Prime Online Suspects in Japan Released Due to Lack of Evidence
An Anime Director in Suita in Osaka Prefecture (Japan), 42 Masaki Kitamura and a 28-year-old unemployed man in Tsu, Mie Prefecture (Japan), suspects for issuing online threats of terrorism and mass murder were freed on September 21, 2011. The two were freed after police failed to investigate the charges framed by it, as reported by ajw.asahi.com on October 8, 2012.
Kitamura was accused of obstructing the responsibilities of city employees at Osaka and Police in link with a disturbing message posted on the website of municipal government dated July 29, 2012.
After his arrest, the police of Osaka Prefectural took away Kitamura's personal computer under custody, approved of file restoration and installed virus discovery software, but they didn't succeed to locate any virus.
The authorities examined the IP addresses that starts the threat and found that it was connected to speedy wireless LAN device possessed by Kitamura. They also doubt that Kitamura's computer was the basis of an August 1, 2012, message that claimed to Japan Airlines, on a self-prepared explosive device implemented on a passenger plane, as per the revelation of the authorities.
The suspect, Kitamura, had refused the charges and defended himself by claiming his innocence.
For the moment, Mie Prefectural Police disclosed a virus file during an examination that revealed that the 28-year-old man after checking out with the prime suspect's name thrived into examining it in about 10 days. An investigator claimed that it has found the bug without the name of the virus file. According to the other officers, the man's computer was mostly contaminated when he downloaded some files. However, according to the investigator, the police have been incapable of indicating the route via which, the message threatened to blow up the Ise Grand Shrine, one of the holiest place of Japanese.
In both cases, Police doubt a third party hacked into the men's computers and used an online virus to make the threats.
They are now scrutinizing the two computers that were infected and the way in which the virus were dispersed, as well as continuing to find the guilty.
According to the technology experts, the two cases confirmed that authorities carried on covering a step behind cybercriminals utilizing malicious software that is so updated that it cannot be identified under conventional methods.
» SPAMfighter News - 16-10-2012