quote:
Originally posted by spongeboy
(how else do you think they get evidence against cyber crime).
By monitoring data, _after_ they have been informed that person x is doing dodgy stuff.
Or by tricking people... (not legal in many European countries though; but it is allowed in USA for example)
Bottom line, they first need to know (and have the warants) to monitor someone.....
If there aren't logs they can't proof anything either. So they would just say: turn on logging and let's wait till it happens again...