Not That I’m Suggesting It . . .
But this sounds like a great way to frame someone for murder.
But this sounds like a great way to frame someone for murder.
Pronounced "Patter-EE-koh"
E-mail: Just use my moniker Patterico, followed by the @ symbol, followed by gmail.com
Disclaimer: Simpsons avatar may resemble a younger Patterico...
The statements made on this web site reflect the personal opinions of the author. They are not made in any official capacity, and do not represent the opinions of the author's employer.
M | T | W | T | F | S | S |
---|---|---|---|---|---|---|
1 | ||||||
2 | 3 | 4 | 5 | 6 | 7 | 8 |
9 | 10 | 11 | 12 | 13 | 14 | 15 |
16 | 17 | 18 | 19 | 20 | 21 | 22 |
23 | 24 | 25 | 26 | 27 | 28 | 29 |
30 | 31 |
Powered by WordPress.
Yeah, but wouldn’t you have to be dead to make it stick?
Veeshir (d4339d) — 5/25/2005 @ 3:30 amGreat!! You’ve just Law’n’Orderized the story!
Michael Tinkler (148bba) — 5/25/2005 @ 5:32 amTwo Favorite Genres Collide – Murder Mystery and Blogging
This is beyond creepy. Read this blog entry. Then this newspaper article. Blogging about your own murdereer! And Patterico thinks about how to Law’n’Orderize this story! via the Volokh Conspiracy…
The Cranky Professor (a39d4b) — 5/25/2005 @ 5:32 amYeah, but wouldn’t you have to be dead to make it stick?
You’d just have to be the *real* killer.
Patterico (756436) — 5/25/2005 @ 6:24 amHmmm, a warning to bloggers… always log out, so you can’t be the dead blogger who posted his killer’s identity moments before (+/- a few minutes) being killed.
Eric Wilner (3936fd) — 5/25/2005 @ 8:00 amI guess this applies to commenters, too. Of course, most comment sections don’t require verifiable logins, so for all you know, I could be someone else entirely. You could verify the posting time and my IP, but that just proves someone had physical access to my computer (and not even that, at times when my WiFi access point is turned on); it doesn’t prove I was still alive at the time.
Obviously, we need a law requiring secure biometric ID (with aliveness detection) to post blog entries or comments, in order to avoid a scourge of murders for misdirection. Write your Congresscritter now!
IP addresses can be forged. The log of IP addresses can be modified. File modification times can be changed. This type of stuff is easy for those hacker gangs who sit around on IRC all day figuring this stuff out, coming up with new ways to manipulate routers.
Excellent point about this possibly being bogus. His last blog entry does appear to be too neat to be entirely believable. Are we sure this is a real story, and not a Columbo script?
Ladainian (91b3b2) — 5/25/2005 @ 9:14 amPatterico, or perhaps the first cop on the scene. Aren’t most real world framings by law enforcement? A frame by the “real killer” seems rather implausible as it would require very particular motivation and circumstances.
James B. Shearer (fc887e) — 5/25/2005 @ 11:44 am“always log out, so you can’t be the dead blogger who posted his killer’s identity moments before”
Don’t they get prints from the keyboard – and all surfaces? I guess a smart killer could type with a toothpick. Sad beyond sad, if true.
Vermont Neighbor (40e0a4) — 5/26/2005 @ 9:56 am