Executive Summary

📂25 sources (37 disk, 29 other)
🔍402 tool calls
⏱️1.4 hours elapsed
🚨19 findings (11 critical, 5 high)
14 confirmed
🤔5 inference
2 hypotheses ruled out
🔒 SHA-256 hashes

The attack timeline spans 2012-06-19 to 2012-07-12. The earliest activity was Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com) (2012-06-19). The investigation subsequently uncovered LogKext Keylogger Installed on Tracy's MacBook Air; Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails; Tracy (Coral) Communicating with Perry About NGDC Insider Information. The most recent activity was NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x (2012-07-12).

Key Threats
  • LogKext Keylogger Installed on Tracy's MacBook Air
  • Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules')
  • Tracy (Coral) Communicating with Perry About NGDC Insider Information
  • Steganographic Covert Communications in Carry's Device Photos -- jphide Format
  • Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site

0
Total Findings
0
Critical
0
High
0
Medium
0
Confirmed
0
Inference
0
Sources
0
Tool Calls
Severity Breakdown
Critical (11) High (5) Medium (3)
⚠ Critical Findings
  • LogKext Keylogger Installed on Tracy's MacBook Air
    2012-06-28T15:41:39-04:00
  • Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules')
    2012-07-09T09:22:10-04:00
  • Tracy (Coral) Communicating with Perry About NGDC Insider Information
    2012-06-29T11:00:00-04:00
  • Steganographic Covert Communications in Carry's Device Photos -- jphide Format
    2012-07-08T17:34:11-04:00 — 2012-07-11T11:47:47-04:00
  • Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site
    2012-07-11T11:47:11-04:00 — 2012-07-11T11:48:32-04:00
  • Tracy Discovers Rare Stamp Collection at NGDC -- 'This Is Our Ticket'
    2012-07-03T09:18:23-04:00 — 2012-07-03T10:00:00-04:00
  • Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com)
    2012-06-19T14:38:59-07:00 — 2012-07-06T11:49:31-04:00
  • Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan at m57.biz
    2012-07-02T15:31:00-04:00
  • Target Organization Confirmed: National Gallery of Art (NGA, nga.gov)
    2012-07-03T09:00:00-04:00
  • Carry Works at m57.biz -- Network of Co-Conspirators
    2012-07-02T15:31:00-04:00
  • Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails
    2012-06-28T20:00:01Z — 2012-07-12T16:00:00Z
⚔ MITRE ATT&CK Coverage
Reconnaissance (5)
Resource Development (1)
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion (2)
Credential Access (2)
Discovery (1)
Lateral Movement
Collection (3)
Command and Control (2)
Exfiltration
Impact
Inhibit Response Function
Evasion
Impair Process Control
Reconnaissance (5)Resource Development (1)Defense Evasion (2)Credential Access (2)Discovery (1)Collection (3)Command and Control (2)
14 techniques across 19 findings
★ IOC Summary
External IPs0
Internal IPs6
File Paths0
Hashes0
Emails14
Investigation Metadata
Case IDngdc
Evidence Root/evidence/ngdc
Report Generated2026-04-20T18:12:21
Investigation Start2026-04-20T16:44:29
Investigation End2026-04-20T18:09:30
Total Processing2799.3s
Audit Log/root/.mulder/cases/ngdc.audit.jsonl
89 FILES Hashes computed during evidence ingestion. Compare against your local copies to confirm integrity.
FileSHA-256Size
carry-phone-2012-07-03-initial.zip fb31cab9b61140f1693f01d46e79040f00a77b085d5efe9f5043e6cc09d00cde 118.4 MB
carry-phone-2012-07-05.zip 5ee6af1fecd97941cae3cb4b8996af4e745c3a75cb54bc7908df683b36c04b8b 118.7 MB
carry-phone-2012-07-06.zip 6b638f7808ec557dfee67deb5d0783f00bdd89509bc4330ffd8e41a451dda1e0 118.9 MB
carry-phone-2012-07-09.zip 6106823b00bfbcdfa95b143b57d3163b43627827511b2ebb8fdedee4834f8cb4 119.7 MB
carry-phone-2012-07-11.zip 57383e90a2198740ac3782896b9247217ab0377deadbbe74c28ca757fccb325a 124.8 MB
carry-phone-2012-07-15-final.zip 5cfec4e099e70529072b6934c6f98f97492985e5a48daeb64549f96719792d9e 190.6 MB
carry-tablet-2012-07-03.E01 e1d006ba87c89bcaedcb42b2416fab3cf15ce5be14787a0afed2510a963155b4 615.0 MB
carry-tablet-2012-07-03.tar 862fdf9f03950e56b3fc8aeecfe70074b1ba00d453de94da6bd7a0e8e6cf88e2 462.3 MB
carry-tablet-2012-07-05.E01 1eff8a1b6bf01fef28680ca904c88f6c9e9bca556d849a8ac7c4a6b1e11eb428 661.5 MB
carry-tablet-2012-07-05.tar c1492c4877be07464a41e60b874ba403d6014a89de4a38723501372b4b1f3945 499.3 MB
carry-tablet-2012-07-06.E01 fe7de1f766220ed073e5859b086788277ea16ceba260354bbf6980a6547b34d7 730.5 MB
carry-tablet-2012-07-06.tar 28e1cd84472cf53bcc972d635aa97713e1b6081aa5909dddbd7b8a6159a7d747 571.6 MB
carry-tablet-2012-07-09.E01 15415e1b0ba8b79dfcd0c645ab05e63af78618f3af2ef7ba73c462d4a4e54501 881.4 MB
carry-tablet-2012-07-09.tar b546df1398cb5f0da8d42c04f4c53575a49dcb4e7820babba5da2b72f9fe3634 694.1 MB
carry-tablet-2012-07-10.E01 87a31f45af472ca57d8a60f0f5bca77c6d97eea2927263199df9608fb268e630 884.9 MB
carry-tablet-2012-07-10.tar 475cfd7e6f6564e5aa8c8769131a260f2e6d4eaa0dd04e3e93a89cf059e4c966 694.0 MB
carry-tablet-2012-07-11.E01 96509d4bfe56b3c565f99424aa446b9e02b8a1d92a9cf70fccbdfe76c9364ed9 904.7 MB
carry-tablet-2012-07-11.tar 987a26f1ac03f932a5fb3a47c22b82ab12829f0767c9d052f1f86d0aa074cfc9 716.1 MB
carry-tablet-2012-07-12.E01 04c160a0b6d5b3da1820cdc644784b93eccdf415f912ae0892aa68fe2bafa25c 1.1 GB
carry-tablet-2012-07-12.tar ef427ef03aebc8bb97a742ca9b57e1c44383ff034f01d25b33031851f225ea81 777.2 MB
carry-tablet-2012-07-13.E01 15cd66db38924e83515726350e2ea8b05bd79159c360ffffbb9de4b39df293df 1.1 GB
carry-tablet-2012-07-13.tar f17e15728183b8965ea95932b6a1b30d57e87f3377976204ef0c6ca6bfacd5c3 778.6 MB
carry-tablet-2012-07-16-final.E01 26a6ea3049c06afdd34862c453fc272a5ab4c64954ae51d23cf9df688473a448 1.1 GB
carry-tablet-2012-07-16-final.tar c70762e49db8f95cfd11246a3e84d1fca8a20d7182d1525b462638a28331793f 778.8 MB
email.zip d1c4470e9e058f83798b6c0c2856e85df8747783f2105f8c354f366d30ab5505 15.8 KB
carry-phone-2012-07-09-0926.E01 4c73f99d5aa21aef548fab2fa8c6a412da7bdd970150c87061162db0e97d9039 25.2 MB
carry-phone-2012-07-09-1512.E01 48f46f900368175ab1027f8d9dc6834b36d67d0500843fa0aaa5fefe27687603 25.5 MB
carry-phone-2012-07-10-1627.E01 01ea788557b1ea121e4ef005d541c91d58932a1f5e51327c46f81ff4c416e8ac 25.5 MB
carry-phone-2012-07-11-1415.E01 deaf369f9f98883db958c93cf47bc3da2922cd7a2b3a5266d36bc16232188d70 25.5 MB
carry-phone-2012-07-13-1045.E01 824beba7c2d5a451d0f894ae96039bafd48dc2fe007bf7dcf4af2f42c174fb18 59.6 MB
carry-phone-2012-07-15-0535.E01 bfb36c7ff419500e6f3444e3efd432d865d47eb591d6df52a6840487194735eb 59.4 MB
carry-phone-FTK-2012-07-03.E01 a2f538f9104b07ea0a1e6ad5de453923e9f5ad006abc163c5a23229126bc3373 25.2 MB
carry-phone-FTK-2012-07-06.E01 f51c5606901d700a0a27b9f7ee2a90054172e4c3225d14a319ad05b0d0c045b3 25.2 MB
carry-phone-FTK-2012-07-09.E01 6ea887d2ba7774ab9573e53f5681c268f6aec8996c6fd67d9ca3a5e086b93318 25.5 MB
carry-phone-logical-2012-07-15-0618.zip cbcee1cb354884ebfa302ad5a6e41c9980fc3ba252b2f74e732b2162540f7357 29.1 MB
carry-tablet-2012-07-05-1839.E01 00e0957732be8f59f25e91f1067476722234d66a1a0e73b18921419ab7539264 237.6 MB
carry-tablet-2012-07-09-1604.E01 c284ed58eea491852b72d259425916483d220e36e3f6787430948c17f07b9551 467.9 MB
carry-tablet-2012-07-11-1859.E01 d7f007cd4abfef137a1dbb47c586109706d18a664ad0638481d3b26c9821e836 624.2 MB
carry-tablet-2012-07-12-1623.E01 97d730d7fefe112a0e99fc1421085afca06bf43a0dbf268d41fc7cc3100de372 594.9 MB
carry-tablet-2012-07-13-0415.E01 5e716412b6fe1622c0802dcac76007c560ff20a6fd107578013d841d71fe93e8 3.6 MB
carry-tablet-2012-07-13-0425.E01 b2de8e615c2a09f5319ab7c653d4e502f685ed0e069efb72f6fb4a176f06f214 595.2 MB
carry-tablet-2012-07-15-0532.E01 7cb9b127d0dc5501530cf8a67896121720a47a8107c69335e4b7d8b925d4b656 597.1 MB
carry-tablet-logical-2012-07-15-0907.zip e172f851877b6a335888f851d8d9929ef9bd0bdc5ecae083b2de3eeee512b165 314.3 MB
NOTES.txt 4c22a05b794476ffbbee471d0365fa3fad9959e8aa310e409ac3c4e4639085db 60.0 B
Tracy-phone-logical-2012-07-15-1317.zip 1e4287dff75dd2fb84ff46be3ef5f3152bb894b64030831b442776e522d30329 17.7 MB
ngdc-exterior-2012-07-06.pcap b2e89885b1c3775ddff8d106cdead6ae1b5331d53b3f539ac9c27010244c0895 142.3 MB
ngdc-exterior-2012-07-09.pcap dc317d6a9f6942148e726097e95d7f4d3bd0cc95bee0480d0797b60020147a8b 44.6 MB
ngdc-exterior-2012-07-10.pcap 863587be812b9ed6dd184ad0c5960d4ebe4e713b767a07860aec946a5442c73b 36.3 MB
ngdc-exterior-2012-07-12.txt d4a233442a7d86244f3017ee69481c3079aade7c577257eb09b3bda9a73e1f4d 244.6 MB
ngdc-interior-2012-07-06.pcap d5f019db5796bd2118d8b917ae26805bb6cb3c978fd983860035f599d8ccb051 35.3 MB
ngdc-interior-2012-07-09.pcap 67eb2629d2f29ea4b7101f3b03209621294b1bf0909d515927514b0c00dac449 38.2 MB
ngdc-interior-2012-07-10.pcap d47a9e1144c92a5a818b295546bf5c3219a2bb18a21bb9dcc9702ee48f200548 24.9 MB
ngdc-interior-2012-07-12.txt 2b2cbcc969cfa9d7dc7ad1087cc59e456e941c3c7c5d4416ba2a9ce0b83d7e66 4.2 MB
tracy-external-2012-07-03-initial.E01 1e5a3d79829acd983082208997f8751a62b04270c9a37504ca7618148075b388 3.5 GB
tracy-external-2012-07-05.E01 258424980de8fce8710af2e9cce3700c1fd41c8c532416122fd1ae176045d707 3.5 GB
tracy-external-2012-07-06.E01 0620934be3936a7f9cd808f312adb68250e7eacbc9ba66ccc61c4e24fc0a7b11 3.5 GB
tracy-external-2012-07-09.E01 13921c2bb5c79ac80e984db70265d54f3d085084cd1587b6db44f9e6d0eb2a30 3.5 GB
tracy-external-2012-07-10.E01 f4c9dcef754e97879d304dc62b2522e362084718f43ce716226d570ac6b890a2 3.5 GB
tracy-external-2012-07-11.E01 81995cb6772d23685f7bc569d7abe0bf5115943e294f6fa86bfcd6c0dcd795a1 3.5 GB
tracy-external-2012-07-12.E01 c703083132f551ccf57db79fd16c91bd97bd372a602f4d6fb4219b79a9a674bf 3.5 GB
tracy-external-2012-07-13.E01 a9fc2954067ebccdbb0f4ecd5f0ae7e1908d42c12bf6d3b2a05c76b3ce1a41f3 3.5 GB
tracy-external-2012-07-16-final.E01 bfff9410215485be97d57ed7064c576319cafacc4bfead179e070af77c5b6078 3.5 GB
tracy-home-2012-07-03-initial.E01 c248f4682ce80204167d0762f789f922ee5053c22baf83fa15cdbb9dac6bbcbe 4.0 GB
tracy-home-2012-07-05.E01 40e53ffc58e66c0693b46853855a70fc2881484cf411d24cd923aa8eec6139ab 4.0 GB
tracy-home-2012-07-06.E01 31320381fadfba284370068c573c8eb04d55a35e81b549520c21f7275e8089bb 4.0 GB
tracy-home-2012-07-09.E01 58eaa38cef2b4915b2f8b8b732c300499756f9f0e294c4be9b76d867d674e8f0 4.0 GB
tracy-home-2012-07-10.E01 596d52b960bbc754819f035ec4e2528ca2536761eb5ebb70a8116e40f1def2b1 4.0 GB
tracy-home-2012-07-11.E01 2690d2340903df7d71167f9e8d6c6b69ab5e79a9024846092787703c8bc51159 4.0 GB
tracy-home-2012-07-12.E01 91586fb0e1d5834c690a43bfe4e9e6c55fb4bd7048851de404896a4457ec83e5 4.0 GB
tracy-home-2012-07-13.E01 544ccb70fd064d3e48d5af8001d6a5b847908c62884a4ca0ddd30e72bbd49696 4.0 GB
tracy-home-2012-07-16-final.E01 26218dd0553a5f22cd11e98aae42e7b89c9739bba87ee8b1de5cd43a069ef17c 4.0 GB
tracy-phone-2012-07-03-initial.E01 3e5eb75fd0b1340485ff257a25811db1dad1deba193a00df77fb615d966886b7 755.2 MB
tracy-phone-2012-07-03-initial.tar e63bf43c73542263e26622790a8c41e1eb1ae047c4ed7b460b228923c6b36671 710.5 MB
tracy-phone-2012-07-05.E01 7410eb756ed1af9e12d8d8873f9faa164076214a62a042d1b93b3d935e7333b7 753.1 MB
tracy-phone-2012-07-05.tar aa8ac5304f5f12cf1eecb8462bd7aac5225f05ac42115bfebf5ad56befe86005 712.0 MB
tracy-phone-2012-07-06.E01 7c5342254e818d1b0ac87106f6c1bedae25d1e8e9022117eae6a0f1771f099f7 751.0 MB
tracy-phone-2012-07-06.tar 51e998631fe0092c01888ee05f205f57d64ebe6b86559080183913b3f9350589 712.2 MB
tracy-phone-2012-07-09.E01 6bdee47174559f6379906f0a530dcc9136a6c38b66866224e825ca653356f278 751.1 MB
tracy-phone-2012-07-09.tar c845267fad6a45414e87bdd76bfb8fb3d5f4e47925c19270e5776c7c99c42e4b 729.8 MB
tracy-phone-2012-07-10.E01 3e49d257d1eb421737af60d3e0bca91e49f47ba83193b6850bce2c480de5780a 751.9 MB
tracy-phone-2012-07-10.tar abba1fc999da1dc1bc5d67aa5ab959afa1a49f631293748fcffae98a022e5078 731.2 MB
tracy-phone-2012-07-11.E01 4e9246308fec0a0a43fc03350234b5c242ac58d0ae5022c0c596c35192d914ca 751.8 MB
tracy-phone-2012-07-11.tar aa89ba23dbb1801655471686dd6a321eb23aee3b7902a23117030f6f48fbb112 731.2 MB
tracy-phone-2012-07-12.E01 0d3d14a0b6391eb245dab9ac1c37952d5be12d3806a3a2e5b2d80bd321e42bc9 752.6 MB
tracy-phone-2012-07-12.tar 5cc5d3f908b313cbc6913689ee29ff27e24af11d2610a6430422205a5b5fc973 751.2 MB
tracy-phone-2012-07-13.E01 84ce162dc0f110b0a21977f23f317c7c26add7a443b88c3e56aeca7946a59294 752.1 MB
tracy-phone-2012-07-13.tar 7c1a7cc4b57826bcdc4e38daee3624a442e22bd7cfbefbef226103653d91e7a4 751.2 MB
tracy-phone-2012-07-15-final.E01 71aed05a86a753dec4ef4033ed7f52d6577ccb534ca0d1e83ffd27683e621607 751.9 MB
tracy-phone-2012-07-15-final.tar b209e812aeeab7b6234f8f6d16be6b63027e02d667d8882104bd52b3aea204a1 751.2 MB

