Assistant to the Sergeant at Arms for the U.S. House of Representatives charged with 10 child pornography felonies
(www.fox5dc.com)
LET'S GOOoOo
You're viewing a single comment thread. View all comments, or full comment thread.
Comments (58)
sorted by:
Not attempting to draw/push any conclusions just sharing some knowledge from my work in this space.
You can calculate a unique file hash for any file. For example, on a windows PC, in a command prompt do
powershell -c get-filehash yourfile.txt
and you will receive a string, something like
Algorithm Hash
SHA256 e9ef80a7849f1cf02cb5fb8396ff9e270cb9006f30294a52c6490a72b373be00
Searching around for that filehash might lead you to a page like this: https://www.virustotal.com/gui/file/e9ef80a7849f1cf02cb5fb8396ff9e270cb9006f30294a52c6490a72b373be00
Same concept applies to images and videos, if they are in an unaltered state, you can easily see if a file is known regardless of name/extension.
Certain agencies and organizations in both the public and private sector will actively maintain hash lists of known files. It is plausible that a file with a known hash was observed (hosts might not have access/look at your content but they will often log hashes). So it is not impossible that they observed a known hash and reported it.
This does not exclude the possibility that a hash was planted, but there is a methodology to this.