R v F (2025): Addressing the Defence of Hacking

This paper presents a pioneering case study of *R v F* (2025) that demonstrates how digital forensic investigators can empirically counter the "hacking" or "SODDI" defence by collaborating with law enforcement to provide evidence that helps courts distinguish between innocent and guilty defendants.

Junade Ali

Published Thu, 12 Ma
📖 6 min read🧠 Deep dive

Imagine you are a detective trying to solve a mystery, but the suspect has a very clever excuse: "I didn't do it! Someone else broke into my house, stole my keys, and left the mess there. I'm just the victim of a high-tech burglary!"

This is exactly what happened in a real court case called R v F, and this paper is the story of how a digital detective proved that excuse was a lie.

Here is the story broken down into simple terms, using some fun analogies.

The Setup: The "Trojan Horse" Excuse

In the world of computer crimes, there is a common defense called the "Trojan Horse Defense" (or the "SODDI" defense: Some Other Dude Did It).

  • The Analogy: Imagine you are accused of leaving a pile of trash in your living room. You tell the judge, "I didn't do it! A burglar broke in, threw the trash around, and left. I was asleep!"
  • The Problem: In the digital world, it's hard to prove who actually touched the computer. Did the owner download illegal images, or did a hacker do it remotely?

In this case, a man named F was caught with thousands of illegal images on his phone. He told the court, "My phone was hacked. A ghost in the machine downloaded all this stuff. I didn't do it."

The Investigation: The Three-Step Detective Game

The authors of this paper (a digital forensics expert named Dr. Junade Ali and a police detective) didn't just look at the files; they played a game of "Three-Step Detective" to see if the story held up.

Step 1: The "Paperwork" Check (The Logic Test)

First, they looked at the suspect's story without even touching the phone.

  • The Suspect's Claim: "Look at my phone bill! There was weird internet activity while I was in police custody. That proves a hacker was using my phone!"
  • The Detective's Reply: "That's a misunderstanding. Phone bills are like a grocery receipt that just says 'Total: $50'. It doesn't tell you what you bought or when you bought it. The data on the bill actually matched normal background noise, not a hacker's activity."
  • The Logic Check: The suspect also claimed his accounts were hacked via email. But the illegal files were found in an app that requires a phone number to log in, not just a password. You can't hack a phone number remotely without physical access. Plus, the suspect had been chatting with people about illegal stuff on the same phone. If a hacker did it, why was the owner also chatting about it?

Step 2: The "House Search" (The Forensic Scan)

Next, they opened the phone up (digitally) to look for "burglar tools."

  • The Search: They used special tools (like a high-tech metal detector) to look for "Indicators of Compromise" (IOCs). These are the digital footprints a hacker leaves behind, like a broken lock or a muddy footprint.
  • The Findings:
    • On the iPhone: They found some web browsing history about cybersecurity. It looked like the owner was reading about hackers, not being hacked. The phone wasn't "jailbroken" (which is like picking the lock to let a hacker in).
    • On the Android: No signs of "root access" (the master key) or strange apps.
    • The Verdict: No burglar tools were found. The house was locked tight.

Step 3: The "How Did the Trash Get Here?" (The Real Explanation)

If no hacker did it, how did thousands of illegal images get on the phone?

  • The Discovery: The detective found that most of the images were in the Telegram app's "Cache."
  • The Analogy: Imagine you join a group chat where people are sharing photos. You don't have to click "Download" on every single photo. The app is like a greedy vacuum cleaner; it automatically sucks up every photo that passes through the chat and stores it in a hidden folder (the cache) so it loads faster next time.
  • The Truth: The suspect joined a Telegram group sharing these images. The app automatically downloaded them. He didn't have to click "save" for every single one, but he did choose to join the group.

The Courtroom: The Final Showdown

The trial happened in late 2025.

  • The Prosecution: Showed the jury the evidence: "No hacker tools found. The app automatically downloaded the files because he joined the group. He intended to join the group."
  • The Defense: The suspect tried a new story: "I was drunk, and my friends used my phone!"
  • The Twist: The prosecutor pointed out that the suspect had been asking for these images before he claimed to be drunk. The story kept changing, which is a bad sign.
  • The Jury's Question: The jury asked, "If the phone downloaded them automatically, does that mean he is guilty?"
  • The Judge's Answer: "You need to be sure he intended to be part of the group where these images were shared. If he joined the group on purpose, he is responsible for what the group shared."

The Result: The jury decided he was guilty on all counts. The "Hacker" excuse failed.

Why This Paper Matters

This paper is important because it teaches digital detectives a new way to think.

  • Old Way: Just use a robot tool to scan the phone and say, "Here are the files."
  • New Way (The Lesson): Think like a detective first. Ask: "Does the story make sense?" "Are there holes in the logic?" "Could a tool have made a mistake?"

The author also mentions another case where a robot tool did make a mistake, blaming a man for creating chat groups he didn't create. By using the "Three-Step Detective" method, they proved the tool was wrong and saved the man from a harsher sentence.

The Big Takeaway

When someone says, "A hacker did it," you can't just take their word for it. You have to:

  1. Check if the story makes logical sense.
  2. Look for the physical (or digital) evidence of a break-in.
  3. Find the real reason the data is there (like an automatic download).

This case shows that with the right mix of logic and science, we can tell the difference between a real victim and someone trying to pull a fast one.