Re: future entrapment
* establish a local WWW server hosting some useful information * configure the server to record the IP addresses of people who access it, and cross-reference them to obtain geographical locations as registered with NIC. Feed this into a GIS and track local accesses. * have a list of people who I want to nail. * filter all HTTP requests through a script that - checks the list of victims - if a request for a file comes in from one of the targets, munge the outgoing web page to include a <IMG SRC= ...> tag pointing to a foreign site carrying images deemed pornographic in my jurisdiction - ring the console bell
As soon as someone on the hit list downloads a file, you have prima facie evidence that they are probably in posession of some kiddie porn. Instant search warrant time ...
"But your Honor, I had graphics turned off for speed." "The Geheimestaat Polezi has to prove not only that I connected but that I actually got something." "Too bad my swap file is on a partition that was corrupted when the ossifers grabbed my machine." The ancient question, do you possess something if it is encoded and cannot be decoded? DCF
participants (1)
-
frissell@panix.com