Newly unsealed search warrants detail the records and electronic data that law enforcement sought and subsequently received from Amazon, AT&T, Yahoo, Yik Yak, Amex, Bank of America, Match, and more — as related to the ‘Idaho Four’ investigation and related charges against their accused killer, Bryan Kohberger.
A swath of companies including Meta and Google have been served search warrants for specific named datasets, including data from Verizon, Apple, Amazon, AT&T, Match (parent company of Tinder), Bank Of America, American Express, WSU Office of the registrar, Yahoo, and Yik Yak.
Officials also sent out a number of requests to companies that sold or manufactured Ka-bar knives, including Amazon and Blue Ridge knives. The unsealed documents and queries only show what law enforcement was seeking and NOT what was obtained from those queries.
The newly unsealed documents also show that law enforcement requested Tinder records for ‘all subscriber info’ between March 1 through March 31 for 2021, a year and a half before the murders took place — it’s unclear if the query is for Kohberger or one of the victims. The warrant shows a redacted UID (user identifier) but not a name.
It’s important to note that the unsealed warrants don’t just seek data related to Kohberger, the legal requests seek data pertaining to the victims with a keen interest on Kaylee Goncalves.
The documents also reveal that law enforcement requested ‘decrypted access’ to a device from Extreme Networks, the same company that employed Kaylee Goncalves. The device is likely a computer provided to Kaylee for working remotely in her marketing role; encrypting drives is common in businesses so that corporate data isn’t breached or stolen.
According to their website, Extreme Networks ‘designs, develops, and manufactures wired and wireless network infrastructure equipment and develops the software for network management, policy, analytics, security, and access controls.’
Click here to view the unsealed warrants inline in your browser, or choose download to save the file locally to your device.