To: maica
I understand all that but law enforcement officers tend to understand that actions like those being alleged don't usually occur in a vacuum. I'm wondering what the alleged catalyst was.
Or if Georges computer was proxy'd and the Feds went after him based solely on a proxy'd IP address.
To: Psycho_Bunny
They would have figured that out by now.
vp/n, prox, Ip spof, encypt, jojob etc.
To: Psycho_Bunny; kristinn
Wasn't there some computer message spoofing involved in the last Maryland Governor's campaign, by some Dem operatives? Who remembers that story?
17 posted on
10/14/2006 5:54:39 AM PDT by
FreedomPoster
(Guns themselves are fairly robust; their chief enemies are rust and politicians) (NRA)
To: Psycho_Bunny
Ask him!
I am only commenting on the spin from the Sun.
25 posted on
10/14/2006 8:02:22 AM PDT by
maica
(9/11 was not “the day everything changed”, but the day that revealed how much had already changed.)
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson