The simple answer is to ask your ISP to secure the logs of your accesses for
possible evidentiary needs. Do the same with the webmaster of the Pogo
site, asking them to secure those logs for possible uses in a legal
discovery process. Ask them to specifically secure the access logs
detailing the posting of the 'supposed death threat' . . . and if this
problem is likely to lead to crimminal proceedings, make these request by
Certified Mail-Return Reciept as well as the online contact. These logs
will prove or disprove access from the IP address assigned your computer, on
to your ISP and finally Pogo at the alledged time of the threat, and whether
the message was in fact posted by the same IP address as the one your ISP
assigned your when you logged on (if you did).
In regards to someone hacking into your computer and then making the threats
from there, forensics indeed could provide a wealth of information one way
or another . . . including attempts to change or alter tracks to support the
accusation. However, since this has not been reported to LE it is extremely
unlikely to ever get as far as a forensic examination of your hard drive. I
could do one for you . . . at several thousands of dollars.
The simple fact is, if you DID NOT make these threats as accused, that a
simple review of Pogo's access logs (by Pogo, themselves) should prove or
disprove to their satisfaction. They are unlikely to accept anything you
could offer as evidence from your hard drive. That's like asking a rapist
to do his own DNA test for the prosecution!
Rick
--
infosec (at) anthonians (dot) org
Please reply within Newsgroup so that we may all learn
"A person who surfs the Internet without a firewall, has no business being
online!"
http://www.danasoft.com/sig/RicksSig.jpg