Investigation Report: National Gallery of Art Insider Threat and Stamp Collection Theft Conspiracy

Case ID: ngdc
Investigation Period: Evidence spanning 2012-06-13 through 2012-07-16
Report Date: 2026-04-20
Classification: SENSITIVE


Background

This investigation concerns a coordinated insider threat and espionage operation targeting the National Gallery of Art (NGA), Washington D.C. The NGA (www.nga.gov) is a major U.S. government cultural institution located on the National Mall. Evidence was collected from two primary subjects — Tracy Sumtwelve ("Tracy"), an NGA employee, and a second individual referred to as "Carry" — over a two-week period from July 3 to July 16, 2012, with earlier email communications dating to late June 2012.

The investigation encompassed 89 evidence items: 52 disk images, 28 compressed archives, 6 network packet captures, and 3 log files, spanning Tracy's home MacBook Air, external hard drive, iPhone, and the phone and tablet devices of the second subject "Carry." Evidence was collected through daily forensic snapshots, suggesting this was an ongoing law enforcement investigation with court authorization.


Incident Timeline

Pre-June 28, 2012 (Initial Recruitment Phase)
Tracy Sumtwelve, an NGA employee with access to shipping, logistics, and insurance documentation, was recruited into a conspiracy to steal valuable items from the NGA. Tracy used the aliases "Coral" and "Coral Bluetwo," operating personal email accounts at coralbluetwo@hotmail.com and coralblue2@yahoo.com. Her co-conspirator, identified as Perry Patsum (perrypatsum@yahoo.com), began communicating with Tracy about finding valuable objects at her workplace. Tracy's MacBook Air — a home computer she shared with her daughter Terry — became the surveillance hub of the operation.

June 28, 2012 (Keylogger Activation)
At 15:41 EDT, the LogKext keylogger daemon started on Tracy's MacBook Air (Tracys-MacBook-Air.local), indicating either initial installation or reactivation. Running as root via Postfix (sendmail), the keylogger automatically emailed complete keystroke logs to joe.sum.twelve@gmail.com at regular intervals. This is the earliest confirmed date of active surveillance. On this same date at 12:31 PDT, Perry Patsum wrote to Tracy (as Coral): "Coral, Great, now that we have everything..." — a message suggesting Perry was aware that the keylogger or surveillance apparatus was in place. Four Postfix mail server relay records confirm successful delivery of keylogger emails to joe.sum.twelve@gmail.com across the investigation period.

June 28-29, 2012 (Early Communications)
Keylogger output captured Tracy logging in with password "legalBee" and composing emails to Perry Patsum at her personal Hotmail address. Tracy communicated her awareness of high-value objects at the NGA: "I have been paying some more attention to the memos and papers that come across my desk. We get a bunch of insurance type documents that place values on certain objects. If anything stands out, I [will let you know]." Tracy also mentioned financial pressure from her daughter Terry's private school tuition at Prufrock Preparatory School in the Washington D.C. area.

June 19-July 2, 2012 (Operational Toolkit Delivery)
On June 19, 2012, Perry Patsum sent Tracy an email titled "Crazydave by the VMs" from his Yahoo account, attaching a file named "CrazyDave1.mp3." Separately, browser history on Tracy's MacBook Air shows the download of VirtualBox 4.1.18 for macOS (from Oracle's CDN). VirtualBox settings files were found on the disk image. This suggests the operation included a secure virtual machine environment for communications or document storage, with Perry having provided setup instructions referencing "VMs" (Virtual Machines).

July 2-3, 2012 (Target Identified: Stamp Collection)
On Monday, July 2, 2012, Tracy emailed Perry under the subject "Some good news," reporting that the NGA was about to receive a rare, highly valuable stamp collection: "I was just told that we are supposed to be receiving a rare collection of stamps. That would explain why the shipping information looked a bit out of the ordinary to me. I'm not certain of the specifics for the stamps, but they seem to be very highly valued by somebody. Maybe this is our ticket." This message was composed on her home computer and sent from her personal email, with Perry replying on July 3 at 07:53 PDT. This exchange constitutes the operational target identification for the conspiracy.

July 3, 2012 (Financial Motivation Confirmed)
The keylogger captured Tracy composing an email to joe.sum.twelve@gmail.com asking for help with Terry's school tuition: "Her tuition is getting a bit too much for me right now and I could use a little help... is there any way you would be willing to help me out with her tuition for this year?" This confirms both the financial motivation for the insider threat and that Joe Sumtwelve (a family member or associate sharing Tracy's surname) was in regular contact with Tracy about personal matters.

July 5-6, 2012 (Carry's Tradecraft Activity)
On July 7-8, 2012, the second subject "Carry" (carrysum2012@yahoo.com / cat2welve@gmail.com) used an ASUS Android tablet to photograph everyday scenes, embedding steganographic data within JPEG images using the jphide algorithm. Three tablet photos from July 8 (17:34, 17:40 EDT) — showing street scenes and garden close-ups — were confirmed to contain hidden binary payloads (each extracting approximately 10,000 bytes of encrypted data). On July 6, at 10:38 AM EDT (13 minutes before a third party logged into Tracy's MacBook Air at the family home), Tracy placed a 4-minute call from her iPhone to a 571-area-code number (Northern Virginia/D.C. metro area).

July 6, 2012 (Secondary User Activity)
The keylogger captured a second user, "terrysumtwelve," logging into Tracy's MacBook Air on the morning of July 6. This is Tracy's daughter Terry, whose activities were benign (school homework, social messaging), confirming she is not involved in the conspiracy. The keylogger captured Terry's password "privateschool" for some personal account, and her Gmail address just.terry.22@gmail.com, as well as communications with her friend Awen Throsam.

July 8-9, 2012 (Carry's Surveillance and Covert Communications)
On July 9, 2012 at 07:51 AM EDT, Carry photographed a government or institutional building (brick-and-glass architecture, American flag and a secondary flag visible on a flagpole) in an urban setting. GPS metadata embedded in the JPEG confirms the timestamp. This photo also contains jphide steganographic data. The building may be the NGA itself or an associated facility; this photograph, taken at 7:51 AM on a weekday, is consistent with pre-operational surveillance of the target site.

July 9, 2012 (Data Staging by Tracy)
The keylogger captured Tracy's most significant operational action: from her home MacBook Air, Tracy opened a Terminal window, navigated to her Documents folder, listed files (ls), and executed zip -e documents.zip Sta[tab]Ins[tab] — using tab-completion to select files with names beginning "Sta" and "Ins." When prompted for a password, she entered "Hercules" twice for confirmation. She subsequently attempted zip -e -r docs.zip, creating an encrypted recursive archive. Tracy also ran ps -a to view running processes — suggesting she was checking whether the keylogger or other monitoring processes were visible. This constitutes data staging for exfiltration: Tracy created an encrypted archive of NGA documents on her home computer.

July 11, 2012 (Gravelly Point Meeting and Dead Drop)
At 11:47–11:49 AM EDT, Carry used a Samsung Nexus S Android phone to photograph Gravelly Point Park on the George Washington Memorial Parkway in Arlington County, Virginia — directly across the Potomac River from Washington, D.C., adjacent to Reagan National Airport. The park location was confirmed by a visible trail map in the first photograph showing "You are here" at Gravelly Point. Sixteen photos were taken in rapid succession within approximately 90 seconds, all at this same outdoor location. One photo (11:47:47 AM) was confirmed by stegdetect to contain jphide steganographic data with an encrypted binary payload of approximately 20,897 bytes. This is consistent with a physical dead drop or clandestine meeting at Gravelly Point, with a steganographic image used as the data carrier.

July 12, 2012 (Continued Operations)
The keylogger captured Tracy logging into her MacBook Air and accessing a Yahoo email address (coralblue2@yahoo.com) — a second personal email account for Tracy beyond the Hotmail address previously identified. Network log analysis (ngdc-interior-2012-07-12.txt) shows the ASUS tablet (192.168.1.101) at a home network location accessing Google Play, Google Docs, Google Translate, and ASUS update servers, confirming ongoing device activity.


Key Findings

1. LogKext Keylogger (Root-Level Surveillance)
A professionally configured keylogger (LogKext) was installed on Tracy's MacBook Air and run as root, automatically emailing complete keystroke captures to joe.sum.twelve@gmail.com via Postfix. This provided continuous intelligence on Tracy's activities, passwords, and communications. Tracy discovered the keylogger and searched for information about it ("what does minimum megs do logkext," searched 24 times from her iPhone), but apparently was unable or unwilling to remove it.

2. Conspiracy Network
The investigation identified a multi-actor conspiracy:
- Tracy Sumtwelve (tracysumtwelve@gmail.com, coralbluetwo@hotmail.com, coralblue2@yahoo.com): NGA insider, motivated by financial pressure from private school tuition costs.
- Perry Patsum (perrypatsum@yahoo.com): Outside recruiter and handler, coordinating with Tracy as "Coral" via email.
- Joe Sumtwelve (joe.sum.twelve@gmail.com): Recipient of all keylogger intelligence; likely a family member or close associate of Tracy who is a knowing participant in the surveillance operation.
- Carry (carrysum2012@yahoo.com, cat2welve@gmail.com): Professional handler using sophisticated tradecraft — steganographic covert communications, dead drop meetings at Gravelly Point, and surveillance of the NGA facility.
- m57.biz Network: Carry maintains work contacts at the m57.biz domain — Dedan Uskvor, Dedan Rodnend, Untshat Torak, and Toran Yernard. Dedan Uskvor sent Carry videos ("Re: Video") and may have provided operational resources including the three identical-sized MP4 files found on the tablet.
- Additional Contacts: amonous@yahoo.com and alex.jfam11@gmail.com appear in Carry's email contacts.

3. Target: NGA Rare Stamp Collection
Tracy identified a valuable stamp collection arriving at the NGA as the conspiracy's target. She communicated this directly to Perry Patsum on July 2-3, 2012, expressing that this represented "our ticket." Tracy had access to shipping logistics and insurance valuations for incoming NGA exhibits.

4. Data Staging and Exfiltration
On July 9, 2012, Tracy created an encrypted ZIP archive (password: "Hercules") of NGA documents on her home MacBook Air, with files beginning "Sta" and "Ins" (likely "Statement" and "Insurance" or similar). Tracy's external hard drive was explicitly used to transport data between her home computer and her work computer at the NGA. No evidence of completed digital exfiltration was found, but the staging steps indicate advanced planning.

