In many instances, more than one person has access to a computer. If a computer is used by more than one user to commit a crime, it's important to be able to establish who entered information.

If we can develop profiles, then we can determine whether Internet activity that appears threatening was undertaken by a terrorist or a teen-ager.