spinofflive
FeatureImage_GoogleHideABodyV2.png

InternetSeptember 25, 2024

PSA: If you’re trying to get away with murder, don’t Google ‘how to get rid of a body’

FeatureImage_GoogleHideABodyV2.png

Loath as we are to assist killers, it has to be said: there is no such thing as private browsing when it comes to hiding your crime.

It’s hard to get away with murder these days. 

Back in the good old days, you could simply escape justice by hopping on a passenger steamer to the other side of the Atlantic, changing your name, and reinventing yourself as a shady antiques dealer with a mysterious past. Not so in 2024. Even a genius like Agatha Christie would be hard-pressed to come up with an ingenious plot that could survive the rigours of contemporary forensic investigation. Most contemporary detective fiction writers have to go to great lengths to level the playing field for their criminals, such as setting their novels in the first world war, or during a major snowstorm in a remote hotel without any cellphone coverage. 

There have been many important advances in forensic investigation since fingerprints were first used as evidence in 1892. DNA evidence has been used in court since the late 1980s. But fingerprints pale in comparison to the astonishingly vast digital footprint each and every one of us leaves behind. 

Poster for "The Lie" a documentary about the murder of Grace Millane
Poster for The Lie, a documentary about the murder of Grace Millane.

Recently, I watched The Lie: The Murder of Grace Millane. The documentary is harrowing, especially the CCTV footage. But Kempson’s Google searches after the murder are either the work of a complete moron or someone who doesn’t understand how the internet works. Not only did Kempson take photographs of Millane’s body and watch pornography on his phone, but his Google searches following the murder included the terms: “Waitakere ranges,” “The hottest fire,” “large bags near me,” “rigor mortis,” and “flesh eating birds.” 

Obviously someone who decided to Google “are there vultures in New Zealand” as a potential cover-up strategy is not the sharpest tool in the shed. While I’m happy that these murders aren’t going unpunished, I feel like this is such a common trend that it calls into question our collective digital illiteracy. 

Kempson is not alone in his ignorance. Perhaps the most famous recent instance of someone’s search history being used to convict them of murder was the case of Brian Walshe, who has been indicted for the murder of his wife Ana Walshe, whose body remains missing. Walshe’s search history following his wife’s disappearance included: 

4:55 am – How long before a body starts to smell
4:58 am – How to stop a body from decomposing
5:47 am – 10 ways to dispose of a dead body if you really need to
6:25 am – How long for someone to be missing to inherit
6:34 am – Can you throw away body parts
9:29 am – What does formaldehyde do
9:34 am – How long does DNA last
9:59 am – Can identification be made on partial remains
11:34 am – Dismemberment and the best ways to dispose of a body
11:44 am – How to clean blood from wooden floor
11:56 am – Luminol to detect blood
1:08 pm – What happens when you put body parts in ammonia
1:21 pm – Is it better to put crime scene clothes away or wash them
12:45 pm – Hacksaw best tool to dismember
1:10 pm – Can you be charged with murder without a body
1:14 pm – Can you identify a body with broken teeth
1:02 pm – What happens to hair on a dead body
1:13 pm – What is the rate of decomposition of a body found in a plastic bag compared to on a surface in the woods
1:20 pm – Can baking soda mask or make a body smell good?

Jesus Christ. 

Walshe made the searches on his son’s iPad, but appears to have made no other attempts to delete his search history. Not that that would have helped. 

The author’s own incriminating search history while researching this article.

Usually, I’d be loath to publish anything that could give potential murderers a heads-up. But the truth is that almost nothing you do on the internet is private. At least, not in the context of a murder investigation. There is no amount of digital cleanup you can do that will fully eradicate your suspicious searches and deleted emails from being recovered by a digital forensics team. Not only is it extremely difficult to hide your online activity, anyone who doesn’t have an advanced knowledge of digital forensic techniques isn’t even going to know what to hide, beyond the basics. In order to get away with it, you would have to be smarter than the smartest person whose job it is to scour your online activity for incriminating information, which is an extremely high bar, considering most people still don’t know how to uninstall Bing from their family computers. 

‘Media is under threat. Help save The Spinoff with an ongoing commitment to support our work.’
Duncan Greive
— Founder

Of course, the ability of the police to find digital evidence doesn’t always lead to a conviction. 

Casey Anthony was found not guilty of the murder of her daughter, despite searching for information relating to the manufacture of chloroform. Anthony claimed she’d intended to search for “how to make chlorophyll,” despite being physically unable to photosynthesise sunlight. And human error is always a factor. CBS news reported that the digital forensics team in the Anthony case overlooked a search for “fool-proof” suffocation methods. 

Casey Anthony
Casey Anthony.

As I write this, Philip Polkinghorne has just been acquitted of his wife’s murder. Perhaps the most suggestive pieces of evidence in the case were Polkinhorne’s deleted internet searches which were shared in court, including his search for “leg edema after strangulation” the day after Pauline Hanna’s death. But although Polkinghorne deleted his WhatsApp history, searched for how to delete his iCloud history, deleted his searches for how to delete his searches, put his phone into flight mode, and used DuckDuckGo (a more secure browser), whether or not you believe he is guilty, his actions still demonstrate a profound ignorance about how the internet works. 

