Catch up on stories from the past week (and beyond) at the Slashdot story archive

 



Forgot your password?
typodupeerror
×
The Courts Government News

Laptop Thief Caught via AOL Login 524

Mundocani writes "Yahoo (Reuters) is reporting that the FBI has caught the guy who stole computers from Wells Fargo. The interesting part is that 'Investigators traced the computer to Krastof when he logged onto his own America Online account at home through one of the stolen computers.' Makes you wonder what sort of hooks the FBI has into AOL or other ISPs and what hardware identification is being transmitted at login."
This discussion has been archived. No new comments can be posted.

Laptop Thief Caught via AOL Login

Comments Filter:
  • Good vs Bad (Score:3, Interesting)

    by Anonymous Coward on Friday November 28, 2003 @08:12AM (#7581354)
    There may be some good in the fact that they are able to trace someone like this...but the ramifications make me shudder.

    That and make me glad I am in Canada..

  • by kjba ( 679108 ) on Friday November 28, 2003 @08:14AM (#7581367)
    Couldn't it just be the case that the internet browser's homepage was still set to an address on Wells Fargo's intranet? The wrong http request would be easy to find.
  • CPUID is your friend (Score:3, Interesting)

    by isa-kuruption ( 317695 ) <kuruption@kurupti[ ]net ['on.' in gap]> on Friday November 28, 2003 @08:15AM (#7581372) Homepage
    Once in a while, yes, it is your friend.

    But then again, AOL probably has other ways to track computers for marketing and such... to determine what PCs are being used how much to access AOL services, etc...
  • tin foil hat... (Score:2, Interesting)

    by mirko ( 198274 ) on Friday November 28, 2003 @08:18AM (#7581385) Journal
    If the guy tell the fbi his laptop got stolen, he may laos have given them some info about a recent internet connection which would have allowed them to find his mac address which was then looked for in some isps' logs until they found out who did it.
    I guess it's more optimal for the fbi to do it this way than to just store whichever information thanks to some software backdoors.
    we have some reasons to worry about our Freedoms but it is not a reason to imagine we're always being spied on.
  • ipv6 (Score:1, Interesting)

    by eddy_crim ( 216272 ) on Friday November 28, 2003 @08:21AM (#7581400) Homepage
    If im correct ipv6 stores your 48 bit mac address in the last 64bits (wasteful) so that should make the fbi's job nice and easy
  • Re:PC call home (Score:3, Interesting)

    by Ewan ( 5533 ) on Friday November 28, 2003 @08:35AM (#7581439) Homepage Journal
    A lot of corporate laptops now have "dial-home" software installed, and if you don't login every x (normally about 14) days without getting authorisation in advance, then the company will consider the laptop stolen and lock out any accounts stored on it.

    It operates much like spyware, and hides itself in the same way. This could be what happened here, and after the x number of days the system starts logging which IP address and time the computer logged in at and flags the information for further investigation. Once you have an IP address and a timestamp, it's relatively trivial for most ISPs to find out which user was online at that time.

    Ewan
  • Re:Wait a minute... (Score:5, Interesting)

    by leenoble_uk ( 698539 ) on Friday November 28, 2003 @08:36AM (#7581452) Journal
    Running Jaguar I set up a fake account with no password on purpose. If my laptop was stolen I WANTED the thief to use it to get online. My real accounts were hidden from the login screen and my home folder was invisible. I had a penny-per-minute dialup ISP set up to make it easy for the thief to get connected. Using DNS update software I would be able to see the IP address at Dyndns.org if it was ever used.
    If the thief was to find the computer locked down from the start then they'd be far more likely to wipe and restore making this a lot more difficult.
    Unfortunately, now running Panther and making user account invisible makes the fast user switching a buggy nightmare. So in spite of the extra security features like FileVault I think it less likely I would ever see it again if it were stolen. I liked my security through obscurity.
  • Re:PC call home (Score:3, Interesting)

    by haunebu ( 16326 ) * on Friday November 28, 2003 @08:50AM (#7581505) Homepage
    Why is a Wells Fargo laptop accessing AOL's network? Most corporations (and especially financial institutions I'd venture) require users to access corporate Intranets through a VPN and in turn access the Internet through their proxies. There's no way in hell that laptop should be connecting to the public Internet using an AOL account.
  • by Dynamoo ( 527749 ) on Friday November 28, 2003 @08:52AM (#7581514) Homepage
    It *might* be something like Computrace Plus [computrace.com] which sits on a laptop and silently transmits audit information back over whatever IP network it connects to. They've got some case studies that show how the product actually works.