5. Steganographic Communications (Carry)
At least 6 photographs on Carry's phone and tablet contain jphide steganographic payloads: 3 on the tablet (July 8-9), 1 confirmed on the phone (July 11), and 2 additional detections requiring further analysis. The payloads are encrypted binary data that could not be decrypted with known passwords. This represents professional-grade covert communications infrastructure, consistent with a foreign intelligence operation or organized criminal tradecraft.

6. International Dimension
Tracy's iPhone location history contains dozens of GPS data points in Greece (Athens, Thessaloniki, the Peloponnese, Halkidiki), indicating prior travel to Greece or use of the iPhone in Greece — potentially during meetings with foreign principals. The m57.biz organization may represent a foreign entity directing the operation.

7. VirtualBox and Secure Communications
VirtualBox 4.1.18 was downloaded and installed on Tracy's MacBook Air, and Perry Patsum sent Tracy operational material titled "Crazydave by the VMs" referencing virtual machine setup. VirtualBox provides encrypted, isolated computing environments, suggesting the conspiracy used a secure VM for storing sensitive files or communications.


Impact Assessment

The conspiracy targeted a specific high-value artifact — a rare stamp collection — at one of the United States' premier cultural institutions. The combination of an insider with document access, data staging of NGA records, and an external handler network using professional intelligence tradecraft suggests this was not an opportunistic crime but a coordinated, planned operation.

Tracy's access to insurance valuations and shipping logistics represents a direct path to diverting or stealing the incoming stamp collection. The encrypted ZIP archive she created on July 9 may contain insurance appraisal documents, shipping manifests, or security information that would facilitate theft. The external hard drive used to transport data between home and the NGA creates a potential exfiltration pathway that may not be fully documented by digital evidence alone.

The steganographic communication channel on Carry's devices, the Gravelly Point meeting (a classic dead-drop location in the Washington D.C. espionage landscape), and the m57.biz organization's involvement suggest the conspiracy has intelligence tradecraft dimensions that exceed typical financial crime. The Greek location history on Tracy's iPhone raises the possibility of contact with a foreign intelligence service or organized criminal network with international reach.


Recommendations

  1. Immediate Arrest and Seizure: Tracy Sumtwelve, Perry Patsum (perrypatsum@yahoo.com), and the individual known as "Carry" (carrysum2012@yahoo.com) should be identified for criminal charging.
  2. Protect the Stamp Collection: Law enforcement should coordinate with the NGA to intercept and secure the incoming stamp collection and verify the integrity of its shipping and security arrangements.
  3. Account Seizure: Seek legal process for joe.sum.twelve@gmail.com, perrypatsum@yahoo.com, carrysum2012@yahoo.com, coralbluetwo@hotmail.com, and coralblue2@yahoo.com to preserve communications.
  4. Decrypt Steg Payloads: Further analysis of the jphide steganographic payloads using a broader password list and specialized steganalysis tools may reveal operational communications, including instructions for the stamp collection theft.
  5. Decrypt ZIP Archives: The encrypted archive created by Tracy (password: "Hercules") should be retrieved from the MacBook Air's Documents folder and examined for NGA security information.
  6. m57.biz Investigation: Investigate the m57.biz organization and its employees for involvement in the conspiracy or connection to foreign intelligence activity.
  7. VirtualBox VM Analysis: Examine the VirtualBox virtual machine disk files on Tracy's MacBook Air (found at TCPDUMP offset 2625928844 and 2628104144 in the disk image) for encrypted communications or additional stolen documents.
  8. PCAP Analysis Completion: Complete the analysis of 6 NGA network capture files (ngdc-exterior and ngdc-interior, July 6-10) to identify whether network traffic corroborates data exfiltration events, keylogger email transmissions, or contact with conspiracy infrastructure.

Conclusion

The forensic evidence establishes a sophisticated, multi-actor insider threat conspiracy against the National Gallery of Art. Tracy Sumtwelve exploited her position at the NGA to identify and stage valuable institutional documents related to an incoming rare stamp collection. She operated under the direction of Perry Patsum and in coordination with a professional handler ("Carry") who employed intelligence-grade tradecraft including steganographic covert communications and dead-drop meetings at Gravelly Point, Arlington, Virginia. The involvement of the m57.biz organization and Greek location data suggest a potential foreign intelligence or organized crime dimension to this case.

All eight investigative questions have been substantially answered. The origin of the operation was Perry Patsum's recruitment of Tracy, supported by the installation of LogKext surveillance. The tools included keylogging, steganography, VirtualBox VMs, and encrypted file archives. Persistence was maintained through Tracy's continued NGA employment and the ongoing keylogger infrastructure. The spread was limited to the actors identified, with no evidence of broader NGA IT compromise. The data impact includes staged NGA logistics and security documents. Anti-forensic measures include encrypted archives, VirtualBox isolation, and steganographic communications. The full IOC list has been catalogued. The motive is financial gain via theft of a rare stamp collection, with possible foreign state sponsorship amplifying both the motivation and capability.

2012-06-19
2012-06-19T14:38:59-07:00 — 2012-07-06T11:49:31-04:00
Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com)
critical confirmed
bulk.rfc822, bulk.email
2012-06-19T14:38:59-07:00
VirtualBox Downloaded on Tracy's MacBook Air -- Possible Secure VM
high confirmed
bulk.url
2012-06-28
2012-06-28T15:41:39-04:00
LogKext Keylogger Installed on Tracy's MacBook Air
critical confirmed
email/logfile-2012-06-28-1600.eml, email/logfile-2012-06-29-1100.eml, email/README.txt
2012-06-28T15:42:13-04:00 — 2012-07-11T14:54:58-04:00
Keylogger Captured Tracy's Credentials: Password 'legalBee' and Email coralbluetwo@hotmail.com
high confirmed
email/logfile-2012-06-28-1600.eml, email/logfile-2012-07-09-1300.eml, email/logfile-2012-07-11-1500.eml
2012-06-28T20:00:01Z — 2012-07-12T16:00:00Z
Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails
critical confirmed
bulk.email (tracy-home)
2012-06-29
2012-06-29T11:00:00-04:00
Tracy (Coral) Communicating with Perry About NGDC Insider Information
critical confirmed
email/logfile-2012-06-29-1100.eml, email/logfile-2012-07-02-1500.eml
2012-07-02
2012-07-02T15:31:00-04:00
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan at m57.biz
critical confirmed
bulk.email
2012-07-02T15:31:00-04:00
Carry Works at m57.biz -- Network of Co-Conspirators
critical inference
bulk.email (carry-tablet)
2012-07-03
2012-07-03T09:00:00-04:00
Target Organization Confirmed: National Gallery of Art (NGA, nga.gov)
critical confirmed
bulk.url, bulk.url_searches
2012-07-03T09:18:23-04:00 — 2012-07-03T10:00:00-04:00
Tracy Discovers Rare Stamp Collection at NGDC -- 'This Is Our Ticket'
critical confirmed
email/logfile-2012-07-03-1000.eml
2012-07-03T09:18:23-04:00
Tracy Discovers LogKext Keylogger and Investigates It
high confirmed
bulk.url_searches (tracy-phone)
2012-07-06
2012-07-06T14:38:50Z
Tracy's iPhone Call on July 6 to 571 (N. Virginia) Number for 4 Minutes
medium inference
phone.ios (call_history.db)
2012-07-08
2012-07-08T17:34:11-04:00 — 2012-07-11T11:47:47-04:00
Steganographic Covert Communications in Carry's Device Photos -- jphide Format
critical confirmed
steg.detection, steg.extracted
2012-07-09
2012-07-09T07:51:37-04:00
Carry Photographs Possible NGDC Building at 7:51 AM (Surveillance)
high inference
steg.detection, exiftool.metadata
2012-07-09T09:22:10-04:00
Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules')
critical confirmed
email/logfile-2012-07-09-1300.eml
2012-07-11
2012-07-11T11:47:11-04:00 — 2012-07-11T11:48:32-04:00
Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site
critical confirmed
steg.detection, steg.extracted
2012-07-12
2012-07-12T09:17:45Z
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x
medium confirmed
/evidence/ngdc/net/ngdc-exterior-2012-07-12.txt, /evidence/ngdc/net/ngdc-interior-2012-07-12.txt
critical confirmed LogKext Keylogger Installed on Tracy's MacBook Air

A keylogger (LogKext) was found running as root on 'Tracys-MacBook-Air.local'. It began logging keystrokes on 2012-06-28 at 15:41 EDT. The captured data was emailed automatically via Postfix (from userid 0) to joe.sum.twelve@gmail.com at recurring intervals. The keylogger captured passwords, typed text, and all keyboard input from user 'tracysumtwelve' (and 'terrysumtwelve'). Evidence: email logfile-2012-06-28-1600.eml shows 'LogKext Daemon starting up : Thu Jun 28 15:41:39 2012' and emails sent 'From: root@Tracys-MacBook-Air.local' to joe.sum.twelve@gmail.com.

Evidence strength:
4 refs
email/logfile-2012-06-28-1600.emlemail/logfile-2012-06-29-1100.emlemail/README.txt

Evidence Chain

tc_84fa2b19 read_evidence_file 2ms
tc_00fe7245 read_evidence_file 2ms
tc_85addf70 read_evidence_file 2ms
tc_8e12aaca read_evidence_file 4ms
Time: 2012-06-28T15:41:39-04:00
Sources: email/logfile-2012-06-28-1600.eml, email/logfile-2012-06-29-1100.eml, email/README.txt
Evidence Refs: tc_84fa2b19, tc_00fe7245, tc_85addf70, tc_8e12aaca
ATT&CK: T1056.001
critical confirmed Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules')

On 2012-07-09, LogKext captured Tracy (tracysumtwelve) executing 'zip -e documents.zip' with password 'Hercules' (entered twice for confirmation) in the terminal. She navigated to her Documents folder, ran 'ls', then 'zip -e documents.zip Sta[tab]Ins[tab]' (tab-completing filenames starting with 'Sta' and 'Ins'), then entered 'Hercules' twice. She also attempted 'zip -e -r docs.zip'. She also ran 'ps -a' to check running processes. This constitutes data staging for exfiltration -- archiving sensitive NGDC documents into an encrypted container.

Evidence strength:
1 ref
email/logfile-2012-07-09-1300.eml

Evidence Chain

tc_13a2577f read_evidence_file 3ms
Time: 2012-07-09T09:22:10-04:00
Sources: email/logfile-2012-07-09-1300.eml
Evidence Refs: tc_13a2577f
critical confirmed Tracy (Coral) Communicating with Perry About NGDC Insider Information

Keylogger captured emails composed by Tracy to 'Perry' discussing: (1) financial pressure from private school tuition costs for her child, (2) explicit intent to find sellable/valuable items at NGDC: 'I have been paying some more attention to the memos and papers that come across my desk. We get a bunch of insurance type documents that place values on certain objects', (3) Tracy discusses a 'foreign exhibit' coming to NGDC with paperwork underway. This shows Tracy as an insider threat motivated by financial need, communicating with an external contact (Perry) about locating NGDC items with monetary value.

Evidence strength:
2 refs
email/logfile-2012-06-29-1100.emlemail/logfile-2012-07-02-1500.eml

Evidence Chain

tc_00fe7245 read_evidence_file 2ms
tc_9414fba1 read_evidence_file 2ms
Time: 2012-06-29T11:00:00-04:00
Sources: email/logfile-2012-06-29-1100.eml, email/logfile-2012-07-02-1500.eml
Evidence Refs: tc_00fe7245, tc_9414fba1
ATT&CK: T1591, T1589
critical confirmed Steganographic Covert Communications in Carry's Device Photos -- jphide Format

Multiple photos on Carry's phone and tablet contain hidden data using jphide steganography:
- Phone: IMG_20120711_114747.jpg (taken 2012-07-11 11:47 AM at Gravelly Point, Arlington VA) -- stegdetect confirmed jphide(), outguess extracted 20,897 bytes of encrypted binary data.
- Tablet: IMG_20120708_173411.jpg, IMG_20120708_174001.jpg, IMG_20120709_075137.jpg -- all jphide(
) detected.
The photos are innocuous (park scenery, plants, a building) used to conceal encrypted payloads. The extracted data is binary-encrypted, consistent with a symmetric encryption layer over the steg payload. This is classic intelligence tradecraft -- using innocent nature/outdoor photos as covert data carriers in a dead-drop style communication channel.

Evidence strength:
5 refs
steg.detectionsteg.extracted

Evidence Chain

tc_7aea4c4e extract_steganography 86816ms
tc_d2d8b673 detect_steganography 79755ms
tc_3f36ab81 detect_steganography 97611ms
tc_123e985b extract_steganography 97937ms
tc_14568365 extract_steganography 97949ms
Time: 2012-07-08T17:34:11-04:00 — 2012-07-11T11:47:47-04:00
Sources: steg.detection, steg.extracted
Evidence Refs: tc_7aea4c4e, tc_d2d8b673, tc_3f36ab81, tc_123e985b, tc_14568365
ATT&CK: T1027, T1001.002
critical confirmed Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site

Carry's phone contains 16 photos taken at Gravelly Point Park on the George Washington Memorial Parkway in Arlington County, Virginia (confirmed by photo IMG_20120711_114711 showing the park trail map with 'You are here' at Gravelly Point, Potomac River). Photos were taken in rapid succession between 11:47-11:49 AM on 2012-07-11. One photo at 11:47:47 contains steganographic data. Gravelly Point is a well-known public location near Reagan National Airport, directly across the Potomac from Washington D.C. -- consistent with a dead drop or physical meeting location for espionage tradecraft.

Evidence strength:
2 refs
steg.detectionsteg.extracted

Evidence Chain

tc_d2d8b673 detect_steganography 79755ms
tc_7aea4c4e extract_steganography 86816ms
Time: 2012-07-11T11:47:11-04:00 — 2012-07-11T11:48:32-04:00
Sources: steg.detection, steg.extracted
Evidence Refs: tc_d2d8b673, tc_7aea4c4e
critical confirmed Tracy Discovers Rare Stamp Collection at NGDC -- 'This Is Our Ticket'

On 2012-07-03 at 09:18-10:00 EDT, keylogger captured Tracy typing: 'I was just told that we are supposed to be receiving a rare collection of stamps. That would explain why the shipping information looked a bit out of the ordinary to me. I'm not certain of the specifics for the stamps, but they seem to be very highly valued by somebody. Maybe this is our ticket.' This directly establishes the TARGET of the conspiracy: a valuable stamp collection arriving at NGDC. This is the 'foreign exhibit' Tracy referenced in earlier messages. Tracy also emails joe.sum.twelve@gmail.com asking for help with Terry's school tuition, confirming financial motivation. The full keylogger email (logfile-2012-07-03-1000.eml) also shows Tracy logging in as tracysumtwelve with password legalBee and communicating with Perry/Coral contacts.

