[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: future entrapment



>>*       establish a local WWW server hosting some useful information
>>*       configure the server to record the IP addresses of people who
>>        access it, and cross-reference them to obtain geographical
>>        locations as registered with NIC. Feed this into a GIS and
>>        track local accesses.
>>*       have a list of people who I want  to nail.
>>*       filter all HTTP requests through a script that
>>        -       checks the list of victims
>>        -       if a request for a file comes in from one of the
>>                targets, munge the outgoing web page to include
>>                a <IMG SRC= ...> tag pointing to a foreign site
>>                carrying images deemed pornographic in my jurisdiction
>>        -       ring the console bell
>>
>>As soon as someone on the hit list downloads a file, you have prima
>>facie evidence that they are probably in posession of some kiddie porn.
>>Instant search warrant time ...

"But your Honor, I had graphics turned off for speed."  "The Geheimestaat
Polezi has to prove not only that I connected but that I actually got
something."  "Too bad my swap file is on a partition that was corrupted when
the ossifers grabbed my machine."

The ancient question, do you possess something if it is encoded and cannot
be decoded?

DCF