CSI Cases from Burgess Forensics #69 A Case of Hiphop Beef

by | Feb 11, 2023 | Uncategorized | 0 comments

The Stories are true; the names and places have been changed to protect the potentially guilty.

It was almost closing time on Friday and my thoughts were turning to Barbequeing some of that mouth-watering Santa Maria tri-tip while my nose was turned to the scent of burning red oak in the park nearby. As I prepared for a glorious weekend, I was not tuned to the sound of the telephone, but there it was, anyway.

Should I answer it? Was it just going to be one more bit of spam, a mystery pink substance that can’t hold a candle to that famous juicy cut of beef on the coals?

Expecting to hear one more offer to extend the warranty on my car, my computer, my very soul, I decided to pick up the horn anyhow.

“Mr. Burgess?”

“I’m the guy.”

“Mr. Burgess, I’m so glad you’re still there.”

“That makes one of us. How can I help you?”

The gent on the phone proceeded to tell me about a hip-hop star and some porn. This is not an everyday occurrence. Well, not for me, anyhow. The caller was an attorney from Florida and his client had just sued Mr. Hop for invasion of privacy. The lawyer was afraid that Hop or his minions would take down the offending video and asked me to see if and where I could still find it online while there was still a chance to capture the evidence.

Normally, I don’t take a case without a deposit or retainer, but this seemed like about a half hour’s worth of work, so I agreed to put off the visions of beef in my head and turn my attention to visions of cheesecake on the screen.

Not only was the offending material still online; it was online in about a hundred places. Hoping that I wasn’t about to do several hours’ worth of work and then get stiffed, I proceeded to memorialize dozens of websites linking to some extreme amateur camerawork. Amateur it may have been, but nothing was hiding from the camera. It was the essence of letting it all hang out.

You know what they say – if you’re on the Internet, you’re there forever. This was not the plan of the naked lady on the screen. You see, this belle had been the baby mama of Dr. Ross, an adversary of Hop’s. But their relationship soured and she moved on. On the third date with her next beau, he convinced her to allow a videotape of this episode of bliss together. After the fact, she reconsidered (hindsight is 20/20, right?) and asked him to destroy the video. Which he said he would. Which he did not. Probably wanted to watch the reruns.

In any case, Hop had been looking for Dr. Ross’s former ladyfriends to take them shopping on video and generally trying to turn up the heat on his beef with the Doc. A large portion of Hop’s website was given over to trying to embarrass his foe.

He put the word out and instructed his flunkies to seek out something more embarrassing. And wouldn’t you know, they located Belle’s ex-boyfriend and his tape library. Money and video were soon exchanged and Hop’s folks set up the plan.

For weeks, teaser videos were put out on Hop’s site and replicated all over the hiphop world. Hop even had a new website created, OopsieVid, just for the purpose of airing the injudiciously recorded dalliance. He even created a self-caricature, Hustler’fro, to narrate the video once it went live.

And live it went! Hundreds of thousands of views were racked up. The narration was, unsurprisingly, very disrespectful. Each movement was judged, attention was given to the Dr. Ross tattoo on our coquette while HFro made cutting remarks about Dr.’s manhood, abilities, and so forth. Nasty stuff, making the nasty video all the nastier.

And Coquette was just roadkill for Hop and his viewers’ entertainment.

So, imagine her surprise when her niece called and asked in shock, “Aunt Coquette, why are you having sex on the Internet?” Remember, this was a video that she had been assured was erased, destroyed, kaput.

Enter the Florida Man attorney. This is where our story began, remember?

Using some of the verbiage on the Oopsie site, I asked Mr. Google to tell me if any other sites had mentioned the same words. And indeed, the hiphop world was afire with mentions – fiery, lascivious mentions. I began documenting the many sites, some of which had screenshots from the video, some of which linked directly to the Oopsie site, and some of which embedded the video directly. It was everywhere.

