
have IP address, date, timestamp, source port, you can go to any ISP in the world and you can get a with a warrant if they support warrants and they can tell you exactly where that IP address is at that time and we were able to get the girl back. So I used it in that case that was a long long long time ago. But you can also use this in your own organization where if you believe a system to be compromised, you can put a word document with a beacon in it with a name like credit card information, financial routing information, and the attacker will grab that document, pull it, open it up, and then you'll get a call back
from that attacker. Now, how accurate is