>>What if the hacker had implanted the files? What if another hacker 
before him had accessed
the system in the same way and had implanted the files? What if a trojan or 
a computer virus had accessed
the system and had implanted the evidence?<<

Questions I must remember to ask the Victorian police if they decide to 
waste an enormous amount of taxpayers money prosecuting me for making 
alleged *death threats*.

I am waiting for my case to come up
& I am waiting
for a rebirth of wonder
& I am waiting for someone
to really discover America
 Lawrence Ferlinghetti, 

Reply via email to