Through the use of an intermediate party, a first party is given the
ability to communicate with a second party, with the communication
appearing as if it originated with the intermediate party. Specifically,
in a protected network system, the protected network is capable of acting
as a conduit through which an entity, such as law enforcement, can
communicate with an entity attempting an unauthorized access attempt
unbeknownst to the entity attempting the unauthorized access attempt.
This allows, for example, the detection and identification of the entity
attempting the unauthorized access attempt.