FBI tracks down Higinio Ochoa using geo-tagged photos The recent arrest of Higinio O. Ochoa III, of Galveston, Texas — allegedly a member of the Anonymous-linked CabinCr3w –generated considerable amusement (and some unbearably bad puns) when it was reported that the FBI tracked him down using photos he had posted of his girlfriend’s breasts (covered somewhat by a bikini top).But the more interesting — and sobering — message of the case is that someone known as an elite hacker was busted because he forgot, or didn’t know, about the fact that EXIF data (location, camera type, and other image information) is included in every photo taken with a smartphone. He forgot, or didn’t know, that others can extract that information.That the photos were a bit racy is incidental. They could have been artsy shots of a landscape or snapshots of a sporting event. The problem for somebody who is trying to cover his tracks is that the images are embedded with data that will tell an investigator where and when they were taken.Ochoa, 30, who is charged by the FBI with hacking into US law enforcement agencies and posting online the home addresses for police officers, including those of more than 100 Los Angeles police officers, is a Linux administrator. Why he didn’t think about the risks of posting photos embedded with geo-tagging — common knowledge to most people who organize their photos by date and location on programs like iPhoto — is a question Ochoa is probably asking himself. According to the FBI, Ochoa allegedly tweeted in February using the handle @Anonw0rmer, directing followers to a site where he had posted information stolen from various law enforcement agency websites.At the bottom of the site was an image of a woman, now identified as his girlfriend, with a sign reading “PwNd by w0rmer & CabinCr3w Investigators took those and other photos off several websites with references to w0rmer and found that they had been taken in a suburb of Melbourne, Australia. They found that Ochoa had vacation photos on Facebook showing a recent trip to Australia, with a woman he said was his girlfriend who lives in that same suburb.They were able to match the times and even some of the bathing suits the woman in the hacker photos was wearing.And that was enough to lead to Ochoa’s arrest March 20.Gary McGraw, CTO of the software security consulting firm Cigital, says it shouldn’t be shocking that a hacker was taken down by such a simple mistake. “Super, uber hackers sometimes act like regular consumers,” he says.Still, writing in GCN (Government Computer News) on April 18, John Breeden II, says the episode should be a cautionary tale for anybody. “Knowing that GPS data is being captured in every photo you take should be in the back of your mind. If it can be used for nefarious purposes, you can bet someone will try,” he wrote. Related content news Multibillion-dollar cybersecurity training market fails to fix the supply-demand imbalance Despite money pouring into programs around the world, training organizations have not managed to ensure employment for professionals, while entry-level professionals are finding it hard to land a job By Samira Sarraf Oct 02, 2023 6 mins CSO and CISO CSO and CISO CSO and CISO news Royal family’s website suffers Russia-linked cyberattack Pro-Russian hacker group KillNet took responsibility for the attack days after King Charles condemned the invasion of Ukraine. By Michael Hill Oct 02, 2023 2 mins DDoS Cyberattacks feature 10 things you should know about navigating the dark web A lot can be found in the shadows of the internet from sensitive stolen data to attack tools for sale, the dark web is a trove of risks for enterprises. Here are a few things to know and navigate safely. By Rosalyn Page Oct 02, 2023 13 mins Cybercrime Security news ShadowSyndicate Cybercrime gang has used 7 ransomware families over the past year Researchers from Group-IB believe it's likely the group is an independent affiliate working for multiple ransomware-as-a-service operations By Lucian Constantin Oct 02, 2023 4 mins Hacker Groups Ransomware Cybercrime Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe