Has anyone given any though to how log files could be accepted as evidence in the first place? They're just text files, and exceedingly trivial to alter, forge, erase, whatever. They get edited all the time by hackers -- how can anyone, even the sysadmin, swear that they are "true"? We just saw a case of FBI hackers breaking into a computer in Russia -- why couldn't they break into a server as an ISP and alter the logs? It would be quite easy for them to do that, even easier if they had a Carnivore box in house. -- Harmon Seaver, MLIS CyberShamanix Work 920-203-9633 [EMAIL PROTECTED] Home 920-233-5820 [EMAIL PROTECTED]
- Re: layered deception Steve Schear
- Re: layered deception Declan McCullagh
- RE: layered deception David Honig
- RE: layered deception Aimee Farr
- Re: layered deception Tim May
- RE: layered deception Aimee Farr
- RE: layered deception David Honig
- Re: layered deception Tim May
- RE: layered deception Bill Stewart
- RE: layered deception Ray Dillinger
- Re: layered deception Harmon Seaver
- Re: layered deception Greg Broiles
- Re: layered deception Harmon Seaver
- Plausible deniability of e-mail... Tim May
- Re: layered deception Greg Broiles
- Re: layered deception Bill Stewart
- Re: layered deception Jon Beets
- RE: layered deception David Honig
- RE: layered deception Sandy Sandfort
- Re: layered deception Eric Murray