kleanbore
yes there is all of the above as you mentioned. And yes there is all that everybody has mentioned. If we must keep referring to twitter, myspace, and facebook, and google as our proofs of finding incriminating evidence on people, then so be it.
Twitter, myspace, and facebook are social meeting places for people to make new "cyber friends", most of the time the users are hoping to potentially maybe meet someone with the chance to making spark a new relationship on a face to face meeting. So people will tend to be more truthfull, they might not be 100% truthfull, maybe a exxageration of small details, or a ommittance of others.
they will put pictures with captions, they will send friend request, they will chat about things that are personal,maybe even give phone numbers and make request to meet. dont laugh but i met my fiance on a webcam site.
when people communicate via instant messengers you are directly link computer to computer. thats why if you are using messenger to chat with some they should be someone you know. if you ever use messenger chatting with someone and you get a request to chat from someone who you havnt the slightest idea who they are dont answer, dont even reply. If you do you just opened your computer to them, they can get any personal information from you the want,simply be copying all of your tempfiles,and showdowing your registry.
they can put your tempary files in the appropriate folders on there computer and use your internet history, your temp files, cookies, and certain elements out of the showdewed registry and "become you".
now lets move on to google. personally i think google was designed to assist hackers and pirates. google has a ability to gather information off the web much similar to the "key word recognition" that is used by big brother goverment. ever heard of google alerts? it is a built in funtion of the google search engine to gather any information that is sent to servers, ip addresses, web sites and web pages, any domain that is sending or receiving data.
it can be used to get username and passwords to web sites and web domains.all you have to do get the login domain address, type it in to google alerts, pick one of the types of encryptions you want it to listen for, how often you want to be notified, and what email address you want it to sent to.
you can choose real time notification, hourly, daily, weekly, whenever you want it.there are no records stored on your computer of the information being sent, unless you utilize the info by going to the web site and logging in. then after you are thru with the website and information simply go thru and erase registry entries,visible and hidden temporary files and noone will every be able to find evidence in your computer of anything you ever did. yes the police find incriminating things in peoples computers all the time. but if it is there for police to find, then that means it is there for others to find and it can be erased. just like the goverment does when they get rid of old computers. everything about computers operating systems are cookie cutter design. everything has its folder, everything has its particular function.
when average joes use computers for mischief and for just just surfing the web for any number of reasons, and dont use "precautions" then yes there will be evidence left, and yes they could find out exactly where the area of the computer was used based on the i.p address. this is given true about tracing a i.p. but damn near impossible to find the exact place or home it was used at.
most providers issued i.p addresses and then they set up or assign the addresses to certain areas, for example how area codes, and zip codes are. then they have i,p stacks that are within them. when someone gets internet service thru a provider, for example charter cable, they receive a modem that has a address programmed into it that is assigned to the physical address and subcribers account. a user could then simply thro that modem away,go to best buy, purchase a after market cable modem, hook it up, run the i.p config function built into operating system release the computer from current i.p address, flush the cache, and then renew it to the next available i.p address in the i.p stack. this process is not illegal, it is not traceable, nor will it leave tracks on the computer to be found that cant simply be erased.
just a small example of how hard it is to find internet pirates, and sources ofcriminal activity unless they done their research and located the computer in real time surveillance........ya ready EBAY!!!!!!!!! Thats right everybodies favorite place to get a good deal. thats why scammers have blossomed everywhere, because they use simple proxy servers ,ip shifting, and simple readily available programs and software, free tools that are just floating around in the world wide web.
well i hope this gives you a lil insight on how it is achieved.
thx pt1911 and everallm