Bloggers post confidential information, defamatory information, or just annoying information. Websites host stolen credit cards, hacking tools and techniques, or other things that you might not want. In the course of investigating these things, companies or law enforcement agencies frequently need to rely on information in the hands of third parties. An example of this is the various companies that offer data or computer locator services. If a corporate computer is reported lost or stolen, these services use various means to identify the computer, or the data on it. When the target computer is then used – generally to get online – the computer essentially “phones home” with its location. The computer doesn’t really give its location. At best, it can reveal the Internet Protocol (IP) address of the network it is on. While this information is helpful to the true owner of the computer, it is not sufficient to locate and/or recover the stolen hardware.