We all know – or really should know – incognito mode isn’t really incognito. The point of using incognito mode is to search for “sexy beautiful naked ladies” and other terms you don’t want popping up in your browser history or autocomplete. But even if you follow Polkinghorne’s example and try to practise good digital hygiene, your methods are unlikely to confound the experts. It’s no good throwing your laptop into the nearest peat bog, because your internet history lives on the cloud, not just your hard drive. Even if you use TOR, a VPN and a secure browser, the information doesn’t just vanish. And downloading TOR or looking up “how to delete search history” after committing a crime is highly suspicious behaviour that will almost certainly raise a few investigative eyebrows. 

Screenshot of Google incognito mode
Google incognito mode will not save you.

Even if you use a burner phone, you can be caught. Rex Heuerman, known as the Long Island serial killer, was eventually discovered due to a DNA-covered pizza crust. But the location and pattern of his burner phones in proximity to local cellphone towers and Heuerman’s personal phone was enough for police to prove his guilt. They managed to uncover a staggering amount of incriminating evidence linked to these phones, including frequent searches for “why could law enforcement not trace the calls made by the long island serial killer”, and “why hasn’t the long island serial killer been caught”, “Long Island killer” and “Long Island serial killer phone call”.

Killers of yore only had to worry about eyewitnesses and leaving behind shoe prints. These days, the modern criminal has to contend with CCTV, traffic cameras, ring cameras, browser history, location history, IP addresses, Eftpos transactions and that’s just the tip of the digital iceberg. Many websites that claim not to track you are notorious for tracking you. It doesn’t matter whether you’re logged in as “longislandkiller97” or browsing anonymously.  Many websites record not just the obvious stuff, like user accounts and IP addresses, but the size of your computer screen, the settings you have enabled, the time of day you’re online and many other identifying pieces of information which I’m too stupid to understand. 

Even if you are a technical mastermind, and for some reason have devoted your life to murder, instead of doing the sensible thing and getting a six-figure job, it’s highly unlikely that any victim of your heinous and reprehensible crimes will have the same levels of data protection in place, and you can expect the police to comprehensively scour their digital histories too. 

Private browsing is perfectly serviceable for day-to-day activities you don’t want to share with others using the same computer. But when it comes to covering up evidence of a crime, a good rule of thumb is never google anything you don’t want to be read out and used against you in a court of law one day.  Or better yet, don’t kill anyone, you absolute munter. 

four screens showing various digital screens and credit cards against a keyboardagainst a pixellated background
Image: The Spinoff

InternetSeptember 25, 2024

It’s the most common type of crime. But the government isn’t doing much about it

four screens showing various digital screens and credit cards against a keyboardagainst a pixellated background
Image: The Spinoff

It’s easy to say you’ll be ‘tough’ on crime that happens on the streets. But what about crime that happens on the internet?

It doesn’t take long for the dedicated con artist to convince the owner of the vault to hand over the keys, and then it’s all go on the theft. When they enter the safe the intruders look around, then carefully and methodically strip out as much as they can, quickly and quietly, before anyone notices. One person changes the locks; once they’ve taken everything in the room, they lock the doors behind them so it’ll be harder for the real owner to get back in. They’ve committed a crime – stolen money – and, for now at least, no one has noticed. The reality of cybercrime, which New Zealanders have lost at least $13.4m to in the first half of this year, can look something like this, except it’s much harder to picture, because it happens online.

The metaphor of cybercrime-as-bank-heist quickly breaks down, of course: digital law-breaking differs from other kinds of crime in material ways. Lots of human relationships, including fraudulent or violent ones, happen on phones and computers, but a phone is not a house, and the internet is not a street. The perpetrators are often overseas, and always difficult to identify. With the vast majority of New Zealanders using the internet every single day, digital crime is one of the fastest-growing types of crime, targeting not just individuals but also institutions with millions of dollars to lose. But as the government ramps up its “tough on crime” rhetoric, is this area of threat being neglected? 

a person wearing a hoodie with lines of code between them
Part of the problem with cybercrime is that it’s really hard to picture beyond hacker cliches (Image: Getty Images)

Cybercrime is widespread and everyday 

Every three months, the government agencies responsible for cybercrime release a report about the incidents that have been reported to them over the quarter. Previously led by Cert NZ, these responsibilities have now been merged with the National Cyber Security Centre (NCSC), under the GCSB (Government Security Communications Bureau). The latest report, covering the second quarter of 2024 (ending June 30), found that $6.8m of direct financial loss was reported, a slight increase from the previous quarter. 

While most people think of scams as the obvious example of internet crime, other types of digital crimes can be equally harmful. Ransomware attacks have targeted lots of public institutions in New Zealand, including hospitals. Notably, unauthorised access incidents – where someone enters a computer or system without permission – caused more than $3.6m of loss in the past quarter, a more than nine-fold increase. Just a few big losses are responsible for the bulk of the money lost to cybercrime; 11 reports of more than $100,000 being lost added up to $5.5m in total, although the amount of reported losses has dropped 22% since the same time last year. 

