FBI investigators have told that the celebgate photo hackers are likely part of a ring predominantly based in the US and who had been trading images anonymously until they found a larger following.
With the latest round of 4chan stolen photos being leaked, celebrities affected, including new images of Jennifer Lawrence, Amber Heard, Vanessa Hudgens, Kaley Cuoco (see new images here), Kim Kardashian (see images here), Kate Bosworth (see images here), Candice Swanepoel (see images here) Lake Bell and Vanessa Hudgens have since had their lawyers reach out to the FBI in a concerted effort to put a pause to further leaks and to bring those responsible to account.
Told a source via the nypost: This isn’t one rogue hacker, this is the work of a ring of hackers. It will take time to track them down. The early theory is that at least some of those in the hacking ring are US- based because some of the names on the ‘master list’ are actresses or personalities who are only known to someone who watches US cable TV.”
Noted actresses on the list include “So You Think You Can Dance” finalist Ellenore Scott; Clare Bowen, known for the ABC series “Nashville”; American model Emily DiDonato; “Deal or No Deal” beauty Tameka Jacobs; and Erin Cummings, who had minor roles in “Charmed” and “Star Trek: Enterprise.”
That said one can’t help but wonder if the hackers were simply hooked up to cable tv where anyone can watch from anywhere in the world or simply got on the web and surfed and traded with other hackers who could just as easily be based in many parts of the world.
That said there are ways that the FBI may still be able to make a connection with hackers, albeit one with fraught with insurmountable challenges.
Told an investigator, Bruce Anderson with the Cyber Investigation Services via the nypost: ‘Electronic fingerprints can be left in a variety of ways. The FBI would look at victims’ accounts with Apple to see if anybody has logged in. Is there a series of IP addresses linked to the account? They’d look at the devices of the celebrity to see if someone had access to their computer or their phone, or had got past the security into the iCloud . . . It is a pretty cumbersome prospect, particularly with so many pictures out there.’