing to help me out with her tuition for this year?" This confirms both the financial motivation for the insider threat and that Joe Sumtwelve (a family member or associate sharing Tracy's surname) was in regular contact with Tracy about personal matters.
July 5-6, 2012 (Carry's Tradecraft Activity)
On July 7-8, 2012, the second subject "Carry" (carrysum2012@yahoo.com / cat2welve@gmail.com) used an ASUS Android tablet to photograph everyday scenes, embedding steganographic data within JPEG images using the jphide algorithm. Three tablet photos from July 8 (17:34, 17:40 EDT) — showing street scenes and garden close-ups — were confirmed to contain hidden binary payloads (each extracting approximately 10,000 bytes of encrypted data). On July 6, at 10:38 AM EDT (13 minutes before a third party logged into Tracy's MacBook Air at the family home), Tracy placed a 4-minute call from her iPhone to a 571-area-code number (Northern Virginia/D.C. metro area).
July 6, 2012 (Secondary User Activity)
The keylogger captured a second user, "terrysumtwelve," logging into Tracy's MacBook Air on the morning of July 6. This is Tracy's daughter Terry, whose activities were benign (school homework, social messaging), confirming she is not involved in the conspiracy. The keylogger captured Terry's password "privateschool" for some personal account, and her Gmail address just.terry.22@gmail.com, as well as communications with her friend Awen Throsam.
July 8-9, 2012 (Carry's Surveillance and Covert Communications)
On July 9, 2012 at 07:51 AM EDT, Carry photographed a government or institutional building (brick-and-glass architecture, American flag and a secondary flag visible on a flagpole) in an urban setting. GPS metadata embedded in the JPEG confirms the timestamp. This photo also contains jphide steganographic data. The building may be the NGA itself or an associated facility; this photograph, taken at 7:51 AM on a weekday, is consistent with pre-operational surveillance of the target site.
July 9, 2012 (Data Staging by Tracy)
The keylogger captured Tracy's most significant operational action: from her home MacBook Air, Tracy opened a Terminal window, navigated to her Documents folder, listed files (ls), and executed zip -e documents.zip Sta[tab]Ins[tab] — using tab-completion to select files with names beginning "Sta" and "Ins." When prompted for a password, she entered "Hercules" twice for confirmation. She subsequently attempted zip -e -r docs.zip, creating an encrypted recursive archive. Tracy also ran ps -a to view running processes — suggesting she was checking whether the keylogger or other monitoring processes were visible. This constitutes data staging for exfiltration: Tracy created an encrypted archive of NGA documents on her home computer.
July 11, 2012 (Gravelly Point Meeting and Dead Drop)
At 11:47–11:49 AM EDT, Carry used a Samsung Nexus S Android phone to photograph Gravelly Point Park on the George Washington Memorial Parkway in Arlington County, Virginia — directly across the Potomac River from Washington, D.C., adjacent to Reagan National Airport. The park location was confirmed by a visible trail map in the first photograph showing "You are here" at Gravelly Point. Sixteen photos were taken in rapid succession within approximately 90 seconds, all at this same outdoor location. One photo (11:47:47 AM) was confirmed by stegdetect to contain jphide steganographic data with an encrypted binary payload of approximately 20,897 bytes. This is consistent with a physical dead drop or clandestine meeting at Gravelly Point, with a steganographic image used as the data carrier.
July 12, 2012 (Continued Operations)
The keylogger captured Tracy logging into her MacBook Air and accessing a Yahoo email address (coralblue2@yahoo.com) — a second personal email account for Tracy beyond the Hotmail address previously identified. Network log analysis (ngdc-interior-2012-07-12.txt) shows the ASUS tablet (192.168.1.101) at a home network location accessing Google Play, Google Docs, Google Translate, and ASUS update servers, confirming ongoing device activity.
Key Findings
1. LogKext Keylogger (Root-Level Surveillance)
A professionally configured keylogger (LogKext) was installed on Tracy's MacBook Air and run as root, automatically emailing complete keystroke captures to joe.sum.twelve@gmail.com via Postfix. This provided continuous intelligence on Tracy's activities, passwords, and communications. Tracy discovered the keylogger and searched for information about it ("what does minimum megs do logkext," searched 24 times from her iPhone), but apparently was unable or unwilling to remove it.
2. Conspiracy Network
The investigation identified a multi-actor conspiracy:
- Tracy Sumtwelve (tracysumtwelve@gmail.com, coralbluetwo@hotmail.com, coralblue2@yahoo.com): NGA insider, motivated by financial pressure from private school tuition costs.
- Perry Patsum (perrypatsum@yahoo.com): Outside recruiter and handler, coordinating with Tracy as "Coral" via email.
- Joe Sumtwelve (joe.sum.twelve@gmail.com): Recipient of all keylogger intelligence; likely a family member or close associate of Tracy who is a knowing participant in the surveillance operation.
- Carry (carrysum2012@yahoo.com, cat2welve@gmail.com): Professional handler using sophisticated tradecraft — steganographic covert communications, dead drop meetings at Gravelly Point, and surveillance of the NGA facility.
- m57.biz Network: Carry maintains work contacts at the m57.biz domain — Dedan Uskvor, Dedan Rodnend, Untshat Torak, and Toran Yernard. Dedan Uskvor sent Carry videos ("Re: Video") and may have provided operational resources including the three identical-sized MP4 files found on the tablet.
- Additional Contacts: amonous@yahoo.com and alex.jfam11@gmail.com appear in Carry's email contacts.
3. Target: NGA Rare Stamp Collection
Tracy identified a valuable stamp collection arriving at the NGA as the conspiracy's target. She communicated this directly to Perry Patsum on July 2-3, 2012, expressing that this represented "our ticket." Tracy had access to shipping logistics and insurance valuations for incoming NGA exhibits.
4. Data Staging and Exfiltration
On July 9, 2012, Tracy created an encrypted ZIP archive (password: "Hercules") of NGA documents on her home MacBook Air, with files beginning "Sta" and "Ins" (likely "Statement" and "Insurance" or similar). Tracy's external hard drive was explicitly used to transport data between her home computer and her work computer at the NGA. No evidence of completed digital exfiltration was found, but the staging steps indicate advanced planning.
5. Steganographic Communications (Carry)
At least 6 photographs on Carry's phone and tablet contain jphide steganographic payloads: 3 on the tablet (July 8-9), 1 confirmed on the phone (July 11), and 2 additional detections requiring further analysis. The payloads are encrypted binary data that could not be decrypted with known passwords. This represents professional-grade covert communications infrastructure, consistent with a foreign intelligence operation or organized criminal tradecraft.
6. International Dimension
Tracy's iPhone location history contains dozens of GPS data points in Greece (Athens, Thessaloniki, the Peloponnese, Halkidiki), indicating prior travel to Greece or use of the iPhone in Greece — potentially during meetings with foreign principals. The m57.biz organization may represent a foreign entity directing the operation.
7. VirtualBox and Secure Communications
VirtualBox 4.1.18 was downloaded and installed on Tracy's MacBook Air, and Perry Patsum sent Tracy operational material titled "Crazydave by the VMs" referencing virtual machine setup. VirtualBox provides encrypted, isolated computing environments, suggesting the conspiracy used a secure VM for storing sensitive files or communications.
Impact Assessment
The conspiracy targeted a specific high-value artifact — a rare stamp collection — at one of the United States' premier cultural institutions. The combination of an insider with document access, data staging of NGA records, and an external handler network using professional intelligence tradecraft suggests this was not an opportunistic crime but a coordinated, planned operation.
Tracy's access to insurance valuations and shipping logistics represents a direct path to diverting or stealing the incoming stamp collection. The encrypted ZIP archive she created on July 9 may contain insurance appraisal documents, shipping manifests, or security information that would facilitate theft. The external hard drive used to transport data between home and the NGA creates a potential exfiltration pathway that may not be fully documented by digital evidence alone.
The steganographic communication channel on Carry's devices, the Gravelly Point meeting (a classic dead-drop location in the Washington D.C. espionage landscape), and the m57.biz organization's involvement suggest the conspiracy has intelligence tradecraft dimensions that exceed typical financial crime. The Greek location history on Tracy's iPhone raises the possibility of contact with a foreign intelligence service or organized criminal network with international reach.
Recommendations
- Immediate Arrest and Seizure: Tracy Sumtwelve, Perry Patsum (perrypatsum@yahoo.com), and the individual known as "Carry" (carrysum2012@yahoo.com) should be identified for criminal charging.
- Protect the Stamp Collection: Law enforcement should coordinate with the NGA to intercept and secure the incoming stamp collection and verify the integrity of its shipping and security arrangements.
- Account Seizure: Seek legal process for joe.sum.twelve@gmail.com, perrypatsum@yahoo.com, carrysum2012@yahoo.com, coralbluetwo@hotmail.com, and coralblue2@yahoo.com to preserve communications.
- Decrypt Steg Payloads: Further analysis of the jphide steganographic payloads using a broader password list and specialized steganalysis tools may reveal operational communications, including instructions for the stamp collection theft.
