>>What if the hacker had implanted the files? What if another hacker
before him had accessed
the system in the same way and had implanted the files? What if a trojan or
a computer virus had accessed
the system and had implanted the evidence?<<
Questions I must remember to ask the Victorian pol
What if the hacker had implanted the files?
What if another hacker before him had accessed
the system in the same way and had implanted the files?
What if a trojan or a computer virus had accessed
the system and had implanted the evidence?
Oh well... Magic Lantern magically creates us more
c
Spook Remailer writes:
> As they corresponded, the hacker infected [accused pedo, OC CA Judge]
> Kline's computer with a virus that allowed him to copy
> the entire contents of the judge's hard drive. The hacker,
> whom prosecutors have not named, then
> messaged Posey about what he had found.
As they corresponded, the hacker infected [accused pedo, OC CA Judge]
Kline's computer with a virus that allowed him to copy
the entire contents of the judge's hard drive. The hacker,
whom prosecutors have not named, then
messaged Posey about what he had found.
Federal prosecutors allege t