While these numbers might seem noteworthy, everyone working in cybercrime acknowledges that it’s massively underreported. To give a sense of the discrepancy, 24% of the 7,935 incidents reported to Cert NZ in 2023 included some kind of financial loss, with a combined total loss of $18.3m. By contrast, analysis by MBIE released last November, compiling information from 11 of New Zealand’s largest financial institutions, calculated that $198m was lost to scams over the previous year. 

The 2023 Crime and Victims Survey (NZCVS) also shows how widespread and under-reported cybercrime is. In 2023, 11.5% of people were estimated to have experienced at least one incident of fraud or cybercrime in 2023, making it the most common type of crime experienced in New Zealand. Yet only 10% of fraud and cybercrime incidents were reported to police. 

a beige background with a smiling white man with a dark brown beard and hair and a textured linen blazer
Mike Jagusch coordinates the work of the National Cyber Security Council (Photo: Supplied)

“I’d rather see more reporting than just the numbers coming down,” says Mike Jagusch, the director of mission enablement at the NCSC. 

Efforts by NCSC and its partner organisations to limit cybercrime continue to tick along. It runs the website Own Your Online, which has tips for cybersecurity for individuals and small businesses. “We want to reduce the level of harm for everyday people,” Jagusch says, acknowledging that it’s not a realistic goal to eliminate cybercrime. 

NCSC has a regular “phishing disruption service” which compiles a list of all known phishing scams – which try to get people’s passwords or bank card information by pretending to be trusted institutions like New Zealand Post, the IRD or toll road authorities – happening in New Zealand. “We’re trying to reduce the amount of decisions individuals need to make to block [cybercrime],” Jagusch says. That’s the right approach; if the only response to cybercrime is to ask individuals to be more paranoid, the outcome will be savvier scammers and reduced public trust. 

NCSC also works with the New Zealand Police (where it’s clear that a crime has taken place, or for online harm like individuals being bullied), and the private sector, particularly banks and other financial institutions. “Partnership with the private sector is really effective – it lets us reach a huge scale we wouldn’t be able to do on our own,” Jagusch says. 

Well-functioning cybercrime prevention might mean that you never notice cybercrime at all. A bank might be aware of a scam that their customers are frequently reporting, and, while working on internal processes to notice a pattern of who’s being targeted (transfers between $100 and $300 to a bank account registered in Estonia, for example), alert NCSC’s confidential system too. A Malware Free Networks programme intended to improve New Zealand’s cybersecurity across big public and private sector organisations has reduced certain types of attacks too. 

a hand overing over a phone cartoon with questionmarks
Romance scams are especially insidious (Image: Tina Tiller)

What’s the big-picture, long-term strategy to prevent cybercrime?

But while all efforts to reduce cybercrime are important, and many are necessarily invisible to the public, there are also some notable gaps in New Zealand’s approach to the issue. 

The Justice Select Committee report interrogating the spending in the 2024 budget, released in August, mentions that “fraud and cybercrime are one of the fastest-growing demand areas by volume” [for the police]. Despite this, in the budget this year, no additional funding was given to cybersecurity. 

The government also told BusinessDesk in May that a new national cybersecurity strategy was on its way, following an ambitious cybersecurity plan in Australia. This plan is still in progress, and is intended for release in the first half of 2025, a spokesperson for the Department of Prime Minister and Cabinet (DPMC) told The Spinoff. “As with the current strategy, improving New Zealand’s ability to proactively detect, disrupt and investigate cybercrime will remain a priority,” they said. “Responses to the wide range of cybercrimes and other online harms that affect New Zealanders will continue to be addressed by a range of agencies across government including NZ Police, Department of Internal Affairs and the National Cyber Security Centre.”

In the meantime, without offering more resources, the government is pushing the private sector to improve its security processes. Banks are a big area of focus; commerce minister Andrew Bayly said in March that “bank processes need to be strengthened to give Kiwis better protections”. Online harm was briefly touched on in the recent review of the banking sector. The report, released in August, said that “limited investment in core systems has contributed to lagging scam and fraud prevention” – as well as impeding the progress of open banking, a system that would make it very easy to switch bank and therefore increase competition. 

That works well for New Zealand-based companies, but what about international ones? Someone in Putāruru losing $50 to a Facebook Marketplace scam is unlikely to matter much to Meta, even if it happens on its platform. “We’re really encouraging the private sector to make sure that everything they produce is secure,” Jagusch says. What does “encourage” mean in this context? “Companies will build things if customers demand it, requesting or requiring that they improve their cybersecurity.” So if you’re worried about this rising area of crime, you can at least take action – update the software on your computer, write to every company you use and request better cybersecurity – and hold tight for a bigger cybersecurity plan, coming some time in 2025. 

‘Love The Spinoff? Its future depends on your support. Become a member today.’
Madeleine Chapman
— Editor