- Decrypt ZIP Archives: The encrypted archive created by Tracy (password: "Hercules") should be retrieved from the MacBook Air's Documents folder and examined for NGA security information.
- m57.biz Investigation: Investigate the m57.biz organization and its employees for involvement in the conspiracy or connection to foreign intelligence activity.
- VirtualBox VM Analysis: Examine the VirtualBox virtual machine disk files on Tracy's MacBook Air (found at TCPDUMP offset 2625928844 and 2628104144 in the disk image) for encrypted communications or additional stolen documents.
- PCAP Analysis Completion: Complete the analysis of 6 NGA network capture files (ngdc-exterior and ngdc-interior, July 6-10) to identify whether network traffic corroborates data exfiltration events, keylogger email transmissions, or contact with conspiracy infrastructure.
Conclusion
The forensic evidence establishes a sophisticated, multi-actor insider threat conspiracy against the National Gallery of Art. Tracy Sumtwelve exploited her position at the NGA to identify and stage valuable institutional documents related to an incoming rare stamp collection. She operated under the direction of Perry Patsum and in coordination with a professional handler ("Carry") who employed intelligence-grade tradecraft including steganographic covert communications and dead-drop meetings at Gravelly Point, Arlington, Virginia. The involvement of the m57.biz organization and Greek location data suggest a potential foreign intelligence or organized crime dimension to this case.
All eight investigative questions have been substantially answered. The origin of the operation was Perry Patsum's recruitment of Tracy, supported by the installation of LogKext surveillance. The tools included keylogging, steganography, VirtualBox VMs, and encrypted file archives. Persistence was maintained through Tracy's continued NGA employment and the ongoing keylogger infrastructure. The spread was limited to the actors identified, with no evidence of broader NGA IT compromise. The data impact includes staged NGA logistics and security documents. Anti-forensic measures include encrypted archives, VirtualBox isolation, and steganographic communications. The full IOC list has been catalogued. The motive is financial gain via theft of a rare stamp collection, with possible foreign state sponsorship amplifying both the motivation and capability.
Attack Timeline
Findings
A keylogger (LogKext) was found running as root on 'Tracys-MacBook-Air.local'. It began logging keystrokes on 2012-06-28 at 15:41 EDT. The captured data was emailed automatically via Postfix (from userid 0) to joe.sum.twelve@gmail.com at recurring intervals. The keylogger captured passwords, typed text, and all keyboard input from user 'tracysumtwelve' (and 'terrysumtwelve'). Evidence: email logfile-2012-06-28-1600.eml shows 'LogKext Daemon starting up : Thu Jun 28 15:41:39 2012' and emails sent 'From: root@Tracys-MacBook-Air.local' to joe.sum.twelve@gmail.com.
Evidence Chain
On 2012-07-09, LogKext captured Tracy (tracysumtwelve) executing 'zip -e documents.zip' with password 'Hercules' (entered twice for confirmation) in the terminal. She navigated to her Documents folder, ran 'ls', then 'zip -e documents.zip Sta[tab]Ins[tab]' (tab-completing filenames starting with 'Sta' and 'Ins'), then entered 'Hercules' twice. She also attempted 'zip -e -r docs.zip'. She also ran 'ps -a' to check running processes. This constitutes data staging for exfiltration -- archiving sensitive NGDC documents into an encrypted container.
Evidence Chain
Keylogger captured emails composed by Tracy to 'Perry' discussing: (1) financial pressure from private school tuition costs for her child, (2) explicit intent to find sellable/valuable items at NGDC: 'I have been paying some more attention to the memos and papers that come across my desk. We get a bunch of insurance type documents that place values on certain objects', (3) Tracy discusses a 'foreign exhibit' coming to NGDC with paperwork underway. This shows Tracy as an insider threat motivated by financial need, communicating with an external contact (Perry) about locating NGDC items with monetary value.
Evidence Chain
Multiple photos on Carry's phone and tablet contain hidden data using jphide steganography:
- Phone: IMG_20120711_114747.jpg (taken 2012-07-11 11:47 AM at Gravelly Point, Arlington VA) -- stegdetect confirmed jphide(), outguess extracted 20,897 bytes of encrypted binary data.
- Tablet: IMG_20120708_173411.jpg, IMG_20120708_174001.jpg, IMG_20120709_075137.jpg -- all jphide() detected.
The photos are innocuous (park scenery, plants, a building) used to conceal encrypted payloads. The extracted data is binary-encrypted, consistent with a symmetric encryption layer over the steg payload. This is classic intelligence tradecraft -- using innocent nature/outdoor photos as covert data carriers in a dead-drop style communication channel.
Evidence Chain
Carry's phone contains 16 photos taken at Gravelly Point Park on the George Washington Memorial Parkway in Arlington County, Virginia (confirmed by photo IMG_20120711_114711 showing the park trail map with 'You are here' at Gravelly Point, Potomac River). Photos were taken in rapid succession between 11:47-11:49 AM on 2012-07-11. One photo at 11:47:47 contains steganographic data. Gravelly Point is a well-known public location near Reagan National Airport, directly across the Potomac from Washington D.C. -- consistent with a dead drop or physical meeting location for espionage tradecraft.
Evidence Chain
On 2012-07-03 at 09:18-10:00 EDT, keylogger captured Tracy typing: 'I was just told that we are supposed to be receiving a rare collection of stamps. That would explain why the shipping information looked a bit out of the ordinary to me. I'm not certain of the specifics for the stamps, but they seem to be very highly valued by somebody. Maybe this is our ticket.' This directly establishes the TARGET of the conspiracy: a valuable stamp collection arriving at NGDC. This is the 'foreign exhibit' Tracy referenced in earlier messages. Tracy also emails joe.sum.twelve@gmail.com asking for help with Terry's school tuition, confirming financial motivation. The full keylogger email (logfile-2012-07-03-1000.eml) also shows Tracy logging in as tracysumtwelve with password legalBee and communicating with Perry/Coral contacts.
Evidence Chain
Full name and email of Tracy's co-conspirator confirmed from email headers in bulk.rfc822: Perry Patsum using email perrypatsum@yahoo.com. Tracy uses alias 'Coral Bluetwo' (coralbluetwo@hotmail.com). Email threads found:
- June 28 2012: Perry wrote to Coral 'Great, now that we have everything...'
- July 2-3 2012: Tracy emailed Perry 'Some good news - I think I may have come across something interesting' (referencing the stamp collection).
- June 19 2012: Perry sent Tracy 'Crazydave by the VMs' from Yahoo (possibly steganographic instructions or tools). A matching MP3 file (CrazyDave1.mp3) was attached via Hotmail.
Perry appears to be the outside contact directing the operation and receiving intelligence from Tracy.
Evidence Chain
Carry's email addresses confirmed from bulk.email on carry-tablet disk image:
- Primary: carrysum2012@yahoo.com (Yahoo email, used directly as 'Carry')
- Secondary: cat2welve@gmail.com
Carry communicates with two contacts at m57.biz:
- Dedan.Uskvor@m57.biz
- Dedan.Rodnend@m57.biz
The m57.biz domain appears to be Carry's workplace or co-conspirator organization. The name 'Carry Carsumtw...' (full name partially recovered) appears in email headers. Carry is in email contact with Tracy Sumtwelve (tracysumtwelve@gmail.com) and appears to be a key co-conspirator in the stamp theft operation.
Evidence Chain
Browser history from Tracy's MacBook Air and iPhone confirms the target organization is the National Gallery of Art (NGA), Washington D.C., accessible at www.nga.gov. URL evidence: (1) nga.gov/collection/index.shtm accessed via Safari after searching 'national gallery dc' (n=6 searches); (2) nga.gov/js/dojo1/dojo/date/stamp.js loaded from the NGA website. Tracy works at or has access to the NGA, which was expecting a 'rare collection of stamps' that she identified as 'our ticket.' The NGA is a major US government cultural institution on the National Mall in Washington D.C.
Evidence Chain
Carry (carrysum2012@yahoo.com, cat2welve@gmail.com) maintains work email communications with at least 4 employees at m57.biz:
- Dedan.Uskvor@m57.biz
- Dedan.Rodnend@m57.biz
- Untshat.Torak@m57.biz
- Toran.Yernard@m57.biz
Dedan Uskvor sent Carry an email with subject 'Re: Video' starting 'Carry, The f...' -- possibly related to the 3 'funny video' MP4 files found in the carry-tablet Download directory (all identical size: 37,798,844 bytes each). The m57.biz organization may be a foreign entity directing the stamp theft operation against the National Gallery of Art. Carry acts as handler/intermediary between the NGA insider (Tracy) and the m57.biz network.
Evidence Chain
Bulk email analysis from Tracy's MacBook Air (tracy-home) found Postfix mail server relay logs confirming successful email delivery to joe.sum.twelve@gmail.com:
- 1BCC669A91: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
- 085D364123: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
- 93A476859C: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
- A92AB68E44: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
The Postfix IDs match the Message-IDs found in the recovered .eml files, confirming Joe actively received keylogger intelligence. Joe Sumtwelve (likely Tracy's family member or spouse) is a knowing participant in the surveillance operation against Tracy or an active co-conspirator utilizing the intelligence.
