It looks like you're using an Ad Blocker.
Please white-list or disable AboveTopSecret.com in your ad-blocking tool.
Some features of ATS will be disabled while you continue to use an ad-blocker.
it's very easy to spoof an IP address or to change the packet headers to match the public facing IP address supposedly discovered by this web thing you keep talking about
originally posted by: roadgravel
If the traffic from the house has computers on a network using network address translation onto the internet then the same IP would likely show up for many, if not all, computers.
Basically It could have been any computer there.
originally posted by: JBurns
a reply to: fleabit
Oblivious how? Each computer on the net work has its own IP address. Even with the public IP, the router would have logs of what was mapped to who specifically. I'm not expert on this, if I'm mistaken let me know but I am pretty certain the private IPs are traceable to a specific system
Further, NSA stockpiles all the mass data it collects (even the stuff it doesn't "intentionally" collect on each one of us)
Maybe POTUS should declassify/order the release of an unprecedented amount of PRISM data in order to determine whether Maxi is lying and whether Feinstein leaked the Dr. Ford letter.
Seems like he could finish off the deep state/bureaucracy with one simple release of data we already have that he's fully authorized by Presidential authority to release.
Dynamic Networks are basically standard despite not really being suitable to professional environments. Many Government networks use dynamic ip issuing. It's likely this really came out of Water's office and can't pin it to a workstation specifically.
DHCP can have timers set on them. If it doesn't refresh for say 6 months or what not then it would be safe to assume that whoever had that IP was actually the same person. It would completely depend on the refresh rate - or as someone stated - that the user actually unplugged his or her ethernet cable after doing what they did.