    Basically, it's legitimate spyware. I've personally never used the product, although we are about to evaluate it.

  • by vofka ( 572268 ) on Friday November 28, 2003 @08:53AM (#7581518) Journal
    Yes, there is an AOL Client for Linux - though it's not an 'official' client.

    Look at This Tutorial [yolinux.com] to see how to install the PengAOL [sourceforge.net] Linux Dialer.

    I have set this up on both SuSE and Mandrake systems from source for a couple of friends who wanted to try Linux, but who didn't want to drop AOL... It can be a bit tricky to get working, but it does work (in the UK at least).
  • by rduke15 ( 721841 ) <rduke15@gm[ ].com ['ail' in gap]> on Friday November 28, 2003 @08:53AM (#7581520)
    Were they not running a password protected operating system, at least Windows 2000 or Windows XP?

    You must be kidding, but I'm not sure.

    It takes only a few minutes to change the administrator password on a Windows box with a Linux boot floppy.

    Done it a couple of times (on Windows 2000), for users who didn't know the admin password.
  • Re:PC call home (Score:5, Interesting)

    by Zocalo ( 252965 ) on Friday November 28, 2003 @08:58AM (#7581535) Homepage
    I kind of get the impression, that with this being a laptop and all, it would have been using a modem to connect. Last I heard a modem does not actually have a static MAC address in firmware like a network card. Since this is Slashdot, we might as well blame Microsoft for this confusion since they gernerate a MAC with the vendor ID of 44:45:53 to "internal adapters" such as modems.
  • by Anonymous Coward on Friday November 28, 2003 @09:06AM (#7581552)
    It's simple. Everybody wants thieves to be locked up, but nobody wants to live in a police state. This means that we applaud whenever the authorities apprehend a baddie, but we boo whenever they give themselves even more powers and so bring the darker possibilities one step closer. There is nobody to guard the guardians, so we defend ourselves as best we can, by trying to postpone the day when their control might become total.

    The two things are directly related, inasmuch as in a police state there would certainly be much less crime, since freedom cuts both ways. What you see as a conflict is just a reflection of this inter-relationship. We have to do both if we wish to safeguard both our present and our future.
  • Similar Experience (Score:5, Interesting)

    by Lieutenant_Dan ( 583843 ) on Friday November 28, 2003 @09:14AM (#7581568) Homepage Journal
    I had one of my notebooks stolen at the LA airport. I had one in my suitcase (there's only so many I can carry) because of a conference. One of the baggage handlers must have helped himself to my notebook.

    The funny thing is that the notebook was my personal, and because I did travel a lot at the time, I had an AOL account for convenience. Out of a whim, I called AOL and asked them for a log of my sign-ins. Lo and behold, turns out whoever stole my notebook was using my AOL account to surf! I pleaded with the tech person to at least give me the IP address so I can track the thief down. He sympathized with my problem and passed me to one of the network engineers who was very keen on helping me. I got the IP address and the phone number that he used to dial-in. He said that the Telecom department could give me the number that was used to dial in to AOL but I would have to get law involved as certain FCC regulations prevented him from sharing that info.

    So I collected all the info and sent the report to the security officer at the Airport, a copy to the LA sherrif's dept and another one to my insurance company (who I had hoped would be keen to solve the problem). After a few calls, I got nothing. Turns out that theft like that happens a lot at the LAX and the LAPD is way too busy with serious crime to investigate a crime committed to an out-of-towner.

    The good thing is, my home insurance covered the theft, so I got a better model for basically the amount I paid for my notebook a year prior (minus deductible).

    This was pre-2001 btw ...
  • Re:Wait a minute... (Score:5, Interesting)

    by HeghmoH ( 13204 ) on Friday November 28, 2003 @09:23AM (#7581597) Homepage Journal
    If you do want to implement e-mail, it's very simple. You don't need a local MTA; SMTP is very simple, and a server will accept a message for a user at its domain, no matter where you're connecting from. (Or nearly so....)