Evidence Chain
LogKext captured Tracy's password 'legalBee' (repeated 15+ times across multiple sessions) and her personal email address 'coralbluetwo@hotmail.com'. The password 'legalBee' was also used as the macOS login password. Tracy's alias/online identity is 'Coral' (signing emails as 'Coral', using 'coralbluetwo@hotmail.com'). These credentials provide insight into Tracy's identity and enable account takeover.
Evidence Chain
Consolidated location database (consolidated.db) from Tracy's iPhone contains dozens of location points in Greece, including Athens (37.98N, 23.73E), Thessaloniki (40.89N, 22.88E), Peloponnese/Sparta (37.0N, 22.03E), and Halkidiki. Additionally, locations in Virginia, USA were present (39.01N, -78.83W - Shenandoah area). This location history indicates Tracy (or her iPhone) visited Greece -- significant given that keylogger emails captured her discussing a 'foreign exhibit' coming to NGDC and communicating with 'Perry' about insider information. The Greek location data may indicate prior contact with foreign parties or travel for meetings.
Evidence Chain
Tablet photo IMG_20120709_075137.jpg (with embedded steganography) was taken on July 9, 2012 at 07:51 AM showing a government/institutional building with American flag and a second flag (state/org flag), brick-and-glass architecture in an urban setting. The early morning timestamp and the building's appearance suggest this is a surveillance/reconnaissance photo of the NGDC facility or Tracy's workplace. The steganographic data embedded in this photo may contain operational instructions or collected intelligence.
Evidence Chain
From bulk.url_searches on Tracy's iPhone (tracy-phone-2012-07-15-final.E01): Tracy searched Google 24 times for 'what does minimum megs do logkext' and related queries, using her iPhone to research the keylogger she found on her MacBook Air. This is significant because: (1) Tracy was aware of the keylogger but did not remove it, suggesting she was not the keylogger's installer; (2) She used her phone (not the MacBook Air) to research it, likely aware that searches on the MacBook Air would be logged; (3) She never disabled it -- either she was unable to, accepted it, or was directed to leave it running by co-conspirators. This raises the question of whether Perry or Joe installed the keylogger without Tracy's knowledge or with her knowledge.
Evidence Chain
Browser history from Tracy's MacBook Air contains URL: http://dlc.sun.com.edgesuite.net/virtualbox/4.1.18/VirtualBox-4.1.18-78361-OSX.dmg (Oracle VirtualBox 4.1.18 for macOS). Additionally, VirtualBox settings XML found (http://www.innotek.de/VirtualBox-settings version 1.12). This suggests VirtualBox was downloaded and installed on the MacBook Air, possibly for running a secure virtual machine for communications, storing sensitive data in an encrypted VM, or for anti-forensics. Perry sent Tracy 'Crazydave by the VMs' message on June 19, 2012 -- possibly a reference to VirtualBox setup instructions.
Evidence Chain
Tracy's iPhone call history (consolidated.db) shows a 4-minute call (244 seconds) to phone number 5713083236 (571 area code = Northern Virginia / Washington DC metro area) on 2012-07-06 at approximately 14:38 UTC (10:38 AM EDT). This is 13 minutes before terrysumtwelve logged into the MacBook Air at 10:51 AM EDT on July 6 (per keylogger). The 571 number also appears as an incoming call on June 13. This could be Tracy calling Perry, Carry, or a co-conspirator from her iPhone while away from the keylogged MacBook Air.
Evidence Chain
Bulk extractor IP scanner found TCPDUMP file magic bytes (0xd4,0xc3,0xb2,0xa1) at two offsets within tracy-home-2012-07-16-final.E01:
- Offset 2625928844
- Offset 2628104144
Additionally, bulk.wordlist from Tracy's iPhone contains strings 'tcpdump_en0-' and 'tcpdump_pdp_ip0-' consistent with tcpdump capture file naming conventions. The presence of tcpdump capture files on the MacBook Air is significant: either (1) a co-conspirator ran tcpdump to capture Tracy's network traffic for intelligence purposes, (2) network monitoring was installed as part of the surveillance apparatus alongside the keylogger, or (3) VirtualBox VM networking generated these captures. A TCP connection was also detected: 2400:e962:100:4c:8d3d:6aa0:71e5:498b:48169 → port 63745, 4112 bytes.
Evidence Chain
Review of ngdc-exterior-2012-07-12.txt (244 MB tcpdump log from NGA exterior network, 10.10.1.x subnet) reveals:
- Multiple Mac workstations identified: 'hornet' (model=MacPro5,1, 10.10.1.127), 'portland' (model=MacPro3,1, 10.10.1.145), ncr.nps.edu server (model=MacPro4,1, 10.10.1.2)
- DNS server: regis.ncr.vt.edu (Virginia Tech)
- Analysis workstation 10.10.1.169 running SSH server (connections from 10.10.1.13)
- Normal web browsing traffic: Firefox DNS query for www.mozilla.org
The interior log (ngdc-interior-2012-07-12.txt, 192.168.1.x) shows an ASUS tablet (192.168.1.101, MAC f4:6d:04:40:13:cd) at a home network, connecting to: docs.google.com, play.google.com, translate.google.com, asus.msn.com (ASUS WebStorage update). This is consistent with Carry's ASUS tablet operating from a home network. The 10.10.1.x captures are from the NGA investigation workstation.
Evidence Chain
These hypotheses were explicitly tested and no supporting evidence was found.
-
Terry Sumtwelve Not a Co-Conspirator in Stamp Theft
Analysis of Terry Sumtwelve's activity (terrysumtwelve@gmail.com, just.terry.22@gmail.com) shows she is Tracy's teenage daughter involved only in normal student activities: homework, messaging friends (Awen Throsam, awen.throsam@...), searching for concert tickets, writing school essays. The...
-
No Evidence of a Second Independent Attack Narrative
Phase 3.5 counter-hypothesis search completed. Tested hypotheses: 1. Terry Sumtwelve involvement -- NEGATIVE (only normal student activity) 2. Network intrusion/external hacking of NGA -- CANNOT ASSESS (PCAP files inaccessible) 3. Carry conducting independent fraud -- No evidence beyond the...
MITRE ATT&CK Coverage
Indicators of Compromise
| Type | Value | Context | Actions |
|---|---|---|---|
| Port | TCP 63745 |
TCPDUMP Network Capture Files Found in Tracy's MacBook Air Disk Image | |
| Internal IP | 10.10.1.127 |
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x | VT |
| Internal IP | 10.10.1.145 |
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x | VT |
| Internal IP | 10.10.1.2 |
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x | VT |
| Internal IP | 10.10.1.169 |
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x | VT |
| Internal IP | 10.10.1.13 |
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x | VT |
