[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: future entrapment
>>* establish a local WWW server hosting some useful information
>>* configure the server to record the IP addresses of people who
>> access it, and cross-reference them to obtain geographical
>> locations as registered with NIC. Feed this into a GIS and
>> track local accesses.
>>* have a list of people who I want to nail.
>>* filter all HTTP requests through a script that
>> - checks the list of victims
>> - if a request for a file comes in from one of the
>> targets, munge the outgoing web page to include
>> a <IMG SRC= ...> tag pointing to a foreign site
>> carrying images deemed pornographic in my jurisdiction
>> - ring the console bell
>>
>>As soon as someone on the hit list downloads a file, you have prima
>>facie evidence that they are probably in posession of some kiddie porn.
>>Instant search warrant time ...
"But your Honor, I had graphics turned off for speed." "The Geheimestaat
Polezi has to prove not only that I connected but that I actually got
something." "Too bad my swap file is on a partition that was corrupted when
the ossifers grabbed my machine."
The ancient question, do you possess something if it is encoded and cannot
be decoded?
DCF