posted on Sep, 22 2009 @ 01:34 PM
reply to post by jam321
There is technology that is used for group work that makes lying about who the author was very difficult. Basically it installs credentials on the
host machine that is going to perform the work if it is a staffer laptop or a congressman's desktop it makes not difference. It has a key-logger, it
groups the login data, machine ID and if you like biometrics and stamps this into the shared work folder.
The system creates session keys for each login to the system. These are discarded each time and can not be recovered or reused. This is just the stuff
I am familiar with. I am sure there are some real security system programmers that know more than I that can figure out a nice system and distribute
it in open source format so that anyone who wants to check it can see the source and make certain there are no back doors so to speak.
edited typos:
[edit on 22-9-2009 by wayouttheredude]