The affidavit doesn't need to repeat the contents of every single finding entered into evidence. Checking the MAC of the laptop itself against the MAC supplied by the university IT security officer would be a downstream forensic step performed after the arrest and seizure.
In any case, I can absolutely guarantee that a university IT security officer would look up the vendor portion of the MAC as part of their analysis. I used to run a university help desk and we collected and supplied these documents to police a couple of times a year./div>
Most college dormitories provide hardwired ethernet connections to students -- usually 2 ports per pillow, ports in common spaces, as well as pervasive WiFi.
Students are forbidden from setting up their own wireless or wired routers, both to prevent them from providing university Internet services to third parties, and to prevent them from screwing up the network for everybody else in the entire dorm by misconfiguring the router. The university where I used to work had pretty sophisticated detection capability and we did take student routers and PC network bridges offline .
That's not to say that a sufficiently sophisticated student couldn't cheat -- I'm sure somebody was running a Linksys with hacked firmware or something to make it look like a regular computer. But only very sophisticated students would do that./div>
Techdirt has not posted any stories submitted by RickRussellTX.
Re: Not Buying It...
In any case, I can absolutely guarantee that a university IT security officer would look up the vendor portion of the MAC as part of their analysis. I used to run a university help desk and we collected and supplied these documents to police a couple of times a year./div>
Re:
Re:
Most college dormitories provide hardwired ethernet connections to students -- usually 2 ports per pillow, ports in common spaces, as well as pervasive WiFi.
Students are forbidden from setting up their own wireless or wired routers, both to prevent them from providing university Internet services to third parties, and to prevent them from screwing up the network for everybody else in the entire dorm by misconfiguring the router. The university where I used to work had pretty sophisticated detection capability and we did take student routers and PC network bridges offline .
That's not to say that a sufficiently sophisticated student couldn't cheat -- I'm sure somebody was running a Linksys with hacked firmware or something to make it look like a regular computer. But only very sophisticated students would do that./div>
Techdirt has not posted any stories submitted by RickRussellTX.
Submit a story now.
Tools & Services
TwitterFacebook
RSS
Podcast
Research & Reports
Company
About UsAdvertising Policies
Privacy
Contact
Help & FeedbackMedia Kit
Sponsor/Advertise
Submit a Story
More
Copia InstituteInsider Shop
Support Techdirt