Godlike Productions - Conspiracy Forum
Users Online Now: 1,393 (Who's On?)Visitors Today: 361,712
Pageviews Today: 517,101Threads Today: 124Posts Today: 2,939
05:44 AM


Rate this Thread

Absolute BS Crap Reasonable Nice Amazing
 

Petraeus mistress used e-mail trick employed by terrorists

 
Anonymous Coward
User ID: 23014610
United States
11/14/2012 12:25 AM
Report Abusive Post
Report Copyright Violation
Petraeus mistress used e-mail trick employed by terrorists
For those of you wondering, this is how they did it.


"Someone trying to remain anonymous can hide e-mails by routing them through different servers and using public computers that don't keep activity logs, he said. Broadwell may have thought she had done everything to hide her tracks, but often people make mistakes, leaving their e-mails traceable by investigators, he said."...


"Rather than transmitting e-mails to the other's inbox, they composed at least some messages and left them in a draft folder or in an electronic "drop box," the AP reported. Then the other person could log onto the same account and read the draft e-mails, avoiding the creation of an e-mail trail that might be easier to trace."


How were they caught?


"Somewhere along the way, her IP address was captured," Henry said. An IP address, or internet protocol address, is a string of numbers unique to a particular computer or device on the internet. With it, authorities can usually track the identity of the person who sent an e-mail or visited a website."


What they were doing was time consuming. Sounds like they just got a little lazy.
Anonymous Coward (OP)
User ID: 23014610
United States
11/14/2012 12:26 AM
Report Abusive Post
Report Copyright Violation
Re: Petraeus mistress used e-mail trick employed by terrorists
Sorry forgot the link!

[link to www.usatoday.com]
wisc_natureboy
I pee outside.

User ID: 27668390
United States
11/14/2012 12:31 AM

Report Abusive Post
Report Copyright Violation
Re: Petraeus mistress used e-mail trick employed by terrorists
...
"Rather than transmitting e-mails to the other's inbox, they composed at least some messages and left them in a draft folder or in an electronic "drop box," the AP reported. Then the other person could log onto the same account and read the draft e-mails, avoiding the creation of an e-mail trail that might be easier to trace."
...
 Quoting: Anonymous Coward 23014610


Very nice.

Add to that; a public access computer or throwaway anonymous cell phone
along with the use of a few Pr--y servers
and you have a pretty secure communication channel.
.
-
.

We all breathe the same air.
.-.. --- ...- . / .- .-.. .-..
(love/all)

News