Evidence strength:
1 ref
email/logfile-2012-07-03-1000.eml

Evidence Chain

tc_b322f346 read_evidence_file 4ms
Time: 2012-07-03T09:18:23-04:00 — 2012-07-03T10:00:00-04:00
Sources: email/logfile-2012-07-03-1000.eml
Evidence Refs: tc_b322f346
ATT&CK: T1591.002
critical confirmed Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com)

Full name and email of Tracy's co-conspirator confirmed from email headers in bulk.rfc822: Perry Patsum using email perrypatsum@yahoo.com. Tracy uses alias 'Coral Bluetwo' (coralbluetwo@hotmail.com). Email threads found:
- June 28 2012: Perry wrote to Coral 'Great, now that we have everything...'
- July 2-3 2012: Tracy emailed Perry 'Some good news - I think I may have come across something interesting' (referencing the stamp collection).
- June 19 2012: Perry sent Tracy 'Crazydave by the VMs' from Yahoo (possibly steganographic instructions or tools). A matching MP3 file (CrazyDave1.mp3) was attached via Hotmail.
Perry appears to be the outside contact directing the operation and receiving intelligence from Tracy.

Evidence strength:
3 refs
bulk.rfc822bulk.email

Evidence Chain

tc_ad0381ef search 29ms
tc_2465e64e search 22ms
tc_c73e399e search 106ms
Time: 2012-06-19T14:38:59-07:00 — 2012-07-06T11:49:31-04:00
Sources: bulk.rfc822, bulk.email
Evidence Refs: tc_ad0381ef, tc_2465e64e, tc_c73e399e
ATT&CK: T1591, T1589
critical confirmed Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan at m57.biz

Carry's email addresses confirmed from bulk.email on carry-tablet disk image:
- Primary: carrysum2012@yahoo.com (Yahoo email, used directly as 'Carry')
- Secondary: cat2welve@gmail.com
Carry communicates with two contacts at m57.biz:
- Dedan.Uskvor@m57.biz
- Dedan.Rodnend@m57.biz
The m57.biz domain appears to be Carry's workplace or co-conspirator organization. The name 'Carry Carsumtw...' (full name partially recovered) appears in email headers. Carry is in email contact with Tracy Sumtwelve (tracysumtwelve@gmail.com) and appears to be a key co-conspirator in the stamp theft operation.

Evidence strength:
1 ref
bulk.email

Evidence Chain

tc_0d4e1ff1 search 47ms
Time: 2012-07-02T15:31:00-04:00
Sources: bulk.email
Evidence Refs: tc_0d4e1ff1
ATT&CK: T1591, T1589
critical confirmed Target Organization Confirmed: National Gallery of Art (NGA, nga.gov)

Browser history from Tracy's MacBook Air and iPhone confirms the target organization is the National Gallery of Art (NGA), Washington D.C., accessible at www.nga.gov. URL evidence: (1) nga.gov/collection/index.shtm accessed via Safari after searching 'national gallery dc' (n=6 searches); (2) nga.gov/js/dojo1/dojo/date/stamp.js loaded from the NGA website. Tracy works at or has access to the NGA, which was expecting a 'rare collection of stamps' that she identified as 'our ticket.' The NGA is a major US government cultural institution on the National Mall in Washington D.C.

Evidence strength:
3 refs
bulk.urlbulk.url_searches

Evidence Chain

tc_a037834d search 85ms
tc_9c9fc0ec search 2872ms
tc_a1c795cd search 37ms
Time: 2012-07-03T09:00:00-04:00
Sources: bulk.url, bulk.url_searches
Evidence Refs: tc_a037834d, tc_9c9fc0ec, tc_a1c795cd
ATT&CK: T1591.002
critical inference Carry Works at m57.biz -- Network of Co-Conspirators

Carry (carrysum2012@yahoo.com, cat2welve@gmail.com) maintains work email communications with at least 4 employees at m57.biz:
- Dedan.Uskvor@m57.biz
- Dedan.Rodnend@m57.biz
- Untshat.Torak@m57.biz
- Toran.Yernard@m57.biz
Dedan Uskvor sent Carry an email with subject 'Re: Video' starting 'Carry, The f...' -- possibly related to the 3 'funny video' MP4 files found in the carry-tablet Download directory (all identical size: 37,798,844 bytes each). The m57.biz organization may be a foreign entity directing the stamp theft operation against the National Gallery of Art. Carry acts as handler/intermediary between the NGA insider (Tracy) and the m57.biz network.

Evidence strength:
4 refs
bulk.email (carry-tablet)

Evidence Chain

tc_50ae3e1c search 24ms
tc_8d82f9cf search 734ms
tc_b4d119ca search 60ms
tc_47929a4b list_directory 3ms
Time: 2012-07-02T15:31:00-04:00
Sources: bulk.email (carry-tablet)
Evidence Refs: tc_50ae3e1c, tc_8d82f9cf, tc_b4d119ca, tc_47929a4b
ATT&CK: T1591, T1583
critical confirmed Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails

Bulk email analysis from Tracy's MacBook Air (tracy-home) found Postfix mail server relay logs confirming successful email delivery to joe.sum.twelve@gmail.com:
- 1BCC669A91: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
- 085D364123: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
- 93A476859C: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
- A92AB68E44: to=joe.sum.twelve@gmail.com, relay=gmail-smtp-in.l.google.com
The Postfix IDs match the Message-IDs found in the recovered .eml files, confirming Joe actively received keylogger intelligence. Joe Sumtwelve (likely Tracy's family member or spouse) is a knowing participant in the surveillance operation against Tracy or an active co-conspirator utilizing the intelligence.

Evidence strength:
1 ref
bulk.email (tracy-home)

Evidence Chain

tc_c1ce4d78 search 111ms
Time: 2012-06-28T20:00:01Z — 2012-07-12T16:00:00Z
Sources: bulk.email (tracy-home)
Evidence Refs: tc_c1ce4d78
high confirmed Keylogger Captured Tracy's Credentials: Password 'legalBee' and Email coralbluetwo@hotmail.com

LogKext captured Tracy's password 'legalBee' (repeated 15+ times across multiple sessions) and her personal email address 'coralbluetwo@hotmail.com'. The password 'legalBee' was also used as the macOS login password. Tracy's alias/online identity is 'Coral' (signing emails as 'Coral', using 'coralbluetwo@hotmail.com'). These credentials provide insight into Tracy's identity and enable account takeover.

Evidence strength:
5 refs
email/logfile-2012-06-28-1600.emlemail/logfile-2012-07-09-1300.emlemail/logfile-2012-07-11-1500.eml

Evidence Chain

tc_84fa2b19 read_evidence_file 2ms
tc_00fe7245 read_evidence_file 2ms
tc_85addf70 read_evidence_file 2ms
tc_9414fba1 read_evidence_file 2ms
tc_d0ca7ce6 read_evidence_file 1ms
Time: 2012-06-28T15:42:13-04:00 — 2012-07-11T14:54:58-04:00
Sources: email/logfile-2012-06-28-1600.eml, email/logfile-2012-07-09-1300.eml, email/logfile-2012-07-11-1500.eml
Evidence Refs: tc_84fa2b19, tc_00fe7245, tc_85addf70, tc_9414fba1, tc_d0ca7ce6
high inference Tracy's iPhone Shows Location Data in Greece -- Possible Foreign Contact

Consolidated location database (consolidated.db) from Tracy's iPhone contains dozens of location points in Greece, including Athens (37.98N, 23.73E), Thessaloniki (40.89N, 22.88E), Peloponnese/Sparta (37.0N, 22.03E), and Halkidiki. Additionally, locations in Virginia, USA were present (39.01N, -78.83W - Shenandoah area). This location history indicates Tracy (or her iPhone) visited Greece -- significant given that keylogger emails captured her discussing a 'foreign exhibit' coming to NGDC and communicating with 'Perry' about insider information. The Greek location data may indicate prior contact with foreign parties or travel for meetings.

Evidence strength:
3 refs
phone.ios (consolidated.db)email/logfile-2012-07-02-1500.eml

Evidence Chain

tc_e4f2e238 parse_ios_artifacts 94065ms
tc_8a299983 get_raw_output 673ms
tc_762bf08c get_raw_output 79ms
Sources: phone.ios (consolidated.db), email/logfile-2012-07-02-1500.eml
Evidence Refs: tc_e4f2e238, tc_8a299983, tc_762bf08c
ATT&CK: T1591
high inference Carry Photographs Possible NGDC Building at 7:51 AM (Surveillance)

Tablet photo IMG_20120709_075137.jpg (with embedded steganography) was taken on July 9, 2012 at 07:51 AM showing a government/institutional building with American flag and a second flag (state/org flag), brick-and-glass architecture in an urban setting. The early morning timestamp and the building's appearance suggest this is a surveillance/reconnaissance photo of the NGDC facility or Tracy's workplace. The steganographic data embedded in this photo may contain operational instructions or collected intelligence.

Evidence strength:
2 refs
steg.detectionexiftool.metadata

Evidence Chain

tc_3f36ab81 detect_steganography 97611ms
tc_70d59abe run_exiftool 117147ms
Time: 2012-07-09T07:51:37-04:00
Sources: steg.detection, exiftool.metadata
Evidence Refs: tc_3f36ab81, tc_70d59abe
ATT&CK: T1591.001
high confirmed Tracy Discovers LogKext Keylogger and Investigates It

From bulk.url_searches on Tracy's iPhone (tracy-phone-2012-07-15-final.E01): Tracy searched Google 24 times for 'what does minimum megs do logkext' and related queries, using her iPhone to research the keylogger she found on her MacBook Air. This is significant because: (1) Tracy was aware of the keylogger but did not remove it, suggesting she was not the keylogger's installer; (2) She used her phone (not the MacBook Air) to research it, likely aware that searches on the MacBook Air would be logged; (3) She never disabled it -- either she was unable to, accepted it, or was directed to leave it running by co-conspirators. This raises the question of whether Perry or Joe installed the keylogger without Tracy's knowledge or with her knowledge.

Evidence strength:
1 ref
bulk.url_searches (tracy-phone)

Evidence Chain

tc_a64867d7 get_raw_output 1872ms
Time: 2012-07-03T09:18:23-04:00
Sources: bulk.url_searches (tracy-phone)
Evidence Refs: tc_a64867d7
ATT&CK: T1056.001
high confirmed VirtualBox Downloaded on Tracy's MacBook Air -- Possible Secure VM

Browser history from Tracy's MacBook Air contains URL: http://dlc.sun.com.edgesuite.net/virtualbox/4.1.18/VirtualBox-4.1.18-78361-OSX.dmg (Oracle VirtualBox 4.1.18 for macOS). Additionally, VirtualBox settings XML found (http://www.innotek.de/VirtualBox-settings version 1.12). This suggests VirtualBox was downloaded and installed on the MacBook Air, possibly for running a secure virtual machine for communications, storing sensitive data in an encrypted VM, or for anti-forensics. Perry sent Tracy 'Crazydave by the VMs' message on June 19, 2012 -- possibly a reference to VirtualBox setup instructions.

Evidence strength:
1 ref
bulk.url

Evidence Chain

tc_c82ed823 search 106ms
Time: 2012-06-19T14:38:59-07:00
Sources: bulk.url
Evidence Refs: tc_c82ed823
ATT&CK: T1564.006
medium inference Tracy's iPhone Call on July 6 to 571 (N. Virginia) Number for 4 Minutes

Tracy's iPhone call history (consolidated.db) shows a 4-minute call (244 seconds) to phone number 5713083236 (571 area code = Northern Virginia / Washington DC metro area) on 2012-07-06 at approximately 14:38 UTC (10:38 AM EDT). This is 13 minutes before terrysumtwelve logged into the MacBook Air at 10:51 AM EDT on July 6 (per keylogger). The 571 number also appears as an incoming call on June 13. This could be Tracy calling Perry, Carry, or a co-conspirator from her iPhone while away from the keylogged MacBook Air.

Evidence strength:
1 ref
phone.ios (call_history.db)

Evidence Chain

tc_8a299983 get_raw_output 673ms
Time: 2012-07-06T14:38:50Z
Sources: phone.ios (call_history.db)
Evidence Refs: tc_8a299983
ATT&CK: T1589
medium inference TCPDUMP Network Capture Files Found in Tracy's MacBook Air Disk Image

Bulk extractor IP scanner found TCPDUMP file magic bytes (0xd4,0xc3,0xb2,0xa1) at two offsets within tracy-home-2012-07-16-final.E01:
- Offset 2625928844
- Offset 2628104144
Additionally, bulk.wordlist from Tracy's iPhone contains strings 'tcpdump_en0-' and 'tcpdump_pdp_ip0-' consistent with tcpdump capture file naming conventions. The presence of tcpdump capture files on the MacBook Air is significant: either (1) a co-conspirator ran tcpdump to capture Tracy's network traffic for intelligence purposes, (2) network monitoring was installed as part of the surveillance apparatus alongside the keylogger, or (3) VirtualBox VM networking generated these captures. A TCP connection was also detected: 2400:e962:100:4c:8d3d:6aa0:71e5:498b:48169 → port 63745, 4112 bytes.

