1997-12-12 - Could a Jim Bell do the same thing?

Header Data

From: Declan McCullagh <declan@well.com>
To: cypherpunks@cyberpass.net
Message Hash: 9ceebda78ae42d4e11e3887113b963a9c134b7251b47ea87fcba24c04101290a
Message ID: <Pine.GSO.3.95.971212151511.29644T-100000@well.com>
Reply To: N/A
UTC Datetime: 1997-12-12 23:25:56 UTC
Raw Date: Sat, 13 Dec 1997 07:25:56 +0800

Raw message

From: Declan McCullagh <declan@well.com>
Date: Sat, 13 Dec 1997 07:25:56 +0800
To: cypherpunks@cyberpass.net
Subject: Could a Jim Bell do the same thing?
Message-ID: <Pine.GSO.3.95.971212151511.29644T-100000@well.com>
MIME-Version: 1.0
Content-Type: text/plain



>From a news.com feature:	
	
        Sometimes, Daufenbach notes, a freshly arrested child
	pornographer facing a long sentence will agree to
	let his email account "hum" (continue running), with
	Customs picking up the traffic. A year ago,
	Daufenbach assumed the identity behind one such
	account. A molester and child pornographer
	(Daufenbach declined to reveal the person's name)
	began emailing Daufenbach's undercover account and
	then switched to real-time online chat, one of the
	biggest challenges for any cyberinvestigator. "A lot
	of people don't like doing it," says the Customs
	agent. "You have to think on your feet."

        Molesters often talk graphically about the children
	they abuse--and expect the same from their
	confidants. "If you get nervous and flustered,"
	notes Daufenbach, "you'll blow it."








Thread