I downloaded the entire site, using WebDevil. I researched former versions of the sites, using the Wayback Machine at Archive.org. I looked at the source code for several of the sites to see where the videos had come from. And I documented how the number of views on the sites that had counters on them skyrocketed.

Speaking of sky, one of the lawyers at the larger firm that took over the case, asked me to be sure that the counters on the primary site were accurate. Of course, one method would be to subpoena the webdev or host to inquire as to how the counter worked, but another means would be to see if I could make it increment, myself.

So, late one evening, when I guessed most good people would be a-snooze, I went to the site and repeatedly logged onto its most popular video for the day, then off, then on, then off. You get the idea. But sure enough, my rapid-fire repeated visits were incrementing the counter up with each visit.

I mentioned the sky didn’t I? It turns out that the most popular video on that site for that day was a couple skydiving while in flagrante delicto. Apparently, they were causing quite the flap. Fortunately, they weren’t so distracted (or cold!) that they forgot to pop the chute.

But most importantly, I could show that the counter was working.

Stay tuned for Part 2…

This is just one of many “CSI-Computer Forensics Files: Real Cases from Burgess Forensics. Stay tuned for more deeds, good, bad, and otherwise as uncovered by forensic science… 

Copyright Steve Burgess, 2023

Don’t miss a single issue of our informative newsletter … Subscribe!

Related Posts

Email spoofing, scamming, and hacking

Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at stake, we have had a number of cases involving phishing and spoofing in the past few years and into the present where...

AT&T Data Breach and Hack: What Does it Mean to Me?

AT&T Data Breach and Hack: What Does it Mean to Me? copyright 2024, Steven Burgess It was ginormous. It included almost all wireless customers from 2022. Did you have an AT&T phone or other account in 2022? You’re one of 110 million (gasp). You be hacked, my...

Somebody deleted stuff off my phone (I swear it wasn’t me!). Can I get it back?

- Copyright Steve Burgess 2024 Your phone is suddenly losing text, videos, photos. What’s happening? Are they gone forever? Have I been hacked? How do I avoid this in the future? What’s happening? Of course, it’s hard to tell without some history of the phone’s use,...

Email as a signed contract vs. fraudulent emails

Email as a signed contract vs. fraudulent emails We all send and receive email, but did you know that what you say in an email can be interpreted as a legal contract? And that sometimes, emails are fraudulent? Both are true. The Statute of Frauds Although email didn’t...

El Salvador Adopts BitCoin

El Salvador Adopts BitCoin copyright Steve Burgess, 2021 El Salvador just passed a law to make BitCoin (BTC) legal tender and is the first country to do so. It did something similar back in 2001, when it made the US Dollar the official currency, replacing the...

Keeping Your Bitcoin Safe

BitCoin. Everybody wants some. But what’s the best way to keep it safe once you’ve got it? And how to get it? First things first – you get BitCoin (and Etherium, and DogeCoin) from a cryptocurrency exchange, like you would from a “regular” currency exchange to turn...

Cyberbullying and Covid-19: 2021 Update

California defines a cyberbully as anyone who sends any online communication to deliberately frighten, embarrass, harass, or otherwise target another. The Cyberbullying Research Center defines it as “willful and repeated harm inflicted through the use of computers,...

Cybersecurity & Covid-19: Vulnerability and What to Do About It

Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of us working from home (close to 90% of American corporations are encouraging or requiring employees to do so) and having...

Indian Summer Lovin’ – Tech Tips For a Warm Autumn

by Natalie Miller, 2019 With Indian Summer temperatures rising, here are some tips to help you make sure your devices are ready to conquer these warm days of Fall like you are. Check Those Pockets! Taking a dip in the pool, going for a paddle in a kayak, and jumping...

Electronic Waste and Recycling – What Your Old Devices Can Say About You

by Natalie Miller, 2019 With new models of phones and computers being released every year, wanting the latest and greatest is never a bad thing, but what about your old devices? The truth is that old devices can still hold all of the data you put on them or that they...

Pin It on Pinterest

Share This