    So all you have to do is know the SMTP server for your e-mail address, and a bit of scripting with netcat does the rest. Just make a file with:

    helo phone_home@domain.blah
    mail from:phone_home@domain.blah
    rcpt to:phone_home@domain.blah
    data
    Subject: subject

    contents go here
    .
    quit

    Then you can send it with 'nc smtp.isp.blah 25 file'.

    I do this for my phone-home program. It doesn't send mail by default, but it checks a private page on my web site. If it finds the right command on that page, then it will send e-mail. I can also have it execute commands and open up an ssh tunnel so I can ssh in.

    Of course, like a dumbass, I don't have an easy way for them to get online unless they have a wireless network. Do you have a suggestion for how to do that without having a password-free admin account? I don't want random people to be able to do nastiness on my machine.
  • by manon ( 112081 ) <slashdot@@@menteb...org> on Friday November 28, 2003 @09:23AM (#7581601) Homepage Journal
    If I'm not mistaking, ISP's have to keep the logs for several years by law (at least in Belgium they have to). That way they can still trace a cracker/scriptkiddy or a stupid thief like the one in the story months, even years after their actions.
    In the federal building I used to work, we even needed to keep the proxy log (with date/time, login-id and visited sites)for 5 years... go imagine.
  • by TygerFish ( 176957 ) on Friday November 28, 2003 @09:30AM (#7581626)
    No matter how the guy was caught, simple or complex, the fact that the story comes up at all opens several interesting cans of worms.

    We give ourselves, our populace and our government, a lot of credit. We walk down the street trusting people we wouldn't let drive our cars to make an intelligent decision on who should enjoy personal control over a powerful army and a large nuclear arsenal.

    We live under a government made up of mostly of obscure appointed functionaries. During the last election, John Ashcroft was a man so despised by the people who best understood his personality and performance, that his first contribution to U.S. history was losing an election to someone the electorate knew to be deceased. Michael Powell first broke the surface as chairman of the FCC by vociferously supporting measures to further consolidate ownership of America's broadcast media.

    We trust faceless strangers to *NOT* use terrorism as an excuse to pass nasty laws that sidestep the principles which define us as a people.

    Now, it is perfectly possible to imagine that the person who stole the laptops was the kind of (darwinian) mastermind who *would* log on to someone else's AOL account, using their stolen computer from their home connection and leaving us to ask, 'Hey, why not just turn yourself in...?'

    Be that as it may, as some pieces here and elsewhere have shown, at all levels, governments are happy to adapt law and technology to purposes that civil libertarians dislike with good reason. This time it was nothing, but one day, it could very well be something that makes us all wish we could go back to telephones and paper.

    The point that started this thread might very well be moot, but unless you are completly satisfied with whom we have in office and whom they have appointed to positions of power most of us are scarcely aware of, you have to wonder what things will be like when things are different.

  • by adzoox ( 615327 ) * on Friday November 28, 2003 @09:46AM (#7581675) Journal
    I have done something similar with yahoo auctions. At auction end I type the seller's name into my IM client. It registers that name under all IM clients.

    I always request a phone number and email address if I pay by Paypal or PayDirect. If they don't give it to me and I can't validate it, I don't send the money.

    I have sent money in the past; rather blindly. I have been able to catch two sellers by just pretending to be girls interested in them, through IM. I got their actual phone numbers and even got one ready to pick me up and meet me for a "date" LOL.

    Of course it was a lot of hassle.

    If you can catch a criminal at their own game - that's justice.

    I wish eBay wouldn't have eliminated the contact information request without having a transaction with the othert party. Most sellers that cheat me on Yahoo, also have aliases identical on eBay.
  • by Emperor Skull ( 680972 ) on Friday November 28, 2003 @09:51AM (#7581696)
    We configure the built-in windows dynamic DNS for all of our systems. If someone steals it and connects it to a network without bothering to reconfigure, their IP address will show up in our DNS logs. WINS works the same way. Not perfect, but free and easy.

    ES

    - If I had all the money I spent on cars, I'd spend it all on cars.
  • Re:Wrong Guy (Score:2, Interesting)

    by Anonymous Coward on Friday November 28, 2003 @09:56AM (#7581714)
    Many banks outsource work, and that was apparently the case here. For example, smaller banks outsource their mainframe/minicomputer work to a company that specializes in that work. In this case, it only dealt with certain type of customers. Wells Fargo should have a standard contract with them that requires the outsource provider to meet certain standards of data security. Having a laptop that was stolen from a locked firm probably isn't something the company can protect against. Geeze, I hate this, I'm defending them and I don't agree with the policy, but that's the Government (OCC) for you.
  • no warrant needed (Score:5, Interesting)

    by js7a ( 579872 ) * <`gro.kivob' `ta' `semaj'> on Friday November 28, 2003 @10:03AM (#7581752) Homepage Journal
    Fred sets his laptop up to log into AOL with a default account and password. The crook seals the laptop. Fred calls AOL asking what ANI-reported telephone number his account has logged in on since the theft. AOL tells Fred the phone number. Fred reports the number to the cops. The cops get reverse directory information from the phone company (without a warrant unless the number is unlisted.) The cops ask Fred to ask AOL to inform the cops upon the next login. The crook logs in again. AOL calls the cops. The phone numbers match. Cops bust down Crook's door without a warrant because they have knowledge that a crime is taking place. The crook is busted.
  • by Anonymous Coward on Friday November 28, 2003 @10:18AM (#7581827)
    First, hat's off to all who don't know and say so, or simply state it. It's OK if you don't know your NIC's vendor ID/prefix by heart, or if you can't dissect the IP header without a reference.
    Really.

    To the rest: Offering complete goofball theory after complete goofball theory, briefly resting only to scream 'violation of privacy' then going back and suggesting another goofball theory impresses nobody. CPUID/NIC MAC/Windows/Office/[you-name-it] identifers or serial numbers are not immediately accesssible just because you have a PPP sesion going over your modem. If a phone-home feature was installed, then fine, but that's a completely different story.

    Another hilarious example was the the default-route theory, which someone suggested as a 'dead giveaway' to the feds. Hello!? Even if the routing table was accessible, routes associated with a NIC wouldn't be *in* the table unless the NIC was active, and the setting would only be visible in the registry, not typically accessible to the world, nor routinely queried by an ISP. And never mind the statistical probability that a corporate NIC is configured for DHCP, thus it wouldn't have a default route to begin with.

    I simply can't believe the amount of idiotic pseudo-techies posting and feeling BIG because they could incorrectly apply page 254 of the MSCE prep guide to formulate a crackpot theory.

    Bleeeeeeeeeeeechhhh.

  • Re:PC call home (Score:2, Interesting)

    by Tux2000 ( 523259 ) <<ed.nekof.todhsals> <ta> <rednaxela>> on Friday November 28, 2003 @11:22AM (#7582132) Homepage Journal
    One continuing problem that IT has is locking down computers. It is very common for employees to install their own software and dial connections on laptops.

    At my company, users simply can't change dialup connections, and they can't install software requiring administrative privileges. They are "Restricted Users" in Windows. To select a dial-up connection, a selfmade software running "suid" (or the equivalent of this on W2K) changes a preconfigured and locked dial-up connection. To install more software than the default, they need to connect to a software distribution server in the corporate network. To install other software, they need to hand out their machine and the cdrom to the IT support. In very rare cases (having a high rank or having robbed on knees for a while), the IT support can enable a "24 hours administator" mode, giving the user local administrator rights for 24 hours.

    (It might be possible to copy a special program onto the machines to bypass some of the restrictions, but our users don't know that much about computers. Most can't even tell the difference between a power cable and a (laptop) power supply unit, they name both "power cord".)

  • way off topic (Score:2, Interesting)

    by kayen_telva ( 676872 ) on Friday November 28, 2003 @11:46AM (#7582245)
    okay, since this discussion has gone haywire, I may as well ask an off topic (kinda) question. Lots of people are mentioning that you can use dynamic dns or special software to alert you to where your stolen laptop is. But it seems they all require you to allow the thief to completely log into your system. w00t ??!! I have THREE passwords to get to a desktop on my Linux laptop. BIOS, LILO, user. So Im screwed right ??? If I want some theft security I have to give up my data and day to day security ?? anybody know solutions ??
  • Re:no warrant needed (Score:4, Interesting)

    by jrumney ( 197329 ) on Friday November 28, 2003 @11:47AM (#7582248)
    Its his account. I'm not American either, but in Europe, companies aren't just allowed, they are obliged to give you all information they hold about you, which in the case of an account which only you are legitimately allowed to log into should include the last phone number you dialed in from.
  • Re:You know... (Score:5, Interesting)

    by Alsee ( 515537 ) on Friday November 28, 2003 @11:52AM (#7582266) Homepage
    why is it that when the police do something smart with computers...
    And when they can't solve a computer crime case...