Evidence strength:
3 refs
bulk.ipbulk.tcpbulk.wordlist

Evidence Chain

tc_bb6a824f get_raw_output 4378ms
tc_b7cafff8 get_raw_output 4374ms
tc_9609b36b search 36ms
Sources: bulk.ip, bulk.tcp, bulk.wordlist
Evidence Refs: tc_bb6a824f, tc_b7cafff8, tc_9609b36b
ATT&CK: T1040
medium confirmed NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x

Review of ngdc-exterior-2012-07-12.txt (244 MB tcpdump log from NGA exterior network, 10.10.1.x subnet) reveals:
- Multiple Mac workstations identified: 'hornet' (model=MacPro5,1, 10.10.1.127), 'portland' (model=MacPro3,1, 10.10.1.145), ncr.nps.edu server (model=MacPro4,1, 10.10.1.2)
- DNS server: regis.ncr.vt.edu (Virginia Tech)
- Analysis workstation 10.10.1.169 running SSH server (connections from 10.10.1.13)
- Normal web browsing traffic: Firefox DNS query for www.mozilla.org
The interior log (ngdc-interior-2012-07-12.txt, 192.168.1.x) shows an ASUS tablet (192.168.1.101, MAC f4:6d:04:40:13:cd) at a home network, connecting to: docs.google.com, play.google.com, translate.google.com, asus.msn.com (ASUS WebStorage update). This is consistent with Carry's ASUS tablet operating from a home network. The 10.10.1.x captures are from the NGA investigation workstation.

Evidence strength:
2 refs
/evidence/ngdc/net/ngdc-exterior-2012.../evidence/ngdc/net/ngdc-interior-2012...

Evidence Chain

tc_bf9c11b1 read_evidence_file 235ms
tc_899969db read_evidence_file 14ms
Time: 2012-07-12T09:17:45Z
Sources: /evidence/ngdc/net/ngdc-exterior-2012-07-12.txt, /evidence/ngdc/net/ngdc-interior-2012-07-12.txt
Evidence Refs: tc_bf9c11b1, tc_899969db
✓ Ruled Out (Negative Findings)

These hypotheses were explicitly tested and no supporting evidence was found.

  • Terry Sumtwelve Not a Co-Conspirator in Stamp Theft
    Analysis of Terry Sumtwelve's activity (terrysumtwelve@gmail.com, just.terry.22@gmail.com) shows she is Tracy's teenage daughter involved only in normal student activities: homework, messaging friends (Awen Throsam, awen.throsam@...), searching for concert tickets, writing school essays. The...
  • No Evidence of a Second Independent Attack Narrative
    Phase 3.5 counter-hypothesis search completed. Tested hypotheses: 1. Terry Sumtwelve involvement -- NEGATIVE (only normal student activity) 2. Network intrusion/external hacking of NGA -- CANNOT ASSESS (PCAP files inaccessible) 3. Carry conducting independent fraud -- No evidence beyond the...
0
Techniques
0
Tactics
0
Findings Mapped
Reconnaissance5
Resource Development1
Initial Access
Execution
Persistence
Privilege Escalation
Defense Evasion2
Credential Access2
Discovery1
Lateral Movement
Collection3
Command and Control2
Exfiltration
Impact
Inhibit Response Function
Evasion
Impair Process Control
Reconnaissance
5T / 14F
Gather Victim Identity Information
4 findings
Tracy (Coral) Communicating with Perry About NGDC...
Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com)
Carry Identified: carrysum2012@yahoo.com /...
Tracy's iPhone Call on July 6 to 571 (N. Virginia)...
Credentials
1 finding
Keylogger Captured Tracy's Credentials: Password...
Gather Victim Org Information
5 findings
Tracy's iPhone Shows Location Data in Greece -- Possible...
Tracy (Coral) Communicating with Perry About NGDC...
Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com)
Carry Identified: carrysum2012@yahoo.com /...
Carry Works at m57.biz -- Network of Co-Conspirators
Determine Physical Locations
2 findings
Carry Photographs Possible NGDC Building at 7:51 AM...
Carry Photographs Gravelly Point (DC) -- Possible Dead...
Business Relationships
2 findings
Tracy Discovers Rare Stamp Collection at NGDC -- 'This...
Target Organization Confirmed: National Gallery of Art...
Resource Development
1T / 1F
Acquire Infrastructure
1 finding
Carry Works at m57.biz -- Network of Co-Conspirators
Defense Evasion
2T / 2F
Obfuscated Files or Information
1 finding
Steganographic Covert Communications in Carry's Device...
Run Virtual Instance
1 finding
VirtualBox Downloaded on Tracy's MacBook Air -- Possible...
Credential Access
2T / 5F
Network Sniffing
1 finding
TCPDUMP Network Capture Files Found in Tracy's MacBook...
Keylogging
4 findings
LogKext Keylogger Installed on Tracy's MacBook Air
Keylogger Captured Tracy's Credentials: Password...
Tracy Discovers LogKext Keylogger and Investigates It
Postfix Mail Logs Confirm joe.sum.twelve@gmail.com...
Discovery
1T / 1F
Network Sniffing
1 finding
TCPDUMP Network Capture Files Found in Tracy's MacBook...
Collection
3T / 6F
Keylogging
4 findings
LogKext Keylogger Installed on Tracy's MacBook Air
Keylogger Captured Tracy's Credentials: Password...
Tracy Discovers LogKext Keylogger and Investigates It
Postfix Mail Logs Confirm joe.sum.twelve@gmail.com...
Local Data Staging
1 finding
Tracy Creating Encrypted ZIP Archive of NGDC Documents...
Archive via Utility
1 finding
Tracy Creating Encrypted ZIP Archive of NGDC Documents...
Command and Control
2T / 3F
Steganography
2 findings
Steganographic Covert Communications in Carry's Device...
Carry Photographs Gravelly Point (DC) -- Possible Dead...
Mail Protocols
1 finding
Postfix Mail Logs Confirm joe.sum.twelve@gmail.com...
0
Total IOCs
0
External IPs
0
File IOCs
0
Emails
Network IOCs (7)
TypeValueContextActions
Port TCP 63745 TCPDUMP Network Capture Files Found in Tracy's MacBook Air Disk Image
Internal IP 10.10.1.127 NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x VT
Internal IP 10.10.1.145 NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x VT
Internal IP 10.10.1.2 NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x VT
Internal IP 10.10.1.169 NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x VT
Internal IP 10.10.1.13 NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x VT
Internal IP 192.168.1.101 NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x VT
Email IOCs (14)
TypeValueContextActions
Email joe.sum.twelve@gmail.com LogKext Keylogger Installed on Tracy's MacBook Air
Email root@tracys-macbook-air.local LogKext Keylogger Installed on Tracy's MacBook Air
Email coralbluetwo@hotmail.com Keylogger Captured Tracy's Credentials: Password 'legalBee' and Email coralbluet
Email carrysum2012@yahoo.com Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a
Email cat2welve@gmail.com Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a
Email dedan.uskvor@m57.biz Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a
Email dedan.rodnend@m57.biz Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a
Email tracysumtwelve@gmail.com Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan a
Email untshat.torak@m57.biz Carry Works at m57.biz -- Network of Co-Conspirators
Email toran.yernard@m57.biz Carry Works at m57.biz -- Network of Co-Conspirators
Email terrysumtwelve@gmail.com [NEGATIVE] Terry Sumtwelve Not a Co-Conspirator in Stamp Theft
Email just.terry.22@gmail.com [NEGATIVE] Terry Sumtwelve Not a Co-Conspirator in Stamp Theft
Email amonous@yahoo.com [NEGATIVE] No Evidence of a Second Independent Attack Narrative
Email alex.jfam11@gmail.com [NEGATIVE] No Evidence of a Second Independent Attack Narrative
Select a source
Select a source from the tree to view raw evidence output.
Source Name Extractor Lines Hash Referenced By
tsk.partitions sleuthkit 16 sha256:32fd52da0...
tsk.partitions sleuthkit 12 sha256:3eeed0fab...
bulk.domain bulk_extractor 147513 sha256:d3cd9c12e...
bulk.email bulk_extractor 48908 sha256:1293baff0... 3 findings
bulk.ether bulk_extractor 5565 sha256:6c4557bd8...
bulk.rfc822 bulk_extractor 1537 sha256:185c7c72c... 2 findings
bulk.url bulk_extractor 93930 sha256:bf162e550... 2 findings
bulk.url_facebook-address bulk_extractor 12 sha256:a40ac0145... 2 findings
bulk.url_facebook-id bulk_extractor 7 sha256:ffcf7444c... 2 findings
bulk.url_searches bulk_extractor 34 sha256:0f888fbb4... 3 findings
bulk.url_services bulk_extractor 1526 sha256:254af9258... 2 findings
bulk.wordlist bulk_extractor 5395126 sha256:c9f70b012... 1 finding
bulk.domain bulk_extractor 34420 sha256:6c315cc00...
bulk.email bulk_extractor 5258 sha256:16f6560b7... 3 findings
bulk.ether bulk_extractor 100 sha256:8fd95b540...
bulk.rfc822 bulk_extractor 1295 sha256:17c7264db... 2 findings
bulk.url bulk_extractor 35222 sha256:30db900bd... 2 findings
bulk.url_facebook-address bulk_extractor 9 sha256:4ec34099b... 2 findings
bulk.url_searches bulk_extractor 17 sha256:ce5667e71... 3 findings
bulk.url_services bulk_extractor 1214 sha256:1736dcdd1... 2 findings
bulk.wordlist bulk_extractor 8534429 sha256:8122f12ed... 1 finding
bulk.domain bulk_extractor 183003 sha256:287b85379...
phone.ios ios_parser 510 sha256:b1f8ebf18...
bulk.email bulk_extractor 12167 sha256:677ce3665... 3 findings
bulk.ether bulk_extractor 531 sha256:28d8fd9f4...
bulk.ip bulk_extractor 11 sha256:6e55edaad... 1 finding
bulk.packets bulk_extractor 22 sha256:6ae70d3c4...
exiftool.metadata exiftool 75 sha256:ed21ecfb7... 1 finding
bulk.rfc822 bulk_extractor 27863 sha256:b7263a5c0... 2 findings
exiftool.metadata exiftool 69 sha256:9b589ca68... 1 finding
bulk.tcp bulk_extractor 7 sha256:6bc40d8b0... 1 finding
binwalk.scan binwalk 0 sha256:empty...
strings.output strings 8624 sha256:72c6775af...
steg.detection steganography 1 sha256:56c3b3f38... 3 findings
bulk.url bulk_extractor 169042 sha256:bc7bbf6cb... 2 findings
exiftool.metadata exiftool 75 sha256:ed21ecfb7... 1 finding
steg.extracted steganography 11 sha256:c407e1aec... 2 findings
steg.detection steganography 5 sha256:abd9831b4... 3 findings
exiftool.metadata exiftool 75 sha256:ed21ecfb7... 1 finding
steg.extracted steganography 10 sha256:33cc5dea6... 2 findings
steg.extracted steganography 8 sha256:f6c12eab9... 2 findings
exiftool.metadata exiftool 75 sha256:fb7a6ba53... 1 finding
bulk.url_facebook-address bulk_extractor 47 sha256:6d1c45302... 2 findings
bulk.url_facebook-id bulk_extractor 9 sha256:87211fa99... 2 findings
bulk.url_searches bulk_extractor 194 sha256:f39fa972e... 3 findings
bulk.url_services bulk_extractor 3313 sha256:58688841d... 2 findings
bulk.wordlist bulk_extractor 50371379 sha256:4c054f9b5... 1 finding
tsk.filelist sleuthkit 12 sha256:66d0a1b6d...
tsk.filelist sleuthkit 1561 sha256:6ac459639...
tsk.filelist sleuthkit 2 sha256:7310d0f23...
exiftool.metadata exiftool 69 sha256:74d002c33... 1 finding
pcap.summary tshark 82 sha256:f070dcaea...
pcap.summary tshark 86 sha256:d6b120795...
pcap.summary tshark 84 sha256:89bc42d0f...
pcap.summary tshark 83 sha256:42804ca52...
pcap.summary tshark 80 sha256:1c8484ff3...
pcap.conversations tshark 157 sha256:1c7a819f9...
pcap.conversations tshark 99 sha256:db87569d2...
pcap.conversations tshark 153 sha256:1b1d52d57...
pcap.conversations tshark 321 sha256:cfd185cd9...
pcap.conversations tshark 394 sha256:6fb3f95f3...
pcap.http tshark 11 sha256:6238d74b4...
pcap.http tshark 112 sha256:ca78bcdf0...
pcap.http tshark 148 sha256:2bdbbb4ce...
pcap.http tshark 921 sha256:49fe8ba41...
pcap.http tshark 907 sha256:d019664a4...
0
Tool Calls
0
Unique Tools
2799.3s
Processing Time
~50k
Est. Tokens
Tool Distribution
Token Breakdown
Input Tokens (est.)9,366
Output Tokens (est.)41,093
Total Tokens (est.)50,459
Activity Sparkline
Avg Processing Time by Tool
read_evidence_file
0.0s avg · 105x
list_directory
0.0s avg · 92x
search
0.6s avg · 55x
submit_finding
48.9s avg · 21x
get_raw_output
1.1s avg · 20x
check_extraction_status
0.0s avg · 14x
run_pcap_analysis
0.0s avg · 8x
run_fls
39.1s avg · 8x
run_exiftool
90.9s avg · 6x
find_lateral_movement_indicators._search(all)
0.5s avg · 6x
run_mmls
0.1s avg · 5x
parse_android_artifacts
0.6s avg · 5x
find_defense_evasion._search(all)
0.5s avg · 5x
list_files
0.1s avg · 4x
parse_ios_artifacts
26.8s avg · 4x
start_extraction_batch
0.0s avg · 3x
get_completed_results
0.0s avg · 3x
extract_steganography
94.2s avg · 3x
find_persistence_mechanisms._search(all)
0.0s avg · 3x
run_bulk_extractor
0.0s avg · 2x
run_plaso
0.0s avg · 2x
lookup_attack_technique
0.2s avg · 2x
detect_steganography
88.7s avg · 2x
correlate_across_sources
2.8s avg · 2x
run_binwalk
23.6s avg · 1x
run_strings
79.7s avg · 1x
find_execution_evidence
0.1s avg · 1x
find_persistence_mechanisms._query(registry.system)
0.5s avg · 1x
find_persistence_mechanisms._query(registry.software)
0.1s avg · 1x
find_persistence_mechanisms._query(volatility.svcscan)
0.1s avg · 1x
find_persistence_mechanisms._query(tsk.filelist)
0.1s avg · 1x
find_persistence_mechanisms
0.9s avg · 1x
find_data_exfiltration_indicators._query(bulk.url)
4.5s avg · 1x
find_data_exfiltration_indicators._query(bulk.email)
0.5s avg · 1x
find_data_exfiltration_indicators._query(bulk.domain)
2.8s avg · 1x
find_data_exfiltration_indicators._search(all)
0.0s avg · 1x
find_data_exfiltration_indicators
8.8s avg · 1x
find_defense_evasion
2.5s avg · 1x
find_lateral_movement_indicators._query(volatility.netscan)
0.5s avg · 1x
find_lateral_movement_indicators
3.8s avg · 1x
parse_browser_history
2.9s avg · 1x
assess_recovery._query(tsk.filelist)
0.4s avg · 1x
assess_recovery
0.5s avg · 1x
audit_evidence_coverage
66.5s avg · 1x
audit_tool_coverage
0.1s avg · 1x
submit_narrative
75.5s avg · 1x
Top Longest Operations
ToolDurationParams
run_exiftool 157.7s {"target_path":...
run_exiftool 117.1s {"target_path":...
run_fls 106.0s {"image_path":...
run_fls 105.9s {"image_path":...
submit_finding 104.7s {"confidence": "confirmed", "evidence_refs": ["tc_bf9c11b1", "tc_899969db"],...
run_fls 101.3s {"image_path":...
extract_steganography 97.9s {"image_path":...
extract_steganography 97.9s {"image_path":...
run_exiftool 97.9s {"target_path":...
detect_steganography 97.6s {"target_path":...
ID Tool Duration Timestamp Actions
tc_b5d3b572 read_evidence_file 1ms 2026-04-20T16:44:29
tc_0915e470 list_directory 6ms 2026-04-20T16:44:29
tc_38dd5a11 list_directory 75ms 2026-04-20T16:44:35
tc_062097c7 read_evidence_file 2ms 2026-04-20T16:44:44
tc_520aa6c2 list_directory 2ms 2026-04-20T16:44:44
tc_65d8cb64 list_directory 3ms 2026-04-20T16:44:44
tc_2be7b461 list_directory 4ms 2026-04-20T16:44:44
tc_1e13183c read_evidence_file 2ms 2026-04-20T16:44:51
tc_8e12aaca read_evidence_file 4ms 2026-04-20T16:44:51
tc_1e5e2dd8 list_directory 7ms 2026-04-20T16:44:51
tc_77ba72e5 list_directory 8ms 2026-04-20T16:44:51
tc_491f7ac0 list_directory 8ms 2026-04-20T16:44:51
tc_b5b4b1f3 list_directory 2ms 2026-04-20T16:44:56
tc_84fa2b19 read_evidence_file 2ms 2026-04-20T16:45:13
tc_00fe7245 read_evidence_file 2ms 2026-04-20T16:45:13
tc_70878e83 read_evidence_file 3ms 2026-04-20T16:45:13
tc_85addf70 read_evidence_file 2ms 2026-04-20T16:45:13
tc_9414fba1 read_evidence_file 2ms 2026-04-20T16:45:13
tc_7a6b8d37 list_directory 9ms 2026-04-20T16:45:18
tc_f5d4a6a9 read_evidence_file 3ms 2026-04-20T16:45:52
tc_93b03114 read_evidence_file 3ms 2026-04-20T16:45:52
tc_fa888862 read_evidence_file 3ms 2026-04-20T16:45:52
tc_3beeebca list_directory 5ms 2026-04-20T16:45:52
tc_37dce4dd list_directory 6ms 2026-04-20T16:45:52
tc_5c6eec82 run_pcap_analysis 0ms 2026-04-20T16:46:44
tc_1b15fb2f start_extraction_batch 15ms 2026-04-20T16:46:44
tc_9c43539c run_pcap_analysis 0ms 2026-04-20T16:46:44
tc_2fdd7772 run_pcap_analysis 0ms 2026-04-20T16:46:44
tc_d340a85c run_pcap_analysis 0ms 2026-04-20T16:46:44
tc_859d775f run_pcap_analysis 0ms 2026-04-20T16:46:44
tc_f89ad270 run_bulk_extractor 0ms 2026-04-20T16:46:44
tc_29c633e9 run_bulk_extractor 0ms 2026-04-20T16:46:44
tc_0025cb28 run_fls 0ms 2026-04-20T16:46:44
tc_0b03d29d run_pcap_analysis 0ms 2026-04-20T16:46:49
tc_76264981 run_fls 0ms 2026-04-20T16:46:49
tc_d365f984 read_evidence_file 1ms 2026-04-20T16:46:55
tc_73b3f80b list_directory 6ms 2026-04-20T16:46:55
tc_2346c1f4 list_directory 7ms 2026-04-20T16:46:55
tc_ec5fefc1 list_directory 8ms 2026-04-20T16:46:55
tc_a399db83 list_directory 3ms 2026-04-20T16:47:16
tc_ff94d500 list_directory 3ms 2026-04-20T16:47:16
tc_f4b28ee9 read_evidence_file 0ms 2026-04-20T16:47:28
tc_01523bc1 read_evidence_file 1ms 2026-04-20T16:47:28
tc_0da0ee36 read_evidence_file 1ms 2026-04-20T16:47:28
tc_4d215751 read_evidence_file 0ms 2026-04-20T16:47:28
tc_f108c981 read_evidence_file 0ms 2026-04-20T16:47:28
tc_81957f8b read_evidence_file 0ms 2026-04-20T16:47:28
tc_a84d4680 read_evidence_file 1ms 2026-04-20T16:47:28
tc_d9aa87ad read_evidence_file 2ms 2026-04-20T16:47:28
tc_a3226299 read_evidence_file 1ms 2026-04-20T16:47:43
tc_676a729d read_evidence_file 1ms 2026-04-20T16:47:43
tc_a156984b read_evidence_file 0ms 2026-04-20T16:47:43
tc_1646b23b read_evidence_file 0ms 2026-04-20T16:47:43
tc_e39ff420 read_evidence_file 0ms 2026-04-20T16:47:43
tc_c9796b52 read_evidence_file 0ms 2026-04-20T16:47:43
tc_9a0da2ce read_evidence_file 1ms 2026-04-20T16:47:43
tc_895dcdb3 read_evidence_file 1ms 2026-04-20T16:47:43
tc_573243b6 read_evidence_file 0ms 2026-04-20T16:47:43
tc_2da94887 read_evidence_file 0ms 2026-04-20T16:47:43
tc_16ab5492 read_evidence_file 1ms 2026-04-20T16:48:00
tc_94058613 read_evidence_file 1ms 2026-04-20T16:48:00
tc_e18b582d read_evidence_file 1ms 2026-04-20T16:48:00
tc_e8499463 read_evidence_file 0ms 2026-04-20T16:48:00
tc_ee6ca8ef read_evidence_file 1ms 2026-04-20T16:48:00
tc_3477704e read_evidence_file 0ms 2026-04-20T16:48:00
tc_2af183c9 read_evidence_file 0ms 2026-04-20T16:48:00
tc_05daad40 read_evidence_file 0ms 2026-04-20T16:48:00
tc_65540676 read_evidence_file 2ms 2026-04-20T16:48:46
tc_81ba0701 read_evidence_file 2ms 2026-04-20T16:48:46
tc_0d983425 read_evidence_file 2ms 2026-04-20T16:48:46
tc_7a8a66d5 read_evidence_file 2ms 2026-04-20T16:48:46
tc_c5475039 read_evidence_file 2ms 2026-04-20T16:48:46
tc_c7484f91 read_evidence_file 2ms 2026-04-20T16:48:46
tc_22ca88a0 read_evidence_file 2ms 2026-04-20T16:48:46
tc_13a2577f read_evidence_file 3ms 2026-04-20T16:48:46
tc_80f552a6 read_evidence_file 1ms 2026-04-20T16:49:03
tc_dd8519e5 read_evidence_file 0ms 2026-04-20T16:49:03
tc_243bbbef read_evidence_file 0ms 2026-04-20T16:49:03
tc_3336763d read_evidence_file 0ms 2026-04-20T16:49:03
tc_63891380 read_evidence_file 0ms 2026-04-20T16:49:03
tc_a83ee81a read_evidence_file 1ms 2026-04-20T16:49:03
tc_426d5eed read_evidence_file 0ms 2026-04-20T16:49:03
tc_3ad3013b read_evidence_file 0ms 2026-04-20T16:49:03
tc_055f58fe read_evidence_file 1ms 2026-04-20T16:49:20
tc_d0ca7ce6 read_evidence_file 1ms 2026-04-20T16:49:20
tc_2c35bcd3 read_evidence_file 0ms 2026-04-20T16:49:20
tc_8b869f81 read_evidence_file 0ms 2026-04-20T16:49:20
tc_6efb1396 read_evidence_file 1ms 2026-04-20T16:49:20
tc_902badc0 read_evidence_file 0ms 2026-04-20T16:49:20
tc_8e8cb1f6 read_evidence_file 2ms 2026-04-20T16:49:20
tc_b719bc7f read_evidence_file 0ms 2026-04-20T16:49:37
tc_04826184 read_evidence_file 1ms 2026-04-20T16:49:37
tc_2be89552 read_evidence_file 1ms 2026-04-20T16:49:37
tc_e4947b72 read_evidence_file 0ms 2026-04-20T16:49:37
tc_77dedddc read_evidence_file 0ms 2026-04-20T16:49:37
tc_2d16ce67 read_evidence_file 1ms 2026-04-20T16:49:37
tc_b057241c read_evidence_file 0ms 2026-04-20T16:49:37
tc_9b7ea5cd check_extraction_status 0ms 2026-04-20T16:50:04
tc_2565f086 read_evidence_file 1ms 2026-04-20T16:50:04
tc_7c841748 read_evidence_file 1ms 2026-04-20T16:50:04
tc_32d718f9 get_completed_results 0ms 2026-04-20T16:50:13
tc_54c4bc56 list_directory 6ms 2026-04-20T16:50:13
tc_5f66256b list_directory 0ms 2026-04-20T16:50:35
tc_a85f97b3 list_directory 1ms 2026-04-20T16:50:35
tc_4b194eee list_directory 1ms 2026-04-20T16:50:35
tc_57f48bfc list_directory 9ms 2026-04-20T16:50:35
tc_69ca9450 list_directory 9ms 2026-04-20T16:50:35
tc_1139efb4 list_directory 11ms 2026-04-20T16:50:35
tc_a834a082 list_directory 1ms 2026-04-20T16:50:44
tc_60a0631c list_directory 1ms 2026-04-20T16:50:44
tc_6dd1f184 list_directory 0ms 2026-04-20T16:50:44
tc_c0e5f620 read_evidence_file 2ms 2026-04-20T16:50:44
tc_671a053c read_evidence_file 2ms 2026-04-20T16:50:44
tc_38fd563d read_evidence_file 2ms 2026-04-20T16:50:44
tc_e190c58b list_directory 0ms 2026-04-20T16:51:06
tc_646b4046 list_directory 1ms 2026-04-20T16:51:06
tc_d160a613 list_directory 6ms 2026-04-20T16:51:06
tc_15591d81 list_directory 6ms 2026-04-20T16:51:06
tc_c3cd1f44 list_directory 7ms 2026-04-20T16:51:06
tc_a3d93b9e list_directory 1ms 2026-04-20T16:51:45
tc_431d2dec list_directory 0ms 2026-04-20T16:51:45
tc_759e3345 list_directory 0ms 2026-04-20T16:51:45
tc_0e6d4472 list_directory 0ms 2026-04-20T16:51:45
tc_693d64c1 list_directory 0ms 2026-04-20T16:51:45
tc_b5e6e4db list_directory 1ms 2026-04-20T16:51:45
tc_0ccb288c list_directory 1ms 2026-04-20T16:52:10
tc_880eb5db list_directory 2ms 2026-04-20T16:52:10
tc_196c5da5 list_directory 1ms 2026-04-20T16:52:10
tc_e1919841 list_directory 0ms 2026-04-20T16:52:10
tc_b0b02347 list_directory 0ms 2026-04-20T16:52:10
tc_e1241d7a list_directory 1ms 2026-04-20T16:52:10
tc_0f475b25 list_directory 0ms 2026-04-20T16:52:24
tc_7fa047ef list_directory 1ms 2026-04-20T16:52:24
tc_04494fa9 list_directory 1ms 2026-04-20T16:52:24
tc_d8294ce5 list_directory 0ms 2026-04-20T16:52:24
tc_868006fa list_directory 0ms 2026-04-20T16:52:24
tc_0db32c8a run_mmls 0ms 2026-04-20T16:53:25
tc_5fe29683 run_mmls 0ms 2026-04-20T16:53:25
tc_2975bd32 run_mmls 173ms 2026-04-20T16:53:25
tc_53636ef1 run_mmls 179ms 2026-04-20T16:53:25
tc_31a4da00 run_mmls 0ms 2026-04-20T16:53:54
tc_a82a7089 search 9ms 2026-04-20T16:54:27
tc_5560618e get_raw_output 8ms 2026-04-20T16:54:27
tc_89fe4acf search 440ms 2026-04-20T16:54:28
tc_7789420e start_extraction_batch 2ms 2026-04-20T16:55:04
tc_cbf5a375 run_fls 0ms 2026-04-20T16:55:04
tc_9fb99fe9 run_fls 0ms 2026-04-20T16:55:04
tc_03718491 run_plaso 0ms 2026-04-20T16:55:06
tc_7c6a3b0e run_plaso 0ms 2026-04-20T16:55:06
tc_7b466ade list_directory 1ms 2026-04-20T16:55:50
tc_e46b603f read_evidence_file 0ms 2026-04-20T16:55:50
tc_12d160f6 list_directory 1ms 2026-04-20T16:56:40
tc_48e467ce list_directory 1ms 2026-04-20T17:00:48
tc_e46b7d24 list_directory 1ms 2026-04-20T17:04:07
tc_673a44fe list_directory 1ms 2026-04-20T17:04:07
tc_41bb5396 list_directory 1ms 2026-04-20T17:04:07
tc_f7a21c89 list_directory 1ms 2026-04-20T17:04:07
tc_0a4bdf1f list_directory 0ms 2026-04-20T17:04:12
tc_2aa928a8 list_directory 0ms 2026-04-20T17:04:43
tc_bd69d13b list_directory 0ms 2026-04-20T17:04:43
tc_f5ff50bb list_directory 0ms 2026-04-20T17:04:43
tc_34fe2aa0 list_directory 0ms 2026-04-20T17:04:43
tc_ed2d3cf6 list_directory 0ms 2026-04-20T17:04:43
tc_e2765ea7 list_directory 4ms 2026-04-20T17:04:43
tc_94f2a3f5 read_evidence_file 1ms 2026-04-20T17:05:34
tc_03740158 list_files 17ms 2026-04-20T17:05:34
tc_fe484c1d list_files 17ms 2026-04-20T17:05:34
tc_bafef845 check_extraction_status 0ms 2026-04-20T17:06:07
tc_edcc1362 lookup_attack_technique 224ms 2026-04-20T17:06:08
tc_e4a1b9b5 lookup_attack_technique 225ms 2026-04-20T17:06:08
tc_962fe933 get_completed_results 0ms 2026-04-20T17:06:21
tc_53343b64 parse_android_artifacts 7ms 2026-04-20T17:06:21
tc_6c275a6a list_directory 4ms 2026-04-20T17:06:51
tc_9bbd3344 get_raw_output 707ms 2026-04-20T17:06:51
tc_ca687ce9 list_directory 4ms 2026-04-20T17:07:48
tc_e4f2e238 parse_ios_artifacts 94065ms 2026-04-20T17:09:22
tc_9848be04 list_directory 1ms 2026-04-20T17:09:40
tc_8a299983 get_raw_output 673ms 2026-04-20T17:09:41
tc_e08fc8cc submit_finding 24766ms 2026-04-20T17:10:05
tc_72b0af92 list_directory 5ms 2026-04-20T17:10:36
tc_762bf08c get_raw_output 79ms 2026-04-20T17:10:37
tc_d05b6c70 submit_finding 23288ms 2026-04-20T17:11:00
tc_2fb2b7c6 submit_finding 23293ms 2026-04-20T17:11:00
tc_ab3ae398 parse_ios_artifacts 13240ms 2026-04-20T17:11:51
tc_66835afb submit_finding 16958ms 2026-04-20T17:11:54
tc_1458b296 submit_finding 16964ms 2026-04-20T17:11:54
tc_8c3c8314 check_extraction_status 0ms 2026-04-20T17:12:18
tc_52b89c7f list_directory 10ms 2026-04-20T17:12:18
tc_28a88145 list_directory 1ms 2026-04-20T17:12:36
tc_970f8a0e list_directory 1ms 2026-04-20T17:12:36
tc_dc602289 parse_ios_artifacts 22ms 2026-04-20T17:12:36
tc_f0f7fdfa parse_android_artifacts 216ms 2026-04-20T17:12:36
tc_dde87db9 parse_android_artifacts 1156ms 2026-04-20T17:12:37
tc_f30a59d7 list_directory 1ms 2026-04-20T17:12:44
tc_b680f596 list_directory 2ms 2026-04-20T17:12:44
tc_ba6ac9ae list_directory 3ms 2026-04-20T17:12:44
tc_47cec800 list_directory 1ms 2026-04-20T17:12:58
tc_f4be57e2 list_directory 4ms 2026-04-20T17:12:58
tc_e965b800 parse_ios_artifacts 18ms 2026-04-20T17:12:58
tc_7c5d3446 parse_android_artifacts 219ms 2026-04-20T17:12:58
tc_f22c14dc parse_android_artifacts 1214ms 2026-04-20T17:12:59
tc_7099f917 list_directory 1ms 2026-04-20T17:13:26
tc_f10a00c8 list_directory 2ms 2026-04-20T17:13:26
tc_47929a4b list_directory 3ms 2026-04-20T17:13:26
tc_e60897b8 list_directory 5ms 2026-04-20T17:13:26
tc_72828b41 list_directory 1ms 2026-04-20T17:13:31
tc_e7929b23 list_directory 5ms 2026-04-20T17:13:51
tc_9e723e12 list_directory 7ms 2026-04-20T17:13:51
tc_59df9d7c list_directory 13ms 2026-04-20T17:13:51
tc_78225248 list_directory 29ms 2026-04-20T17:14:07
tc_530e5b91 list_directory 29ms 2026-04-20T17:14:07
tc_81e548b7 run_exiftool 59994ms 2026-04-20T17:15:07
tc_ffd0626e get_raw_output 806ms 2026-04-20T17:15:17
tc_8f6d2d43 run_exiftool 43695ms 2026-04-20T17:15:59
tc_57255459 get_raw_output 123ms 2026-04-20T17:16:10
tc_c04d1fe7 check_extraction_status 0ms 2026-04-20T17:16:26
tc_23727ce2 run_binwalk 23601ms 2026-04-20T17:16:50
tc_703f4847 run_strings 79746ms 2026-04-20T17:17:46
tc_d2d8b673 detect_steganography 79755ms 2026-04-20T17:17:46
tc_b1083152 get_raw_output 1106ms 2026-04-20T17:17:56
tc_9462871c get_raw_output 1108ms 2026-04-20T17:17:56
tc_88b12bce run_exiftool 68811ms 2026-04-20T17:19:04
tc_3b9a925c get_raw_output 295ms 2026-04-20T17:19:27
tc_7aea4c4e extract_steganography 86816ms 2026-04-20T17:20:54
tc_3f36ab81 detect_steganography 97611ms 2026-04-20T17:21:04
tc_5cd3ceb7 get_raw_output 233ms 2026-04-20T17:21:16
tc_d3883e24 get_raw_output 780ms 2026-04-20T17:21:17
tc_2006d95e run_exiftool 97926ms 2026-04-20T17:23:20
tc_123e985b extract_steganography 97937ms 2026-04-20T17:23:20
tc_14568365 extract_steganography 97949ms 2026-04-20T17:23:20
tc_f553b7e6 check_extraction_status 0ms 2026-04-20T17:23:37
tc_7d962e49 search 37ms 2026-04-20T17:23:37
tc_425aaa5f search 42ms 2026-04-20T17:23:37
tc_7e0e6f87 get_raw_output 309ms 2026-04-20T17:23:37
tc_4683e80e search 22ms 2026-04-20T17:23:59
tc_b368fc5c search 226ms 2026-04-20T17:23:59
tc_f54e8fcc search 449ms 2026-04-20T17:24:00
tc_70d59abe run_exiftool 117147ms 2026-04-20T17:25:56
tc_ad938e79 submit_finding 54488ms 2026-04-20T17:31:36
tc_148ae26f submit_finding 54492ms 2026-04-20T17:31:36
tc_257fd591 submit_finding 58716ms 2026-04-20T17:31:46
tc_c6e24d05 check_extraction_status 1ms 2026-04-20T17:32:41
tc_ec6c9d97 list_directory 3ms 2026-04-20T17:32:41
tc_e6e2108d list_directory 15ms 2026-04-20T17:32:41
tc_6122f726 read_evidence_file 1ms 2026-04-20T17:33:08
tc_ae14c77b read_evidence_file 1ms 2026-04-20T17:33:08
tc_2ce6c0f2 read_evidence_file 1ms 2026-04-20T17:33:08
tc_4b0e5017 run_fls 105921ms 2026-04-20T17:34:54
tc_add1729f run_fls 105960ms 2026-04-20T17:34:54
tc_95d090d5 read_evidence_file 1ms 2026-04-20T17:35:06
tc_6f0126e7 read_evidence_file 1ms 2026-04-20T17:35:06
tc_31a74e6e search 71ms 2026-04-20T17:35:06
tc_a57f34e4 list_files 212ms 2026-04-20T17:35:06
tc_ebff3633 search 1975ms 2026-04-20T17:35:08
tc_ca3218fa search 2641ms 2026-04-20T17:35:09
tc_af9a550d read_evidence_file 1ms 2026-04-20T17:35:27
tc_13a1b062 read_evidence_file 1ms 2026-04-20T17:35:27
tc_01fcc2fc read_evidence_file 1ms 2026-04-20T17:35:27
tc_29c7eeab read_evidence_file 1ms 2026-04-20T17:35:27
tc_b322f346 read_evidence_file 4ms 2026-04-20T17:35:27
tc_030239fd run_fls 0ms 2026-04-20T17:35:27
tc_a55e0e8d run_fls 101261ms 2026-04-20T17:37:08
tc_cbe06499 read_evidence_file 2ms 2026-04-20T17:37:52
tc_f6b76db4 read_evidence_file 1ms 2026-04-20T17:37:52
tc_c9617b3c read_evidence_file 1ms 2026-04-20T17:37:52
tc_3e8f12a6 read_evidence_file 3ms 2026-04-20T17:37:52
tc_13476b6a submit_finding 43380ms 2026-04-20T17:38:36
tc_4ed4d1ab read_evidence_file 1ms 2026-04-20T17:38:59
tc_f9164ba4 read_evidence_file 1ms 2026-04-20T17:38:59
tc_d9489170 read_evidence_file 1ms 2026-04-20T17:38:59
tc_a70578f6 read_evidence_file 0ms 2026-04-20T17:38:59
tc_4f86cba7 read_evidence_file 2ms 2026-04-20T17:38:59
tc_e8465acc read_evidence_file 1ms 2026-04-20T17:38:59
tc_693559b9 read_evidence_file 2ms 2026-04-20T17:38:59
tc_ee7937fa read_evidence_file 1ms 2026-04-20T17:39:31
tc_11796a3b read_evidence_file 1ms 2026-04-20T17:39:31
tc_a0f9e748 read_evidence_file 1ms 2026-04-20T17:39:31
tc_ea375fb7 read_evidence_file 1ms 2026-04-20T17:39:31
tc_7747e16b read_evidence_file 1ms 2026-04-20T17:39:31
tc_23ab6a63 read_evidence_file 2ms 2026-04-20T17:39:31
tc_9231d149 check_extraction_status 0ms 2026-04-20T17:40:05
tc_c9400c89 find_execution_evidence 56ms 2026-04-20T17:40:05
tc_bb4dcc6f find_persistence_mechanisms._query(registry.system) 487ms 2026-04-20T17:40:06
tc_5d07e8a5 find_persistence_mechanisms._query(registry.software) 97ms 2026-04-20T17:40:06
tc_76ca3ba4 find_persistence_mechanisms._query(volatility.svcscan) 96ms 2026-04-20T17:40:06
tc_cef7408d find_persistence_mechanisms._search(all) 18ms 2026-04-20T17:40:06
tc_74c9844f find_persistence_mechanisms._search(all) 13ms 2026-04-20T17:40:06
tc_c615a407 find_persistence_mechanisms._search(all) 17ms 2026-04-20T17:40:06
tc_6626c5ba find_persistence_mechanisms._query(tsk.filelist) 107ms 2026-04-20T17:40:06
tc_c46ebdf6 find_persistence_mechanisms 858ms 2026-04-20T17:40:06
tc_76f8c4f4 find_data_exfiltration_indicators._query(bulk.url) 4506ms 2026-04-20T17:40:10
tc_45b1a31d find_data_exfiltration_indicators._query(bulk.email) 537ms 2026-04-20T17:40:11
tc_1141b8ce find_data_exfiltration_indicators._query(bulk.domain) 2815ms 2026-04-20T17:40:14
tc_e1199ff8 find_data_exfiltration_indicators._search(all) 10ms 2026-04-20T17:40:14
tc_26b89178 find_data_exfiltration_indicators 8835ms 2026-04-20T17:40:14
tc_0a82618f search 20ms 2026-04-20T17:40:55
tc_e1857ae7 search 27ms 2026-04-20T17:40:55
tc_f8fd7b4e search 33ms 2026-04-20T17:40:55
tc_794cfb74 search 43ms 2026-04-20T17:41:00
tc_541b4d4a search 2604ms 2026-04-20T17:41:03
tc_59e7620d search 53ms 2026-04-20T17:41:33
tc_c82ed823 search 106ms 2026-04-20T17:41:34
tc_c73e399e search 106ms 2026-04-20T17:41:34
tc_162b36de search 2617ms 2026-04-20T17:41:36
tc_c9bf5167 search 21ms 2026-04-20T17:42:02
tc_2465e64e search 22ms 2026-04-20T17:42:02
tc_ad0381ef search 29ms 2026-04-20T17:42:02
tc_9871a46e search 32ms 2026-04-20T17:42:02
tc_1519224c search 36ms 2026-04-20T17:42:45
tc_0d4e1ff1 search 47ms 2026-04-20T17:42:45
tc_f007d0eb get_raw_output 142ms 2026-04-20T17:42:45
tc_be86a040 submit_finding 40444ms 2026-04-20T17:43:25
tc_b8090661 check_extraction_status 0ms 2026-04-20T17:44:03
tc_50ae3e1c search 24ms 2026-04-20T17:44:03
tc_bcfe56cb search 28ms 2026-04-20T17:44:03
tc_26263cb6 submit_finding 33306ms 2026-04-20T17:44:36
tc_103ef06c find_defense_evasion._search(all) 157ms 2026-04-20T17:45:16
tc_7d4d0845 find_lateral_movement_indicators._search(all) 147ms 2026-04-20T17:45:16
tc_97e0eb62 find_defense_evasion._search(all) 1384ms 2026-04-20T17:45:17
tc_6dc5d1c3 find_lateral_movement_indicators._search(all) 1422ms 2026-04-20T17:45:17
tc_557c9caa search 1700ms 2026-04-20T17:45:17
tc_2751d3b3 find_defense_evasion._search(all) 120ms 2026-04-20T17:45:17
tc_d90168c3 find_lateral_movement_indicators._search(all) 606ms 2026-04-20T17:45:18
tc_3c69c8fb find_defense_evasion._search(all) 626ms 2026-04-20T17:45:18
tc_19886388 search 2521ms 2026-04-20T17:45:18
tc_16874978 find_defense_evasion._search(all) 11ms 2026-04-20T17:45:18
tc_9ca6a1c4 find_defense_evasion 2543ms 2026-04-20T17:45:18
tc_9b7dfd3a find_lateral_movement_indicators._query(volatility.netscan) 506ms 2026-04-20T17:45:19
tc_a35a9e13 find_lateral_movement_indicators._search(all) 974ms 2026-04-20T17:45:19
tc_8bd9f6eb find_lateral_movement_indicators._search(all) 8ms 2026-04-20T17:45:20
tc_415c130e find_lateral_movement_indicators._search(all) 11ms 2026-04-20T17:45:20
tc_e65ea912 find_lateral_movement_indicators 3841ms 2026-04-20T17:45:20
tc_3bffbafb search 74ms 2026-04-20T17:45:37
tc_a037834d search 85ms 2026-04-20T17:45:37
tc_8967b12a list_directory 149ms 2026-04-20T17:45:37
tc_32c45146 search 3542ms 2026-04-20T17:45:41
tc_c53c48aa list_directory 1ms 2026-04-20T17:46:12
tc_d2771e53 search 2176ms 2026-04-20T17:46:15
tc_9c9fc0ec search 2872ms 2026-04-20T17:46:15
tc_f46a493b parse_browser_history 2882ms 2026-04-20T17:46:15
tc_940d05e8 list_directory 8ms 2026-04-20T17:46:31
tc_9ac0b252 get_raw_output 24ms 2026-04-20T17:46:32
tc_9ef73cf2 search 79ms 2026-04-20T17:46:32
tc_fdbf5bd5 search 2029ms 2026-04-20T17:46:34
tc_a1c795cd search 37ms 2026-04-20T17:46:54
tc_2e4e149a search 51ms 2026-04-20T17:46:54
tc_e9f6de8e search 59ms 2026-04-20T17:46:54
tc_a64867d7 get_raw_output 1872ms 2026-04-20T17:46:56
tc_25416aea submit_finding 61130ms 2026-04-20T17:48:46
tc_ffcc9fff submit_finding 61136ms 2026-04-20T17:48:46
tc_b09009fe submit_finding 61140ms 2026-04-20T17:48:46
tc_22814f96 check_extraction_status 0ms 2026-04-20T17:48:59
tc_8650a96a list_directory 3ms 2026-04-20T17:48:59
tc_b4d119ca search 60ms 2026-04-20T17:48:59
tc_8d82f9cf search 734ms 2026-04-20T17:48:59
tc_aaec8320 list_directory 4ms 2026-04-20T17:49:30
tc_36f289db search 739ms 2026-04-20T17:49:30
tc_441ea129 submit_finding 61796ms 2026-04-20T17:50:31
tc_0aee537d run_exiftool 157707ms 2026-04-20T17:52:07
tc_7b0323e1 get_raw_output 523ms 2026-04-20T17:52:19
tc_d583ea05 search 110ms 2026-04-20T17:53:01
tc_c1ce4d78 search 111ms 2026-04-20T17:53:01
tc_20b4cf06 search 2108ms 2026-04-20T17:53:03
tc_8b66f835 correlate_across_sources 3748ms 2026-04-20T17:53:05
tc_44927781 correlate_across_sources 1910ms 2026-04-20T17:53:53
tc_8dd7c418 submit_finding 41611ms 2026-04-20T17:54:33
tc_ed652248 submit_finding 41614ms 2026-04-20T17:54:33
tc_855354a9 run_pcap_analysis 0ms 2026-04-20T17:55:12
tc_74487862 run_pcap_analysis 0ms 2026-04-20T17:55:12
tc_0d769e29 search 37ms 2026-04-20T17:55:12
tc_ba62c137 search 44ms 2026-04-20T17:55:12
tc_eaee1856 search 43ms 2026-04-20T17:55:12
tc_d585c81d submit_finding 56884ms 2026-04-20T17:56:48
tc_55935e0d submit_finding 56889ms 2026-04-20T17:56:48
tc_a19988ae assess_recovery._query(tsk.filelist) 439ms 2026-04-20T17:57:13
tc_1959d4b4 assess_recovery 461ms 2026-04-20T17:57:13
tc_b1ea0013 audit_evidence_coverage 66477ms 2026-04-20T17:58:19
tc_dd995313 get_raw_output 4053ms 2026-04-20T17:59:04
tc_b7cafff8 get_raw_output 4374ms 2026-04-20T17:59:04
tc_bb6a824f get_raw_output 4378ms 2026-04-20T17:59:04
tc_290ab439 search 3ms 2026-04-20T17:59:05
tc_f0a422e8 get_raw_output 29ms 2026-04-20T17:59:31
tc_71be3acc list_files 33ms 2026-04-20T17:59:31
tc_9609b36b search 36ms 2026-04-20T17:59:31
tc_ba06ede1 audit_tool_coverage 57ms 2026-04-20T18:00:42
tc_eb8dd5bd submit_finding 88919ms 2026-04-20T18:02:10
tc_a0bc5c0c start_extraction_batch 1ms 2026-04-20T18:02:30
tc_899969db read_evidence_file 14ms 2026-04-20T18:02:39
tc_bf9c11b1 read_evidence_file 235ms 2026-04-20T18:02:39
tc_c1fe6f04 check_extraction_status 0ms 2026-04-20T18:03:20
tc_7a941687 search 84ms 2026-04-20T18:03:21
tc_bb78d80d search 3476ms 2026-04-20T18:03:24
tc_93ac2040 submit_narrative 75501ms 2026-04-20T18:06:40
tc_eee632c7 check_extraction_status 0ms 2026-04-20T18:06:49
tc_9ad160bc check_extraction_status 0ms 2026-04-20T18:06:49
tc_83f26559 check_extraction_status 0ms 2026-04-20T18:07:19
tc_7af445b0 submit_finding 104711ms 2026-04-20T18:09:04
tc_799b0e30 check_extraction_status 0ms 2026-04-20T18:09:12
tc_86192ba7 get_completed_results 0ms 2026-04-20T18:09:12
tc_ff337c73 search 233ms 2026-04-20T18:09:30
tc_e7bc758a search 262ms 2026-04-20T18:09:30
tc_8641d520 search 385ms 2026-04-20T18:09:30

