Quote:
Originally Posted by HarryT
But if the purpose of your monitoring is to detect illegal content going to a particular user of the ISP, does that affect things? ie, won't it just be the recipient's address and the packet "contents" that are relevent?
|
If I can change my MAC and IP address to look like I'm you, then yes, it affects things.
If I use spoof data packets to connect to dodgy websites, which are later raided and your details are found on the site, then again, yes it matters.
I'm not suggesting this sort of thing would become the norm, by the way, but it's common enough behaviour in other forms of cyber-crime for it not to be ignored either.
A good computer forensics person
might be able to unravel everything and prove that the apparently guilty person isn't, but there's a whole string of things that need to have been done correctly before they would even stand a chance. And unfortunately not all law enforcement people are adequately trained to ensure this would be done, even assuming everything had been set up correctly in the first place.