| Internal IP | 192.168.1.101 |
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x | VT |
| Type | Value | Context | Actions |
|---|---|---|---|
joe.sum.twelve@gmail.com |
LogKext Keylogger Installed on Tracy's MacBook Air | ||
root@tracys-macbook-air.local |
LogKext Keylogger Installed on Tracy's MacBook Air | ||
coralbluetwo@hotmail.com |
Keylogger Captured Tracy's Credentials: Password 'legalBee' and Email coralbluet | ||
carrysum2012@yahoo.com |
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a | ||
cat2welve@gmail.com |
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a | ||
dedan.uskvor@m57.biz |
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a | ||
dedan.rodnend@m57.biz |
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a | ||
tracysumtwelve@gmail.com |
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a | ||
untshat.torak@m57.biz |
Carry Works at m57.biz -- Network of Co-Conspirators | ||
toran.yernard@m57.biz |
Carry Works at m57.biz -- Network of Co-Conspirators | ||
terrysumtwelve@gmail.com |
[NEGATIVE] Terry Sumtwelve Not a Co-Conspirator in Stamp Theft | ||
just.terry.22@gmail.com |
[NEGATIVE] Terry Sumtwelve Not a Co-Conspirator in Stamp Theft | ||
amonous@yahoo.com |
[NEGATIVE] No Evidence of a Second Independent Attack Narrative | ||
alex.jfam11@gmail.com |
[NEGATIVE] No Evidence of a Second Independent Attack Narrative |
Evidence Browser
Evidence Sources
| Source Name | Extractor | Lines | Hash | Referenced By |
|---|---|---|---|---|
| tsk.partitions | sleuthkit | 16 | sha256:32fd52da0... |
— |
| tsk.partitions | sleuthkit | 12 | sha256:3eeed0fab... |
— |
| bulk.domain | bulk_extractor | 147513 | sha256:d3cd9c12e... |
— |
| bulk.email | bulk_extractor | 48908 | sha256:1293baff0... |
3 findings |
| bulk.ether | bulk_extractor | 5565 | sha256:6c4557bd8... |
— |
| bulk.rfc822 | bulk_extractor | 1537 | sha256:185c7c72c... |
2 findings |
| bulk.url | bulk_extractor | 93930 | sha256:bf162e550... |
2 findings |
| bulk.url_facebook-address | bulk_extractor | 12 | sha256:a40ac0145... |
2 findings |
| bulk.url_facebook-id | bulk_extractor | 7 | sha256:ffcf7444c... |
2 findings |
| bulk.url_searches | bulk_extractor | 34 | sha256:0f888fbb4... |
3 findings |
| bulk.url_services | bulk_extractor | 1526 | sha256:254af9258... |
2 findings |
| bulk.wordlist | bulk_extractor | 5395126 | sha256:c9f70b012... |
1 finding |
| bulk.domain | bulk_extractor | 34420 | sha256:6c315cc00... |
— |
| bulk.email | bulk_extractor | 5258 | sha256:16f6560b7... |
3 findings |
| bulk.ether | bulk_extractor | 100 | sha256:8fd95b540... |
— |
| bulk.rfc822 | bulk_extractor | 1295 | sha256:17c7264db... |
2 findings |
| bulk.url | bulk_extractor | 35222 | sha256:30db900bd... |
2 findings |
| bulk.url_facebook-address | bulk_extractor | 9 | sha256:4ec34099b... |
2 findings |
| bulk.url_searches | bulk_extractor | 17 | sha256:ce5667e71... |
3 findings |
| bulk.url_services | bulk_extractor | 1214 | sha256:1736dcdd1... |
2 findings |
| bulk.wordlist | bulk_extractor | 8534429 | sha256:8122f12ed... |
1 finding |
| bulk.domain | bulk_extractor | 183003 | sha256:287b85379... |
— |
| phone.ios | ios_parser | 510 | sha256:b1f8ebf18... |
— |
| bulk.email | bulk_extractor | 12167 | sha256:677ce3665... |
3 findings |
| bulk.ether | bulk_extractor | 531 | sha256:28d8fd9f4... |
— |
| bulk.ip | bulk_extractor | 11 | sha256:6e55edaad... |
1 finding |
| bulk.packets | bulk_extractor | 22 | sha256:6ae70d3c4... |
— |
| exiftool.metadata | exiftool | 75 | sha256:ed21ecfb7... |
1 finding |
| bulk.rfc822 | bulk_extractor | 27863 | sha256:b7263a5c0... |
2 findings |
| exiftool.metadata | exiftool | 69 | sha256:9b589ca68... |
1 finding |
| bulk.tcp | bulk_extractor | 7 | sha256:6bc40d8b0... |
1 finding |
| binwalk.scan | binwalk | 0 | sha256:empty... |
— |
| strings.output | strings | 8624 | sha256:72c6775af... |
— |
| steg.detection | steganography | 1 | sha256:56c3b3f38... |
3 findings |
| bulk.url | bulk_extractor | 169042 | sha256:bc7bbf6cb... |
2 findings |
| exiftool.metadata | exiftool | 75 | sha256:ed21ecfb7... |
1 finding |
| steg.extracted | steganography | 11 | sha256:c407e1aec... |
2 findings |
| steg.detection | steganography | 5 | sha256:abd9831b4... |
3 findings |
| exiftool.metadata | exiftool | 75 | sha256:ed21ecfb7... |
1 finding |
| steg.extracted | steganography | 10 | sha256:33cc5dea6... |
2 findings |
| steg.extracted | steganography | 8 | sha256:f6c12eab9... |
2 findings |
| exiftool.metadata | exiftool | 75 | sha256:fb7a6ba53... |
1 finding |
| bulk.url_facebook-address | bulk_extractor | 47 | sha256:6d1c45302... |
2 findings |
| bulk.url_facebook-id | bulk_extractor | 9 | sha256:87211fa99... |
2 findings |
| bulk.url_searches | bulk_extractor | 194 | sha256:f39fa972e... |
3 findings |
| bulk.url_services | bulk_extractor | 3313 | sha256:58688841d... |
2 findings |
| bulk.wordlist | bulk_extractor | 50371379 | sha256:4c054f9b5... |
1 finding |
| tsk.filelist | sleuthkit | 12 | sha256:66d0a1b6d... |
— |
| tsk.filelist | sleuthkit | 1561 | sha256:6ac459639... |
— |
| tsk.filelist | sleuthkit | 2 | sha256:7310d0f23... |
— |
| exiftool.metadata | exiftool | 69 | sha256:74d002c33... |
1 finding |
| pcap.summary | tshark | 82 | sha256:f070dcaea... |
— |
| pcap.summary | tshark | 86 | sha256:d6b120795... |
— |
| pcap.summary | tshark | 84 | sha256:89bc42d0f... |
— |
| pcap.summary | tshark | 83 | sha256:42804ca52... |
— |
| pcap.summary | tshark | 80 | sha256:1c8484ff3... |
— |
| pcap.conversations | tshark | 157 | sha256:1c7a819f9... |
— |
| pcap.conversations | tshark | 99 | sha256:db87569d2... |
— |
| pcap.conversations | tshark | 153 | sha256:1b1d52d57... |
— |
| pcap.conversations | tshark | 321 | sha256:cfd185cd9... |
— |
| pcap.conversations | tshark | 394 | sha256:6fb3f95f3... |
— |
| pcap.http | tshark | 11 | sha256:6238d74b4... |
— |
| pcap.http | tshark | 112 | sha256:ca78bcdf0... |
— |
| pcap.http | tshark | 148 | sha256:2bdbbb4ce... |
— |
| pcap.http | tshark | 921 | sha256:49fe8ba41... |
— |
| pcap.http | tshark | 907 | sha256:d019664a4... |
— |
Investigation Performance
| Input Tokens (est.) | 9,366 |
| Output Tokens (est.) | 41,093 |
| Total Tokens (est.) | 50,459 |
| Tool | Duration | Params |
|---|---|---|
| run_exiftool | 157.7s | |
| run_exiftool | 117.1s | |
| run_fls | 106.0s | |
| run_fls | 105.9s | |
| submit_finding | 104.7s | |
| run_fls | 101.3s | |
| extract_steganography | 97.9s | |
| extract_steganography | 97.9s | |
| run_exiftool | 97.9s | |
| detect_steganography | 97.6s |
Audit Trail
| ID | Tool | Duration | Timestamp | Actions |
|---|---|---|---|---|
| tc_b5d3b572 | read_evidence_file | 1ms | 2026-04-20T16:44:29 | |
