One of the intriguing parts of this job is reviewing the Internet records of the who, the what, the where, the when, the how, and sometimes even the why (!), of those that are accessing this blog.
The multiple methodologies available to me are sometimes highly revealing and provide some slivers of insight into the murky world of the pro-taser folks.
One can almost track the pro-taser network communications paths as Internet users (in locations where prominent minions or fan-boys are known to either live or work) read a particular post, then you can almost see them generating an e-mail (this part is a guess), and then others in similarly-known locations directly access the same post over the following hours.
Sometimes they even arrive directly from their "super secret" untraceable off-site webmail server that absolutely nobody knows about (it's at www.secureserver.net in case you're interested).
The latest thing is one or more people half-heartedly using an anonymous proxy to access this blog. Because they didn't read the manual, it's not working very well.
One reason that I'm posting this information is that their inept Internet clumsiness is resulting in so many interesting factoids that it's becoming a bit of a distraction, and certainly a time-sink that I can't afford.
I'd honestly rather that they either go away, or learn how to use the Internet without leaving quite so many tantalizing clues in their wake.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment