:
:
带着这个假设再去进行沟通会很难。
如果有IT部门的证据比如说IP什么的,多半是您家里出了什么问题
孩子的账号都被搞了几次了,没改过密码吗?另外路由器的密码也改改。还有兴许某台内网机器被黑了,孩子们玩游戏可能会装某些软件的。
第一次出现问题时是不是过于强硬了,看着象那时就和校方搞僵了也可能时导致校方有些猜想
另外,对于家长,我觉得最重要的是知道事情的真相,才好采取适当的措施。事情无非就是两个方面,小孩没做,或者小孩做了。小孩没做,楼上大家都给了好多好建议。
不过,我觉得作为家长,首先应该冷静分析下,小孩子平时是不是很有主意的娃,娃是不是计算机水平也挺高,现在是青春期,是不是叛逆比较严重,家长平时是不是很严厉,娃平时是不是什么话都会和家长讲等等。
如果万万一,我是说万万一,真是孩子做了,那么家长一开始的强硬态度,会导致后面很被动。
所以,现在家长应该设法打消孩子的顾虑,告诉娃,就算是做了,也不是大不了的事情,认错道歉。没做,也不用怕学校,家长和孩子一起,一定会讨回公道的。
总之,无论做没做,家长都会站在孩子一边,把这个问题解决好。
好好沟通做好两手准备,万一和聪明娃有些关系也有个退路。
娃们的能力真是不能低估
When a crime is committed over the Internet the prosecution has to establish a link between the crime and the accused, usually via an IP address. Typically they get the IP address from the computer targeted in the crime (e.g. a server which is the target of a hack).
The IP address identifies the computer that the targeted computer was talking to. This is usually the computer being used by the perpetrator, but it may not be: the perp may have used another computer as a relay in order to hide their tracks. (BTW a smartphone is just a small computer).
Given an IP address the police will identify which Internet Service Provider owns that IP address and ask them which subscriber was using it at the time. ISPs are required to keep records of IP address assignment for this purpose, and they are usually accepted as accurate by courts. However these are just normal business records, and they have been known to be in error.
(These days the police are helped by the fact that IP addresses do not often change, so its quite possible that when they seize the device they find it still has the IP address in question, making mistakes less of an issue)
Once they have the subscriber identity the next step for the police is to question the subscriber to find out if the subscriber was the perpetrator or if it could have been someone else; questions like "Does any one else use your phone?" get asked.
The prosecution will also have to establish that the phone wasn't being used as a relay by someone else. This can be done by a forensic examination to confirm that malware capable of relaying a connection is not present.
If the prosecution can establish that the IP address was leased to the subscriber's device, the subscriber was the only person to use the device, and there is no relay malware present, then that part of their case is complete.
: