Quote Originally Posted by Elessar View Post
I know for a fact how deep the FBI and FCC can delve.

I was into an FCC search a few years back for a false
Mayday Radio Hoaxer.


The FCC can trace an individual marine band radio right down to it's
mounted location.

They can also search an ISP right to the computer and keyboard the
messages comes from.

Scary? No....Protective? Yes. "You" (generic) got nothing to hide, then you
have nothing to worry about.

I'll trust the allied agencies I work with.
Yep.

Triangulation works very well for radio broadcasts, and cell traffic too.

Another thing that most people doing stupid things on the internet aren't aware of is that every computer (or phone, tablet, ipad, etc) has a MAC address embedded in it that is unique to every other device - just like the VIN on your car. So they'll go to a public hotspot and do their illegal activity, thinking they're anonymous. Nope, they're not and shortly afterwards there's a few guys in black suits knocking at the front door. It seems that particular MAC address is mostly used at your home.

I agree with you, it doesn't bother me either because I'm not a pervert looking for kiddie porn or emailing Achmed in Lebanon about buying RPGs.