Re: Ironic
The problem is, that without scanning all traffic, it's impossible to identify which bits of data are to/from your suspect. If they have a device that you're not aware of; or use a properly encrypted VPN connection to get onto the interweb (or both) how do you find which traffic is from them without reading it first to find out?