takes you back to before the Internet

How It Works | Download LAD | Support | LAD Security | Features & Uses | Resources | Members | User Guide

The Gloves Fit, But Aren’t Yours: When Someone Else Uses Your IP Address

Whether they have hacked your Wifi or are spoofing your IP address, someone else using your IP address to download or distribute images of exploited children and other illicit or illegal content is a serious situation that can lead to criminal and legal entanglements for the unknowing internet user. If hackers get into any computing equipment in your house that is connected to the Internet, be it a computer, router, smart TV or fridge – anything that has computing power and Internet access – they can use it without your knowledge to distribute illegal content, hack into someone else’s bank account or worse, and it would all be tied to your IP address and leave evidence on your computing equipment. While your fridge and TV, from outer appearances, may not appear to have much in common, all of this equipment shares common software designs partially modified from opensource software, so the hackers already know where the cracks are.

Since 2013 we have been alerting internet users of the risks they run if they don’t know what is happening on their network and their computing equipment (see our 2013 report: Marketing Cybercrime to Infect America, which is still relevant today). The problem facing anyone caught up in a situation where illegal activity took place with their IP address is how to prove a negative. How do you prove it wasn’t you distributing illegal content or hacking into banking systems when it all came through your IP address and evidence of such illegal activity will most likely be on your equipment as well? It is as if a local bank robber made their getaway through your house and left behind a bag of marked bills along with gloves, weapons and other thing used in the robbery in your living room.

Hoping that someone else will figure it out eventually is a poor strategy, especially when you have thousands of illicit images stored on your computing equipment and a trail of stolen credit cards leading to your IP address.

What is to be done? Either get rid of all the hackers or have a way to prove that it wasn’t you, that, in fact, you (and your computer) were exploited. The hard evidence that could clear your name is in the data packets that travel through your internet connection and network, which would illuminate the hackers’ secret activities. IPCopper’s LateralAccessDevice is an inexpensive and easy product to use, which does not require much, if any, experience to deploy and, along with many other features, lets you capture the data packets that make up your computer’s communications. In the data packets that it captures and stores this device can hold in reserve just the proof you need to unmask the true culprit and defend yourself when law enforcement or your sneaky neighbor or bitter ex – or worse, your kids’ nemesis with plenty of time on their hands (and who imagines themselves a untouchable cool darkweb operator) – has the IP address evidence and images pointing squarely at you.

LAD: LateralAccessDevice is software that turns a computer chassis into a high-performance, multi-purpose Internet / network tool that combines multi-dimensional firewalling, network monitoring, access control, packet capture, DNS, NAT and a host of other applications into one easy to use, integrated, high-security package. LAD takes you back to before the Internet!