| tc_0915e470 | list_directory | 6ms | 2026-04-20T16:44:29 | |
| tc_38dd5a11 | list_directory | 75ms | 2026-04-20T16:44:35 | |
| tc_062097c7 | read_evidence_file | 2ms | 2026-04-20T16:44:44 | |
| tc_520aa6c2 | list_directory | 2ms | 2026-04-20T16:44:44 | |
| tc_65d8cb64 | list_directory | 3ms | 2026-04-20T16:44:44 | |
| tc_2be7b461 | list_directory | 4ms | 2026-04-20T16:44:44 | |
| tc_1e13183c | read_evidence_file | 2ms | 2026-04-20T16:44:51 | |
| tc_8e12aaca | read_evidence_file | 4ms | 2026-04-20T16:44:51 | |
| tc_1e5e2dd8 | list_directory | 7ms | 2026-04-20T16:44:51 | |
| tc_77ba72e5 | list_directory | 8ms | 2026-04-20T16:44:51 | |
| tc_491f7ac0 | list_directory | 8ms | 2026-04-20T16:44:51 | |
| tc_b5b4b1f3 | list_directory | 2ms | 2026-04-20T16:44:56 | |
| tc_84fa2b19 | read_evidence_file | 2ms | 2026-04-20T16:45:13 | |
| tc_00fe7245 | read_evidence_file | 2ms | 2026-04-20T16:45:13 | |
| tc_70878e83 | read_evidence_file | 3ms | 2026-04-20T16:45:13 | |
| tc_85addf70 | read_evidence_file | 2ms | 2026-04-20T16:45:13 | |
| tc_9414fba1 | read_evidence_file | 2ms | 2026-04-20T16:45:13 | |
| tc_7a6b8d37 | list_directory | 9ms | 2026-04-20T16:45:18 | |
| tc_f5d4a6a9 | read_evidence_file | 3ms | 2026-04-20T16:45:52 | |
| tc_93b03114 | read_evidence_file | 3ms | 2026-04-20T16:45:52 | |
| tc_fa888862 | read_evidence_file | 3ms | 2026-04-20T16:45:52 | |
| tc_3beeebca | list_directory | 5ms | 2026-04-20T16:45:52 | |
| tc_37dce4dd | list_directory | 6ms | 2026-04-20T16:45:52 | |
| tc_5c6eec82 | run_pcap_analysis | 0ms | 2026-04-20T16:46:44 | |
| tc_1b15fb2f | start_extraction_batch | 15ms | 2026-04-20T16:46:44 | |
| tc_9c43539c | run_pcap_analysis | 0ms | 2026-04-20T16:46:44 | |
| tc_2fdd7772 | run_pcap_analysis | 0ms | 2026-04-20T16:46:44 | |
| tc_d340a85c | run_pcap_analysis | 0ms | 2026-04-20T16:46:44 | |
| tc_859d775f | run_pcap_analysis | 0ms | 2026-04-20T16:46:44 | |
| tc_f89ad270 | run_bulk_extractor | 0ms | 2026-04-20T16:46:44 | |
| tc_29c633e9 | run_bulk_extractor | 0ms | 2026-04-20T16:46:44 | |
| tc_0025cb28 | run_fls | 0ms | 2026-04-20T16:46:44 | |
| tc_0b03d29d | run_pcap_analysis | 0ms | 2026-04-20T16:46:49 | |
| tc_76264981 | run_fls | 0ms | 2026-04-20T16:46:49 | |
| tc_d365f984 | read_evidence_file | 1ms | 2026-04-20T16:46:55 | |
| tc_73b3f80b | list_directory | 6ms | 2026-04-20T16:46:55 | |
| tc_2346c1f4 | list_directory | 7ms | 2026-04-20T16:46:55 | |
| tc_ec5fefc1 | list_directory | 8ms | 2026-04-20T16:46:55 | |
| tc_a399db83 | list_directory | 3ms | 2026-04-20T16:47:16 | |
| tc_ff94d500 | list_directory | 3ms | 2026-04-20T16:47:16 | |
| tc_f4b28ee9 | read_evidence_file | 0ms | 2026-04-20T16:47:28 | |
| tc_01523bc1 | read_evidence_file | 1ms | 2026-04-20T16:47:28 | |
| tc_0da0ee36 | read_evidence_file | 1ms | 2026-04-20T16:47:28 | |
| tc_4d215751 | read_evidence_file | 0ms | 2026-04-20T16:47:28 | |
| tc_f108c981 | read_evidence_file | 0ms | 2026-04-20T16:47:28 | |
| tc_81957f8b | read_evidence_file | 0ms | 2026-04-20T16:47:28 | |
| tc_a84d4680 | read_evidence_file | 1ms | 2026-04-20T16:47:28 | |
| tc_d9aa87ad | read_evidence_file | 2ms | 2026-04-20T16:47:28 | |
| tc_a3226299 | read_evidence_file | 1ms | 2026-04-20T16:47:43 | |
| tc_676a729d | read_evidence_file | 1ms | 2026-04-20T16:47:43 | |
| tc_a156984b | read_evidence_file | 0ms | 2026-04-20T16:47:43 | |
| tc_1646b23b | read_evidence_file | 0ms | 2026-04-20T16:47:43 | |
| tc_e39ff420 | read_evidence_file | 0ms | 2026-04-20T16:47:43 | |
| tc_c9796b52 | read_evidence_file | 0ms | 2026-04-20T16:47:43 | |
| tc_9a0da2ce | read_evidence_file | 1ms | 2026-04-20T16:47:43 | |
| tc_895dcdb3 | read_evidence_file | 1ms | 2026-04-20T16:47:43 | |
| tc_573243b6 | read_evidence_file | 0ms | 2026-04-20T16:47:43 | |
| tc_2da94887 | read_evidence_file | 0ms | 2026-04-20T16:47:43 | |
| tc_16ab5492 | read_evidence_file | 1ms | 2026-04-20T16:48:00 | |
| tc_94058613 | read_evidence_file | 1ms | 2026-04-20T16:48:00 | |
| tc_e18b582d | read_evidence_file | 1ms | 2026-04-20T16:48:00 | |
| tc_e8499463 | read_evidence_file | 0ms | 2026-04-20T16:48:00 | |
| tc_ee6ca8ef | read_evidence_file | 1ms | 2026-04-20T16:48:00 | |
| tc_3477704e | read_evidence_file | 0ms | 2026-04-20T16:48:00 | |
| tc_2af183c9 | read_evidence_file | 0ms | 2026-04-20T16:48:00 | |
| tc_05daad40 | read_evidence_file | 0ms | 2026-04-20T16:48:00 | |
| tc_65540676 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_81ba0701 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_0d983425 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_7a8a66d5 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_c5475039 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_c7484f91 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_22ca88a0 | read_evidence_file | 2ms | 2026-04-20T16:48:46 | |
| tc_13a2577f | read_evidence_file | 3ms | 2026-04-20T16:48:46 | |
| tc_80f552a6 | read_evidence_file | 1ms | 2026-04-20T16:49:03 | |
| tc_dd8519e5 | read_evidence_file | 0ms | 2026-04-20T16:49:03 | |
| tc_243bbbef | read_evidence_file | 0ms | 2026-04-20T16:49:03 | |
| tc_3336763d | read_evidence_file | 0ms | 2026-04-20T16:49:03 | |
| tc_63891380 | read_evidence_file | 0ms | 2026-04-20T16:49:03 | |
| tc_a83ee81a | read_evidence_file | 1ms | 2026-04-20T16:49:03 | |
| tc_426d5eed | read_evidence_file | 0ms | 2026-04-20T16:49:03 | |
| tc_3ad3013b | read_evidence_file | 0ms | 2026-04-20T16:49:03 | |
| tc_055f58fe | read_evidence_file | 1ms | 2026-04-20T16:49:20 | |
| tc_d0ca7ce6 | read_evidence_file | 1ms | 2026-04-20T16:49:20 | |
| tc_2c35bcd3 | read_evidence_file | 0ms | 2026-04-20T16:49:20 | |
| tc_8b869f81 | read_evidence_file | 0ms | 2026-04-20T16:49:20 | |
| tc_6efb1396 | read_evidence_file | 1ms | 2026-04-20T16:49:20 | |
| tc_902badc0 | read_evidence_file | 0ms | 2026-04-20T16:49:20 | |
| tc_8e8cb1f6 | read_evidence_file | 2ms | 2026-04-20T16:49:20 | |
| tc_b719bc7f | read_evidence_file | 0ms | 2026-04-20T16:49:37 | |
| tc_04826184 | read_evidence_file | 1ms | 2026-04-20T16:49:37 | |
| tc_2be89552 | read_evidence_file | 1ms | 2026-04-20T16:49:37 | |
| tc_e4947b72 | read_evidence_file | 0ms | 2026-04-20T16:49:37 | |
| tc_77dedddc | read_evidence_file | 0ms | 2026-04-20T16:49:37 | |
| tc_2d16ce67 | read_evidence_file | 1ms | 2026-04-20T16:49:37 | |
| tc_b057241c | read_evidence_file | 0ms | 2026-04-20T16:49:37 | |
| tc_9b7ea5cd | check_extraction_status | 0ms | 2026-04-20T16:50:04 | |
| tc_2565f086 | read_evidence_file | 1ms | 2026-04-20T16:50:04 | |
| tc_7c841748 | read_evidence_file | 1ms | 2026-04-20T16:50:04 | |
| tc_32d718f9 | get_completed_results | 0ms | 2026-04-20T16:50:13 | |
| tc_54c4bc56 | list_directory | 6ms | 2026-04-20T16:50:13 | |
| tc_5f66256b | list_directory | 0ms | 2026-04-20T16:50:35 | |
| tc_a85f97b3 | list_directory | 1ms | 2026-04-20T16:50:35 | |
| tc_4b194eee | list_directory | 1ms | 2026-04-20T16:50:35 | |
| tc_57f48bfc | list_directory | 9ms | 2026-04-20T16:50:35 | |
| tc_69ca9450 | list_directory | 9ms | 2026-04-20T16:50:35 | |
| tc_1139efb4 | list_directory | 11ms | 2026-04-20T16:50:35 | |
| tc_a834a082 | list_directory | 1ms | 2026-04-20T16:50:44 | |
| tc_60a0631c | list_directory | 1ms | 2026-04-20T16:50:44 | |
| tc_6dd1f184 | list_directory | 0ms | 2026-04-20T16:50:44 | |
| tc_c0e5f620 | read_evidence_file | 2ms | 2026-04-20T16:50:44 | |
| tc_671a053c | read_evidence_file | 2ms | 2026-04-20T16:50:44 | |
| tc_38fd563d | read_evidence_file | 2ms | 2026-04-20T16:50:44 | |
| tc_e190c58b | list_directory | 0ms | 2026-04-20T16:51:06 | |
| tc_646b4046 | list_directory | 1ms | 2026-04-20T16:51:06 | |
| tc_d160a613 | list_directory | 6ms | 2026-04-20T16:51:06 | |
| tc_15591d81 | list_directory | 6ms | 2026-04-20T16:51:06 | |
| tc_c3cd1f44 | list_directory | 7ms | 2026-04-20T16:51:06 | |
| tc_a3d93b9e | list_directory | 1ms | 2026-04-20T16:51:45 | |
| tc_431d2dec | list_directory | 0ms | 2026-04-20T16:51:45 | |
| tc_759e3345 | list_directory | 0ms | 2026-04-20T16:51:45 | |
| tc_0e6d4472 | list_directory | 0ms | 2026-04-20T16:51:45 | |
| tc_693d64c1 | list_directory | 0ms | 2026-04-20T16:51:45 | |
| tc_b5e6e4db | list_directory | 1ms | 2026-04-20T16:51:45 | |
| tc_0ccb288c | list_directory | 1ms | 2026-04-20T16:52:10 | |
| tc_880eb5db | list_directory | 2ms | 2026-04-20T16:52:10 | |
| tc_196c5da5 | list_directory | 1ms | 2026-04-20T16:52:10 | |
| tc_e1919841 | list_directory | 0ms | 2026-04-20T16:52:10 | |
| tc_b0b02347 | list_directory | 0ms | 2026-04-20T16:52:10 | |
| tc_e1241d7a | list_directory | 1ms | 2026-04-20T16:52:10 | |
| tc_0f475b25 | list_directory | 0ms | 2026-04-20T16:52:24 | |
| tc_7fa047ef | list_directory | 1ms | 2026-04-20T16:52:24 | |
| tc_04494fa9 | list_directory | 1ms | 2026-04-20T16:52:24 | |
| tc_d8294ce5 | list_directory | 0ms | 2026-04-20T16:52:24 | |
| tc_868006fa | list_directory | 0ms | 2026-04-20T16:52:24 | |
| tc_0db32c8a | run_mmls | 0ms | 2026-04-20T16:53:25 | |
| tc_5fe29683 | run_mmls | 0ms | 2026-04-20T16:53:25 | |
| tc_2975bd32 | run_mmls | 173ms | 2026-04-20T16:53:25 | |
| tc_53636ef1 | run_mmls | 179ms | 2026-04-20T16:53:25 | |
| tc_31a4da00 | run_mmls | 0ms | 2026-04-20T16:53:54 | |
| tc_a82a7089 | search | 9ms | 2026-04-20T16:54:27 | |
| tc_5560618e | get_raw_output | 8ms | 2026-04-20T16:54:27 | |
| tc_89fe4acf | search | 440ms | 2026-04-20T16:54:28 | |
| tc_7789420e | start_extraction_batch | 2ms | 2026-04-20T16:55:04 | |
| tc_cbf5a375 | run_fls | 0ms | 2026-04-20T16:55:04 | |
| tc_9fb99fe9 | run_fls | 0ms | 2026-04-20T16:55:04 | |
| tc_03718491 | run_plaso | 0ms | 2026-04-20T16:55:06 | |
| tc_7c6a3b0e | run_plaso | 0ms | 2026-04-20T16:55:06 | |
| tc_7b466ade | list_directory | 1ms | 2026-04-20T16:55:50 | |
| tc_e46b603f | read_evidence_file | 0ms | 2026-04-20T16:55:50 | |
| tc_12d160f6 | list_directory | 1ms | 2026-04-20T16:56:40 | |
| tc_48e467ce | list_directory | 1ms | 2026-04-20T17:00:48 | |
| tc_e46b7d24 | list_directory | 1ms | 2026-04-20T17:04:07 | |
| tc_673a44fe | list_directory | 1ms | 2026-04-20T17:04:07 | |
| tc_41bb5396 | list_directory | 1ms | 2026-04-20T17:04:07 | |
| tc_f7a21c89 | list_directory | 1ms | 2026-04-20T17:04:07 | |
| tc_0a4bdf1f | list_directory | 0ms | 2026-04-20T17:04:12 | |
| tc_2aa928a8 | list_directory | 0ms | 2026-04-20T17:04:43 | |
| tc_bd69d13b | list_directory | 0ms | 2026-04-20T17:04:43 | |
| tc_f5ff50bb | list_directory | 0ms | 2026-04-20T17:04:43 | |
| tc_34fe2aa0 | list_directory | 0ms | 2026-04-20T17:04:43 | |
| tc_ed2d3cf6 | list_directory | 0ms | 2026-04-20T17:04:43 | |
| tc_e2765ea7 | list_directory | 4ms | 2026-04-20T17:04:43 | |
| tc_94f2a3f5 | read_evidence_file | 1ms | 2026-04-20T17:05:34 | |
| tc_03740158 | list_files | 17ms | 2026-04-20T17:05:34 | |
| tc_fe484c1d | list_files | 17ms | 2026-04-20T17:05:34 | |
| tc_bafef845 | check_extraction_status | 0ms | 2026-04-20T17:06:07 | |
| tc_edcc1362 | lookup_attack_technique | 224ms | 2026-04-20T17:06:08 | |
| tc_e4a1b9b5 | lookup_attack_technique | 225ms | 2026-04-20T17:06:08 | |
| tc_962fe933 | get_completed_results | 0ms | 2026-04-20T17:06:21 | |
| tc_53343b64 | parse_android_artifacts | 7ms | 2026-04-20T17:06:21 | |
| tc_6c275a6a | list_directory | 4ms | 2026-04-20T17:06:51 | |
| tc_9bbd3344 | get_raw_output | 707ms | 2026-04-20T17:06:51 | |
| tc_ca687ce9 | list_directory | 4ms | 2026-04-20T17:07:48 | |
| tc_e4f2e238 | parse_ios_artifacts | 94065ms | 2026-04-20T17:09:22 | |
| tc_9848be04 | list_directory | 1ms | 2026-04-20T17:09:40 | |
| tc_8a299983 | get_raw_output | 673ms | 2026-04-20T17:09:41 | |
| tc_e08fc8cc | submit_finding | 24766ms | 2026-04-20T17:10:05 | |
| tc_72b0af92 | list_directory | 5ms | 2026-04-20T17:10:36 | |
| tc_762bf08c | get_raw_output | 79ms | 2026-04-20T17:10:37 | |
| tc_d05b6c70 | submit_finding | 23288ms | 2026-04-20T17:11:00 | |
| tc_2fb2b7c6 | submit_finding | 23293ms | 2026-04-20T17:11:00 | |
| tc_ab3ae398 | parse_ios_artifacts | 13240ms | 2026-04-20T17:11:51 | |
| tc_66835afb | submit_finding | 16958ms | 2026-04-20T17:11:54 | |
| tc_1458b296 | submit_finding | 16964ms | 2026-04-20T17:11:54 | |
| tc_8c3c8314 | check_extraction_status | 0ms | 2026-04-20T17:12:18 | |
| tc_52b89c7f | list_directory | 10ms | 2026-04-20T17:12:18 | |
| tc_28a88145 | list_directory | 1ms | 2026-04-20T17:12:36 | |
| tc_970f8a0e | list_directory | 1ms | 2026-04-20T17:12:36 | |
| tc_dc602289 | parse_ios_artifacts | 22ms | 2026-04-20T17:12:36 | |
| tc_f0f7fdfa | parse_android_artifacts | 216ms | 2026-04-20T17:12:36 | |
| tc_dde87db9 | parse_android_artifacts | 1156ms | 2026-04-20T17:12:37 | |
| tc_f30a59d7 | list_directory | 1ms | 2026-04-20T17:12:44 | |
| tc_b680f596 | list_directory | 2ms | 2026-04-20T17:12:44 | |
| tc_ba6ac9ae | list_directory | 3ms | 2026-04-20T17:12:44 | |
| tc_47cec800 | list_directory | 1ms | 2026-04-20T17:12:58 | |
| tc_f4be57e2 | list_directory | 4ms | 2026-04-20T17:12:58 | |
| tc_e965b800 | parse_ios_artifacts | 18ms | 2026-04-20T17:12:58 | |
| tc_7c5d3446 | parse_android_artifacts | 219ms | 2026-04-20T17:12:58 | |
| tc_f22c14dc | parse_android_artifacts | 1214ms | 2026-04-20T17:12:59 | |
| tc_7099f917 | list_directory | 1ms | 2026-04-20T17:13:26 | |
| tc_f10a00c8 | list_directory | 2ms | 2026-04-20T17:13:26 | |
| tc_47929a4b | list_directory | 3ms | 2026-04-20T17:13:26 | |
| tc_e60897b8 | list_directory | 5ms | 2026-04-20T17:13:26 | |
| tc_72828b41 | list_directory | 1ms | 2026-04-20T17:13:31 | |
| tc_e7929b23 | list_directory | 5ms | 2026-04-20T17:13:51 | |
