Feeds

Phone charging log helps to convict murderer

Alibi eroded by midnight metadata

The Essential Guide to IT Transformation

An Australian man has been convicted of murder after mobile phone metadata describing when the device was connected to a charger was tabled as evidence.

Alison Baden-Clay disappeared from her Brisbane home on April 19th, 2012. Her body was found in a nearby creek 11 days later.

Her husband, Gerard Baden-Clay, claimed he was asleep in bed on the night his wife disappeared but was later charged with her murder.

Gerard Baden-Clay's defence rested on his deceased wife's depression and lack of evidence of him being present at the scene of the crime.

Prosecutors were able to cast doubt on that defence by, among other things, retrieving metadata from his phone that showed a new connection was made to a charger early on the morning of April 20th. Prosecutors argued that the new connection showed Gerard Baden-Clay had not been in bed all night but had been out attempting to hide Alison's corpse and, on returning home, connected his phone to a charger.

Other evidence, such as fingernail marks on the accused's face and the presence of leaves from plants from the Baden-Clays' garden in Alison's hair and clothes, was also tabled. Mr Baden-Clay also admitted to wanting to leave his wife, to having a mistress he had promised to marry and to being in substantial debt a life insurance policy on Alison's life would have helped to erase.

A jury yesterday unanimously convicted Gerard Baden-Clay of murder and he was sentenced to life. ®

Build a business case: developing custom apps

More from The Register

next story
ONE EMAIL costs mining company $300 MEEELION
Environmental activist walks free after hoax sent share price over a cliff
Arrr: Freetard-bothering Digital Economy Act tied up, thrown in the hold
Ministry of Fun confirms: Yes, we're busy doing nothing
Help yourself to anyone's photos FOR FREE, suggests UK.gov
Copyright law reforms will keep m'learned friends busy
Apple smacked with privacy sueball over Location Services
Class action launched on behalf of 100 million iPhone owners
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
UK government officially adopts Open Document Format
Microsoft insurgency fails, earns snarky remark from UK digital services head
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.