    Because the issue is how they do it. News items appear slam the police for success and ridicule them for failure simply becuase news items are not a representitve sampling of reality! The police have a hundreds of successes every day, but who cares to write about them or read them? It only becomes a news item when the police have a success AND they did something wrong or controvercial in the process. The same goes for their failures - it only becomes newsworthy when someone really screwed up.

    As for this particular story it is all about how the police caught the guy. It appears that Slashdot botched the story in this case. Another news site reports that the guy did NOT log into his own AOL account, he logged into an AOL account belonging to the owner of the machine. If that's the case then there really isn't any story here. If some moron steals my wallet and then shows up at bank trying to use my safety deposit key then there's no problem grabbing him and throwing him in prision.

    I was going to continue with an example of police methods that would not have been acceptable, but lets skip arguing over specifics. Suffice it to say that there *are* a wide variety of unacceptable methods. If you don't agree with that then you are a far greater threat to this country than any terrorist with a bomb.

    -
  • by fozzmeister ( 160968 ) on Friday November 28, 2003 @12:02PM (#7582310) Homepage
    Mac address don't go any further than the first router and certianly don't get put into TCP/IP packets for transmition accross the NET. therefore AOL or anyone else (not on your local LAN) would have a hard time using your MAC address to find a stolen computer
  • by crashnbur ( 127738 ) on Friday November 28, 2003 @12:14PM (#7582374)
    ...the LAPD is way too busy with serious crime to investigate a crime committed to an out-of-towner.

    It's sad, really... but police officers have essentially been reduced to insurance claims officers when it comes to theft or vandalism. Unless someone is in clear and present danger, the police often can't or won't act because there is just too much crime.

    I read a sociological report about persons who have committed felonies recently, and the results shocked me. The statistics in particular that got my attention:

    Of all the grand theft (generally $500+) that occurs in the US, only 6% of it is even reported.

    Of all the grand theft that is reported, only 1% of the thieves are ever caught.

    Of course, you have to understand that sociology isn't the most exact science in the world, and that these stats most likely include career thieves who only get caught once. I guess you can tell any story you want if you've got the stats to back it up.

    But still, according to these numbers, 99.94% of all thefts of $500 value or more are lost causes for the theft victims, because either the thieves are too good or the police forces are not good (or willing) enough to catch them.

  • Stolen mac call home (Score:2, Interesting)

    by craw ( 6958 ) on Friday November 28, 2003 @12:15PM (#7582384) Homepage
    Here's an article [wired.com] about how someone got back his sister's stolen mac using Timbuktu and help from usenet.
  • by This Is Ridiculous ( 234241 ) <brentdaxNO@SPAMcpan.org> on Friday November 28, 2003 @01:19PM (#7582725) Homepage
    Makes you wonder what sort of hooks the FBI has into AOL or other ISPs and what hardware identification is being transmitted at login.
    If you actually read the article, nothing untoward happened.

    Probably, Wells Fargo reported to AOL that computers with those accounts on them had been stolen--perhaps simply to keep them from buying anything on company money or anything. When AOL noticed the login, they notified the FBI, who used normal techniques to get the account information.

    This is not a scary Big Brother scenario; rather, it's a great model for how corporations and government can and should cooperate to fight crime. Does anyone here really think that AOL acted improperly by giving them the address of a computer and identity thief?

  • Re:PC call home (Score:3, Interesting)

    by Dr. Evil ( 3501 ) on Friday November 28, 2003 @01:36PM (#7582850)

    Naw, phone numbers only set up the connection, they don't exist once the connection is established. Modems are only capable of a point-to-point connection so the MAC is meaningless.

    I assume Microsoft assigns a bogus MAC just because it is easier (== less bug prone) than dealing with special cases in their protocol stacks.

    I've always been a bit curious about how they generate the bogus MAC though. Can it be an identifier?

    IMHO, if the thief didn't wipe the HDD on the notebook, then they were probably nailed by a cookie as soon as they fired up their browser.

    The cookie would give an IP, an IP would give a rack of modems, a rack of modems would give the caller's phone #, and pow.

    Or... the cookie would give an IP, the IP would give a provider, the provider and IP would give an account, the account would give a physical address and pow.

    BTW, one ISP I was with would create a dynamically generated reverse-lookup DNS entry which contained my MAC address. Pretty clever since my MAC and IP, thus provider and account would be splottered all over ISP logs everywhere. It's not so much a privacy invasion, since the IP and the date/time would give the same info.

  • No news here (Score:3, Interesting)

    by Awptimus Prime ( 695459 ) on Friday November 28, 2003 @02:16PM (#7583120)
    Back when I worked in the abuse department for a leading ISP, this was a daily thing. Why's it news? Beats me..

    The dial-up equipment at ISPs keep a log on hand of the numbers you've connected from. The investigators get a warrant for this information, you email it to them, case closed.
  • by MadAnthony02 ( 626886 ) on Friday November 28, 2003 @02:23PM (#7583153)

    The security guys where I work are fond of this story. We had someone steal a couple of college owned computers, and aparently resold one of them to a student halfway across the country. The computer had Norton Antivirus Corporate Edition configured to run as "managed" -ie it gets it's definitions of our servers instead of symantec's. Our network guys got suspicious when they noticed trafic on one of our NAV servers coming from several states away - turned out that the computer theif never changed the antivirus settings before selling it and it was trying to get virus definitions from us.

  • by sik puppy ( 136743 ) on Friday November 28, 2003 @02:55PM (#7583322)
    that won't do it. Many major firms have custom bios installed.

    The laptop checks via the internet to see if its id (serial# ?) is on the stolen list. If it is it self-destructs.

    Some friends who used to work for a major silicon valley firm said this was done at their place of employment.

  • CALM DOWN!!!! (Score:3, Interesting)

    by clickster ( 669168 ) on Friday November 28, 2003 @03:14PM (#7583407)
    http://www.crime-research.org/news/2003/11/Mess270 2.html Check the above article. They say he logged into AN account registered on that computer. It could have been that he logged onto the Wells Fargo guy's account (with password saved). After all, he is a data thief, and not a very smart one apparently. If the FBI had AOL watching that guy's account, then they could have simply traced the IP Address. No big deal...if that's the case. It would help if the articles would be little more specific.
  • by NeoMoose ( 626691 ) <neomooseNO@SPAMdespammed.com> on Friday November 28, 2003 @03:29PM (#7583485) Homepage Journal
    Is the FBI refusing to divulge how they found out that he was on one of the stolen computers? Because if so that is a direct violation of the Freedom of Information Act. I sure as hell want to know if my computer transmits some form of identification information when I log in to my ISP.

    What I am willing to bet that it really is though, without reading, is that the serial number of the computer led to the serial number of the nic, whether it be modem or ethernet, and then the mac address could probably be identified. Just my guess.

    I'd be more interested in thoughts on the FoI Act thing though.
  • Re:no warrant needed (Score:1, Interesting)

    by cas2000 ( 148703 ) on Friday November 28, 2003 @07:30PM (#7584593)
    > It's Fred's account.

    yes, it is Fred's account. but it's not Fred's telephone number.

    this may seem like a silly distinction to make, but there are some circumstances where it is essential - e.g. ex-wife or ex-husband still sharing an account (stupid, but it happens) and not wanting their ex-spouse to know where they live or what their phone number is. more likely is ex-husband ringing ISP and just asking for the list of phone numbers used by his ex-wife's account.....or just anyone ringing the ISP and claiming to be a customer and asking for the list of phone numbers.

    There's no way for the ISP to know the circumstances or the truth in any such request, so they should as a matter of policy if not law refuse to provide any such details without a court order or search warrant. at the most, they should refer the caller to the relevant police/law-enforcement authority.

    > No law prevents AOL from telling Fred what
    > number his account has logged
    > in from.

    depends what country you're in.

    In Australia, at least, it is the CALLER's privacy that needs to be protected, regardless of who they are claiming to be when they call - this applies whether the phone call is voice or data.

    In Australia, the Telecommunications Act has stiff penalties (including gaol time) for breaching privacy - the only safe answer for an ISP to give a customer when they ask for a list of phone numbers used to dial in to their account is "please contact the police, that information can only be given in response to a court order or search warrant".

    personally, i think that's a Good Thing.

"The one charm of marriage is that it makes a life of deception a neccessity." - Oscar Wilde

Working...