| tc_9e723e12 | list_directory | 7ms | 2026-04-20T17:13:51 | |
| tc_59df9d7c | list_directory | 13ms | 2026-04-20T17:13:51 | |
| tc_78225248 | list_directory | 29ms | 2026-04-20T17:14:07 | |
| tc_530e5b91 | list_directory | 29ms | 2026-04-20T17:14:07 | |
| tc_81e548b7 | run_exiftool | 59994ms | 2026-04-20T17:15:07 | |
| tc_ffd0626e | get_raw_output | 806ms | 2026-04-20T17:15:17 | |
| tc_8f6d2d43 | run_exiftool | 43695ms | 2026-04-20T17:15:59 | |
| tc_57255459 | get_raw_output | 123ms | 2026-04-20T17:16:10 | |
| tc_c04d1fe7 | check_extraction_status | 0ms | 2026-04-20T17:16:26 | |
| tc_23727ce2 | run_binwalk | 23601ms | 2026-04-20T17:16:50 | |
| tc_703f4847 | run_strings | 79746ms | 2026-04-20T17:17:46 | |
| tc_d2d8b673 | detect_steganography | 79755ms | 2026-04-20T17:17:46 | |
| tc_b1083152 | get_raw_output | 1106ms | 2026-04-20T17:17:56 | |
| tc_9462871c | get_raw_output | 1108ms | 2026-04-20T17:17:56 | |
| tc_88b12bce | run_exiftool | 68811ms | 2026-04-20T17:19:04 | |
| tc_3b9a925c | get_raw_output | 295ms | 2026-04-20T17:19:27 | |
| tc_7aea4c4e | extract_steganography | 86816ms | 2026-04-20T17:20:54 | |
| tc_3f36ab81 | detect_steganography | 97611ms | 2026-04-20T17:21:04 | |
| tc_5cd3ceb7 | get_raw_output | 233ms | 2026-04-20T17:21:16 | |
| tc_d3883e24 | get_raw_output | 780ms | 2026-04-20T17:21:17 | |
| tc_2006d95e | run_exiftool | 97926ms | 2026-04-20T17:23:20 | |
| tc_123e985b | extract_steganography | 97937ms | 2026-04-20T17:23:20 | |
| tc_14568365 | extract_steganography | 97949ms | 2026-04-20T17:23:20 | |
| tc_f553b7e6 | check_extraction_status | 0ms | 2026-04-20T17:23:37 | |
| tc_7d962e49 | search | 37ms | 2026-04-20T17:23:37 | |
| tc_425aaa5f | search | 42ms | 2026-04-20T17:23:37 | |
| tc_7e0e6f87 | get_raw_output | 309ms | 2026-04-20T17:23:37 | |
| tc_4683e80e | search | 22ms | 2026-04-20T17:23:59 | |
| tc_b368fc5c | search | 226ms | 2026-04-20T17:23:59 | |
| tc_f54e8fcc | search | 449ms | 2026-04-20T17:24:00 | |
| tc_70d59abe | run_exiftool | 117147ms | 2026-04-20T17:25:56 | |
| tc_ad938e79 | submit_finding | 54488ms | 2026-04-20T17:31:36 | |
| tc_148ae26f | submit_finding | 54492ms | 2026-04-20T17:31:36 | |
| tc_257fd591 | submit_finding | 58716ms | 2026-04-20T17:31:46 | |
| tc_c6e24d05 | check_extraction_status | 1ms | 2026-04-20T17:32:41 | |
| tc_ec6c9d97 | list_directory | 3ms | 2026-04-20T17:32:41 | |
| tc_e6e2108d | list_directory | 15ms | 2026-04-20T17:32:41 | |
| tc_6122f726 | read_evidence_file | 1ms | 2026-04-20T17:33:08 | |
| tc_ae14c77b | read_evidence_file | 1ms | 2026-04-20T17:33:08 | |
| tc_2ce6c0f2 | read_evidence_file | 1ms | 2026-04-20T17:33:08 | |
| tc_4b0e5017 | run_fls | 105921ms | 2026-04-20T17:34:54 | |
| tc_add1729f | run_fls | 105960ms | 2026-04-20T17:34:54 | |
| tc_95d090d5 | read_evidence_file | 1ms | 2026-04-20T17:35:06 | |
| tc_6f0126e7 | read_evidence_file | 1ms | 2026-04-20T17:35:06 | |
| tc_31a74e6e | search | 71ms | 2026-04-20T17:35:06 | |
| tc_a57f34e4 | list_files | 212ms | 2026-04-20T17:35:06 | |
| tc_ebff3633 | search | 1975ms | 2026-04-20T17:35:08 | |
| tc_ca3218fa | search | 2641ms | 2026-04-20T17:35:09 | |
| tc_af9a550d | read_evidence_file | 1ms | 2026-04-20T17:35:27 | |
| tc_13a1b062 | read_evidence_file | 1ms | 2026-04-20T17:35:27 | |
| tc_01fcc2fc | read_evidence_file | 1ms | 2026-04-20T17:35:27 | |
| tc_29c7eeab | read_evidence_file | 1ms | 2026-04-20T17:35:27 | |
| tc_b322f346 | read_evidence_file | 4ms | 2026-04-20T17:35:27 | |
| tc_030239fd | run_fls | 0ms | 2026-04-20T17:35:27 | |
| tc_a55e0e8d | run_fls | 101261ms | 2026-04-20T17:37:08 | |
| tc_cbe06499 | read_evidence_file | 2ms | 2026-04-20T17:37:52 | |
| tc_f6b76db4 | read_evidence_file | 1ms | 2026-04-20T17:37:52 | |
| tc_c9617b3c | read_evidence_file | 1ms | 2026-04-20T17:37:52 | |
| tc_3e8f12a6 | read_evidence_file | 3ms | 2026-04-20T17:37:52 | |
| tc_13476b6a | submit_finding | 43380ms | 2026-04-20T17:38:36 | |
| tc_4ed4d1ab | read_evidence_file | 1ms | 2026-04-20T17:38:59 | |
| tc_f9164ba4 | read_evidence_file | 1ms | 2026-04-20T17:38:59 | |
| tc_d9489170 | read_evidence_file | 1ms | 2026-04-20T17:38:59 | |
| tc_a70578f6 | read_evidence_file | 0ms | 2026-04-20T17:38:59 | |
| tc_4f86cba7 | read_evidence_file | 2ms | 2026-04-20T17:38:59 | |
| tc_e8465acc | read_evidence_file | 1ms | 2026-04-20T17:38:59 | |
| tc_693559b9 | read_evidence_file | 2ms | 2026-04-20T17:38:59 | |
| tc_ee7937fa | read_evidence_file | 1ms | 2026-04-20T17:39:31 | |
| tc_11796a3b | read_evidence_file | 1ms | 2026-04-20T17:39:31 | |
| tc_a0f9e748 | read_evidence_file | 1ms | 2026-04-20T17:39:31 | |
| tc_ea375fb7 | read_evidence_file | 1ms | 2026-04-20T17:39:31 | |
| tc_7747e16b | read_evidence_file | 1ms | 2026-04-20T17:39:31 | |
| tc_23ab6a63 | read_evidence_file | 2ms | 2026-04-20T17:39:31 | |
| tc_9231d149 | check_extraction_status | 0ms | 2026-04-20T17:40:05 | |
| tc_c9400c89 | find_execution_evidence | 56ms | 2026-04-20T17:40:05 | |
| tc_bb4dcc6f | find_persistence_mechanisms._query(registry.system) | 487ms | 2026-04-20T17:40:06 | |
| tc_5d07e8a5 | find_persistence_mechanisms._query(registry.software) | 97ms | 2026-04-20T17:40:06 | |
| tc_76ca3ba4 | find_persistence_mechanisms._query(volatility.svcscan) | 96ms | 2026-04-20T17:40:06 | |
| tc_cef7408d | find_persistence_mechanisms._search(all) | 18ms | 2026-04-20T17:40:06 | |
| tc_74c9844f | find_persistence_mechanisms._search(all) | 13ms | 2026-04-20T17:40:06 | |
| tc_c615a407 | find_persistence_mechanisms._search(all) | 17ms | 2026-04-20T17:40:06 | |
| tc_6626c5ba | find_persistence_mechanisms._query(tsk.filelist) | 107ms | 2026-04-20T17:40:06 | |
| tc_c46ebdf6 | find_persistence_mechanisms | 858ms | 2026-04-20T17:40:06 | |
| tc_76f8c4f4 | find_data_exfiltration_indicators._query(bulk.url) | 4506ms | 2026-04-20T17:40:10 | |
| tc_45b1a31d | find_data_exfiltration_indicators._query(bulk.email) | 537ms | 2026-04-20T17:40:11 | |
| tc_1141b8ce | find_data_exfiltration_indicators._query(bulk.domain) | 2815ms | 2026-04-20T17:40:14 | |
| tc_e1199ff8 | find_data_exfiltration_indicators._search(all) | 10ms | 2026-04-20T17:40:14 | |
| tc_26b89178 | find_data_exfiltration_indicators | 8835ms | 2026-04-20T17:40:14 | |
| tc_0a82618f | search | 20ms | 2026-04-20T17:40:55 | |
| tc_e1857ae7 | search | 27ms | 2026-04-20T17:40:55 | |
| tc_f8fd7b4e | search | 33ms | 2026-04-20T17:40:55 | |
| tc_794cfb74 | search | 43ms | 2026-04-20T17:41:00 | |
| tc_541b4d4a | search | 2604ms | 2026-04-20T17:41:03 | |
| tc_59e7620d | search | 53ms | 2026-04-20T17:41:33 | |
| tc_c82ed823 | search | 106ms | 2026-04-20T17:41:34 | |
| tc_c73e399e | search | 106ms | 2026-04-20T17:41:34 | |
| tc_162b36de | search | 2617ms | 2026-04-20T17:41:36 | |
