The Family Plan

THE BLACKFISH FILES

Husband and Wife in Kitchen

Offense

Aggravated Sexual Assault of a Child (Texas Penal Code 22.021)

The Allegation

That a man had sexually assaulted his wife’s 13-yo niece who had been staying with them for the summer.

Our Client

He was a 34-yo mid-level logistics manager, married, with two children under the age of five.

His/Her Version of the Story

He vehemently denied the charges, despite screenshots of grooming Snapchat messages on her phone that appeared to come from his phone. They started flirty, turned explicit, then coercive. The messages were sent from an iPhone that matched his serial number, and his wife joined the prosecution, claiming that he was always on his phone at night. He panicked and deleted the app from his phone, cleared the cache, and factory-reset his phone when the accusation was made. The evidence was damning – chat logs, timestamps, locations pings; everything seemed to line up, and the DA was offering him 20 years in prison.

Our Findings

This was a digital forensics case all the way, and it gets…technical. First we conducted full physical imaging with Cellebrite UFED and GrayKey where needed. Then we ran our custom carving scripts that go far beyond commercial tools—looking for SQLite WAL files, unallocated space, carved fragments of Snapchat’s ephemeral database, and remnants in the iCloud Drive sync tokens.

We found that the Snapchat account had been accessed via web (snapchat.com) from a Windows laptop that was never seized. The laptop belonged to the victim’s older brother, who lived two streets over and had stayed over multiple weekends. The iPhone serial number in the metadata? Spoofed. A simple p-list edit and a sideloaded tweak had changed the reported UDID and serial number during the messaging sessions. The real device fingerprint didn’t match our client’s phone once we dug into the raw NAND.

Most damning: The iCloud backup the prosecution relied on had been selectively restored and then re-backed up after the messages were planted. The backup manifest showed anomalous “last modified” timestamps that only make sense if someone had been inside the account with the Complaining Witnesses’ Apple ID credentials.

The girl wasn’t the only one who knew the password. Her mother had it too—and had been fighting a nasty custody battle with her ex. The niece had been coached. The messages were manufactured to pressure our client into “helping” with money and silence during the divorce war. He was collateral damage in a family extortion play.

The jury saw everything, and the State’s expert’s had to admit they didn’t even check for spoofed credentials.

The Outcome

Our client was acquitted on all charges – and promptly filed for divorce from his wife, who had been in on the whole thing.