That's not the way it works.
They don't really need it, but if you receive a subpoena for it and a preservation letter, you will be subject to punishment if you do not comply.
Of course you are "already deep into it", in a shooting case (criminal or civil), fraud, divorce.... And yes , you will need competent legal representation. The problem is, what you post can make it that much more difficult for you and your attorney.
Alrighty then,
If you think that using a made-up name makes you "anonymous", you are mistaken indeed.
Read and heed this:
I've read it. Its the usual be very afraid of everything type lawyer talk. MAC address needs to be protected by masking the ISP. Even if someone is stealing your internet, you can still be blamed as its coming through your hardware. however you can also see every device on a network, that is connected to that network. So there's a few things you can do, even more ways to screw it up. I'm pretty sure that it is the most common method to tracking a persons activity via internet. ISP to hardware. Umm there needs to be a warrant for a stingray to be used....i dont know if you read about that whole debacle, in recent news. LEO's tried so hard for so many years to keep that Harris tech out of the courts too.
Speaking of phones...prepay. Yeah there are ways, but like i said, its a lot harder to pin things on people when you make yourself a hard target...
A good used iphone, especially Verizon or att with a clean ESN can easily be unlocked and take a prepaid sim. The prepaid sim, dont always have to be registered in a name...with a contract.. etc. the literal definition of a burner. If a iphone is like a hard drive, and can be forensically analyzed...which it is, and it can...none of your information should be entered into the phone, icloud needs to stay off. if on a used phone, the icloud was never logged out, you are essentially still using the original owners phone. You'll get data. You'll get cell service...
like i said, the possibility of having a good case of mistaken identity.
Should I start writing the guide to how to ghost the law now?
The 4 common methods of criminal data mining to start maybe...entity extraction be first and foremost...
Again, im not worried. I can write a nice little what not to do to avoid digital forensics if you'd like. I mean literally...i still probably have some papers i've written on it.. the problem is, not everyone has the same knowledge. You got the "im untouchable" mentality...and you got the "if i online bank, ill be hacked and lose everything" people... the ladder being one of the common tail between the legs type personalities. People have always been afraid of things they dont understand. However if, you leave yourself unprotected then yeah, you'd probably get caught up.