| tc_c9bf5167 | search | 21ms | 2026-04-20T17:42:02 | |
| tc_2465e64e | search | 22ms | 2026-04-20T17:42:02 | |
| tc_ad0381ef | search | 29ms | 2026-04-20T17:42:02 | |
| tc_9871a46e | search | 32ms | 2026-04-20T17:42:02 | |
| tc_1519224c | search | 36ms | 2026-04-20T17:42:45 | |
| tc_0d4e1ff1 | search | 47ms | 2026-04-20T17:42:45 | |
| tc_f007d0eb | get_raw_output | 142ms | 2026-04-20T17:42:45 | |
| tc_be86a040 | submit_finding | 40444ms | 2026-04-20T17:43:25 | |
| tc_b8090661 | check_extraction_status | 0ms | 2026-04-20T17:44:03 | |
| tc_50ae3e1c | search | 24ms | 2026-04-20T17:44:03 | |
| tc_bcfe56cb | search | 28ms | 2026-04-20T17:44:03 | |
| tc_26263cb6 | submit_finding | 33306ms | 2026-04-20T17:44:36 | |
| tc_103ef06c | find_defense_evasion._search(all) | 157ms | 2026-04-20T17:45:16 | |
| tc_7d4d0845 | find_lateral_movement_indicators._search(all) | 147ms | 2026-04-20T17:45:16 | |
| tc_97e0eb62 | find_defense_evasion._search(all) | 1384ms | 2026-04-20T17:45:17 | |
| tc_6dc5d1c3 | find_lateral_movement_indicators._search(all) | 1422ms | 2026-04-20T17:45:17 | |
| tc_557c9caa | search | 1700ms | 2026-04-20T17:45:17 | |
| tc_2751d3b3 | find_defense_evasion._search(all) | 120ms | 2026-04-20T17:45:17 | |
| tc_d90168c3 | find_lateral_movement_indicators._search(all) | 606ms | 2026-04-20T17:45:18 | |
| tc_3c69c8fb | find_defense_evasion._search(all) | 626ms | 2026-04-20T17:45:18 | |
| tc_19886388 | search | 2521ms | 2026-04-20T17:45:18 | |
| tc_16874978 | find_defense_evasion._search(all) | 11ms | 2026-04-20T17:45:18 | |
| tc_9ca6a1c4 | find_defense_evasion | 2543ms | 2026-04-20T17:45:18 | |
| tc_9b7dfd3a | find_lateral_movement_indicators._query(volatility.netscan) | 506ms | 2026-04-20T17:45:19 | |
| tc_a35a9e13 | find_lateral_movement_indicators._search(all) | 974ms | 2026-04-20T17:45:19 | |
| tc_8bd9f6eb | find_lateral_movement_indicators._search(all) | 8ms | 2026-04-20T17:45:20 | |
| tc_415c130e | find_lateral_movement_indicators._search(all) | 11ms | 2026-04-20T17:45:20 | |
| tc_e65ea912 | find_lateral_movement_indicators | 3841ms | 2026-04-20T17:45:20 | |
| tc_3bffbafb | search | 74ms | 2026-04-20T17:45:37 | |
| tc_a037834d | search | 85ms | 2026-04-20T17:45:37 | |
| tc_8967b12a | list_directory | 149ms | 2026-04-20T17:45:37 | |
| tc_32c45146 | search | 3542ms | 2026-04-20T17:45:41 | |
| tc_c53c48aa | list_directory | 1ms | 2026-04-20T17:46:12 | |
| tc_d2771e53 | search | 2176ms | 2026-04-20T17:46:15 | |
| tc_9c9fc0ec | search | 2872ms | 2026-04-20T17:46:15 | |
| tc_f46a493b | parse_browser_history | 2882ms | 2026-04-20T17:46:15 | |
| tc_940d05e8 | list_directory | 8ms | 2026-04-20T17:46:31 | |
| tc_9ac0b252 | get_raw_output | 24ms | 2026-04-20T17:46:32 | |
| tc_9ef73cf2 | search | 79ms | 2026-04-20T17:46:32 | |
| tc_fdbf5bd5 | search | 2029ms | 2026-04-20T17:46:34 | |
| tc_a1c795cd | search | 37ms | 2026-04-20T17:46:54 | |
| tc_2e4e149a | search | 51ms | 2026-04-20T17:46:54 | |
| tc_e9f6de8e | search | 59ms | 2026-04-20T17:46:54 | |
| tc_a64867d7 | get_raw_output | 1872ms | 2026-04-20T17:46:56 | |
| tc_25416aea | submit_finding | 61130ms | 2026-04-20T17:48:46 | |
| tc_ffcc9fff | submit_finding | 61136ms | 2026-04-20T17:48:46 | |
| tc_b09009fe | submit_finding | 61140ms | 2026-04-20T17:48:46 | |
| tc_22814f96 | check_extraction_status | 0ms | 2026-04-20T17:48:59 | |
| tc_8650a96a | list_directory | 3ms | 2026-04-20T17:48:59 | |
| tc_b4d119ca | search | 60ms | 2026-04-20T17:48:59 | |
| tc_8d82f9cf | search | 734ms | 2026-04-20T17:48:59 | |
| tc_aaec8320 | list_directory | 4ms | 2026-04-20T17:49:30 | |
| tc_36f289db | search | 739ms | 2026-04-20T17:49:30 | |
| tc_441ea129 | submit_finding | 61796ms | 2026-04-20T17:50:31 | |
| tc_0aee537d | run_exiftool | 157707ms | 2026-04-20T17:52:07 | |
| tc_7b0323e1 | get_raw_output | 523ms | 2026-04-20T17:52:19 | |
| tc_d583ea05 | search | 110ms | 2026-04-20T17:53:01 | |
| tc_c1ce4d78 | search | 111ms | 2026-04-20T17:53:01 | |
| tc_20b4cf06 | search | 2108ms | 2026-04-20T17:53:03 | |
| tc_8b66f835 | correlate_across_sources | 3748ms | 2026-04-20T17:53:05 | |
| tc_44927781 | correlate_across_sources | 1910ms | 2026-04-20T17:53:53 | |
| tc_8dd7c418 | submit_finding | 41611ms | 2026-04-20T17:54:33 | |
| tc_ed652248 | submit_finding | 41614ms | 2026-04-20T17:54:33 | |
| tc_855354a9 | run_pcap_analysis | 0ms | 2026-04-20T17:55:12 | |
| tc_74487862 | run_pcap_analysis | 0ms | 2026-04-20T17:55:12 | |
| tc_0d769e29 | search | 37ms | 2026-04-20T17:55:12 | |
| tc_ba62c137 | search | 44ms | 2026-04-20T17:55:12 | |
| tc_eaee1856 | search | 43ms | 2026-04-20T17:55:12 | |
| tc_d585c81d | submit_finding | 56884ms | 2026-04-20T17:56:48 | |
| tc_55935e0d | submit_finding | 56889ms | 2026-04-20T17:56:48 | |
| tc_a19988ae | assess_recovery._query(tsk.filelist) | 439ms | 2026-04-20T17:57:13 | |
| tc_1959d4b4 | assess_recovery | 461ms | 2026-04-20T17:57:13 | |
| tc_b1ea0013 | audit_evidence_coverage | 66477ms | 2026-04-20T17:58:19 | |
| tc_dd995313 | get_raw_output | 4053ms | 2026-04-20T17:59:04 | |
| tc_b7cafff8 | get_raw_output | 4374ms | 2026-04-20T17:59:04 | |
| tc_bb6a824f | get_raw_output | 4378ms | 2026-04-20T17:59:04 | |
| tc_290ab439 | search | 3ms | 2026-04-20T17:59:05 | |
| tc_f0a422e8 | get_raw_output | 29ms | 2026-04-20T17:59:31 | |
| tc_71be3acc | list_files | 33ms | 2026-04-20T17:59:31 | |
| tc_9609b36b | search | 36ms | 2026-04-20T17:59:31 | |
| tc_ba06ede1 | audit_tool_coverage | 57ms | 2026-04-20T18:00:42 | |
| tc_eb8dd5bd | submit_finding | 88919ms | 2026-04-20T18:02:10 | |
| tc_a0bc5c0c | start_extraction_batch | 1ms | 2026-04-20T18:02:30 | |
| tc_899969db | read_evidence_file | 14ms | 2026-04-20T18:02:39 | |
| tc_bf9c11b1 | read_evidence_file | 235ms | 2026-04-20T18:02:39 | |
| tc_c1fe6f04 | check_extraction_status | 0ms | 2026-04-20T18:03:20 | |
| tc_7a941687 | search | 84ms | 2026-04-20T18:03:21 | |
| tc_bb78d80d | search | 3476ms | 2026-04-20T18:03:24 | |
| tc_93ac2040 | submit_narrative | 75501ms | 2026-04-20T18:06:40 | |
| tc_eee632c7 | check_extraction_status | 0ms | 2026-04-20T18:06:49 | |
| tc_9ad160bc | check_extraction_status | 0ms | 2026-04-20T18:06:49 | |
| tc_83f26559 | check_extraction_status | 0ms | 2026-04-20T18:07:19 | |
| tc_7af445b0 | submit_finding | 104711ms | 2026-04-20T18:09:04 | |
| tc_799b0e30 | check_extraction_status | 0ms | 2026-04-20T18:09:12 | |
| tc_86192ba7 | get_completed_results | 0ms | 2026-04-20T18:09:12 | |
| tc_ff337c73 | search | 233ms | 2026-04-20T18:09:30 | |
| tc_e7bc758a | search | 262ms | 2026-04-20T18:09:30 | |
| tc_8641d520 | search | 385ms | 2026-04-20T18:09:30 |
Each finding traces back to the specific tool calls that produced the supporting evidence.