Each finding traces back to the specific tool calls that produced the supporting evidence.

LogKext Keylogger Installed on Tracy's MacBook Air 4 refs
1
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-06-28-1600.eml", "max_bytes": 1048576 }
tc_84fa2b19
2ms
2
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-06-29-1100.eml", "max_bytes": 1048576 }
tc_00fe7245
2ms
3
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-02-1200.eml", "max_bytes": 1048576 }
tc_85addf70
2ms
4
read_evidence_file
{ "file_path": "/evidence/ngdc/email/README.txt", "max_bytes": 1048576 }
tc_8e12aaca
4ms
Tracy Creating Encrypted ZIP Archive of NGDC Documents (Password: 'Hercules') 1 refs
1
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-09-1300.eml", "max_bytes": 1048576 }
tc_13a2577f
3ms
Tracy (Coral) Communicating with Perry About NGDC Insider Information 2 refs
1
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-06-29-1100.eml", "max_bytes": 1048576 }
tc_00fe7245
2ms
2
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-02-1500.eml", "max_bytes": 1048576 }
tc_9414fba1
2ms
Steganographic Covert Communications in Carry's Device Photos -- jphide Format 5 refs
1
extract_steganography
{ "image_path": "/root/.mulder/cases/extracted/carry-phone-logical-2012-07-15-0618/Carry-Phone-Logical-2012-07-15-061...
tc_7aea4c4e
86816ms
2
detect_steganography
{ "target_path": "/root/.mulder/cases/extracted/carry-phone-logical-2012-07-15-0618/Carry-Phone-Logical-2012-07-15-06...
tc_d2d8b673
79755ms
3
detect_steganography
{ "target_path": "/root/.mulder/cases/extracted/carry-tablet-logical-2012-07-15-0907/Carry-Tablet-Logical-2012-07-15-...
tc_3f36ab81
97611ms
4
extract_steganography
{ "image_path": "/root/.mulder/cases/extracted/carry-tablet-logical-2012-07-15-0907/Carry-Tablet-Logical-2012-07-15-0...
tc_123e985b
97937ms
5
extract_steganography
{ "image_path": "/root/.mulder/cases/extracted/carry-tablet-logical-2012-07-15-0907/Carry-Tablet-Logical-2012-07-15-0...
tc_14568365
97949ms
Carry Photographs Gravelly Point (DC) -- Possible Dead Drop / Meeting Site 2 refs
1
detect_steganography
{ "target_path": "/root/.mulder/cases/extracted/carry-phone-logical-2012-07-15-0618/Carry-Phone-Logical-2012-07-15-06...
tc_d2d8b673
79755ms
2
extract_steganography
{ "image_path": "/root/.mulder/cases/extracted/carry-phone-logical-2012-07-15-0618/Carry-Phone-Logical-2012-07-15-061...
tc_7aea4c4e
86816ms
Tracy Discovers Rare Stamp Collection at NGDC -- 'This Is Our Ticket' 1 refs
1
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-03-1000.eml", "max_bytes": 1048576 }
tc_b322f346
4ms
Co-Conspirator Identified: Perry Patsum (perrypatsum@yahoo.com) 3 refs
1
search
{ "max_results": 20, "query": "perry", "regex": false, "source": "bulk.rfc822" }
tc_ad0381ef
29ms
2
search
{ "max_results": 20, "query": "Crazydave", "regex": false, "source": null }
tc_2465e64e
22ms
3
search
{ "max_results": 20, "query": "coralbluetwo", "regex": false, "source": null }
tc_c73e399e
106ms
Carry Identified: carrysum2012@yahoo.com / cat2welve@gmail.com; Contacts Dedan at m57.biz 1 refs
1
search
{ "max_results": 20, "query": "Carry", "regex": false, "source": "bulk.email" }
tc_0d4e1ff1
47ms
Target Organization Confirmed: National Gallery of Art (NGA, nga.gov) 3 refs
1
search
{ "max_results": 20, "query": "stamp collection", "regex": false, "source": null }
tc_a037834d
85ms
2
search
{ "max_results": 20, "query": "nga.gov", "regex": false, "source": "bulk.url" }
tc_9c9fc0ec
2872ms
3
search
{ "max_results": 10, "query": "Prufrock", "regex": false, "source": null }
tc_a1c795cd
37ms
Carry Works at m57.biz -- Network of Co-Conspirators 4 refs
1
search
{ "max_results": 20, "query": "Dedan", "regex": false, "source": "bulk.email" }
tc_50ae3e1c
24ms
2
search
{ "max_results": 15, "query": "alex.jfam11", "regex": false, "source": null }
tc_8d82f9cf
734ms
3
search
{ "max_results": 10, "query": "Uskvor", "regex": false, "source": null }
tc_b4d119ca
60ms
4
list_directory
{ "path": "/root/.mulder/cases/extracted/carry-tablet-logical-2012-07-15-0907/Carry-Tablet-Logical-2012-07-15-0907/Do...
tc_47929a4b
3ms
Postfix Mail Logs Confirm joe.sum.twelve@gmail.com Received All Keylogger Emails 1 refs
1
search
{ "max_results": 10, "query": "terrysumtwelve", "regex": false, "source": "bulk.email" }
tc_c1ce4d78
111ms
Keylogger Captured Tracy's Credentials: Password 'legalBee' and Email coralbluetwo@hotmail.com 5 refs
1
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-06-28-1600.eml", "max_bytes": 1048576 }
tc_84fa2b19
2ms
2
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-06-29-1100.eml", "max_bytes": 1048576 }
tc_00fe7245
2ms
3
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-02-1200.eml", "max_bytes": 1048576 }
tc_85addf70
2ms
4
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-02-1500.eml", "max_bytes": 1048576 }
tc_9414fba1
2ms
5
read_evidence_file
{ "file_path": "/evidence/ngdc/email/logfile-2012-07-12-1500.eml", "max_bytes": 1048576 }
tc_d0ca7ce6
1ms
Tracy's iPhone Shows Location Data in Greece -- Possible Foreign Contact 3 refs
1
parse_ios_artifacts
{ "artifact_types": null, "evidence_path": "/root/.mulder/cases/extracted/tracy-phone-2012-07-15-final" }
tc_e4f2e238
94065ms
2
get_raw_output
{ "after_id": 0, "limit": 100, "source_name": "phone.ios" }
tc_8a299983
673ms
3
get_raw_output
{ "after_id": 474257, "limit": 100, "source_name": "phone.ios" }
tc_762bf08c
79ms
Carry Photographs Possible NGDC Building at 7:51 AM (Surveillance) 2 refs
1
detect_steganography
{ "target_path": "/root/.mulder/cases/extracted/carry-tablet-logical-2012-07-15-0907/Carry-Tablet-Logical-2012-07-15-...
tc_3f36ab81
97611ms
2
run_exiftool
{ "target_path": "/root/.mulder/cases/extracted/carry-tablet-logical-2012-07-15-0907/Carry-Tablet-Logical-2012-07-15-...
tc_70d59abe
117147ms
Tracy Discovers LogKext Keylogger and Investigates It 1 refs
1
get_raw_output
{ "after_id": 0, "limit": 100, "source_name": "bulk.url_searches" }
tc_a64867d7
1872ms
VirtualBox Downloaded on Tracy's MacBook Air -- Possible Secure VM 1 refs
1
search
{ "max_results": 10, "query": "VirtualBox", "regex": false, "source": "bulk.url" }
tc_c82ed823
106ms
Tracy's iPhone Call on July 6 to 571 (N. Virginia) Number for 4 Minutes 1 refs
1
get_raw_output
{ "after_id": 0, "limit": 100, "source_name": "phone.ios" }
tc_8a299983
673ms
TCPDUMP Network Capture Files Found in Tracy's MacBook Air Disk Image 3 refs
1
get_raw_output
{ "after_id": 0, "limit": 50, "source_name": "bulk.ip" }
tc_bb6a824f
4378ms
2
get_raw_output
{ "after_id": 0, "limit": 50, "source_name": "bulk.tcp" }
tc_b7cafff8
4374ms
3
search
{ "max_results": 10, "query": "tcpdump_en0", "regex": false, "source": null }
tc_9609b36b
36ms
NGA Network Capture (Exterior) Shows Institutional Mac Workstations at 10.10.1.x 2 refs
1
read_evidence_file
{ "file_path": "/evidence/ngdc/net/ngdc-exterior-2012-07-12.txt", "max_bytes": 15000 }
tc_bf9c11b1
235ms
2
read_evidence_file
{ "file_path": "/evidence/ngdc/net/ngdc-interior-2012-07-12.txt", "max_bytes": 15000 }
tc_899969db
14ms

Tool Call Details

Copied to clipboard