Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: BlatherNaut

They probably used university computers, netcafe or public library computers and other user names- so easy to do and impossible to trace.
Did they check to see if they had library cards/student cards?
But university usually has cctv images of the computer users by date and their student sign-in handle.


33 posted on 04/23/2013 3:50:34 PM PDT by bunkerhill7 (("The Second Amendment has no limits on firepower"-NY State Senator Kathleen A. Marchione.))
[ Post Reply | Private Reply | To 1 | View Replies ]


To: bunkerhill7

Your post just reminded me of something else on the little psyho’s twitter account. It was sometime in the past year or so that he tweeted “Lost my Macintosh.” Wouldn’t that be convienent?


47 posted on 04/23/2013 4:41:11 PM PDT by lonevoice (Today I broke my personal record for most consecutive days lived)
[ Post Reply | Private Reply | To 33 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson