An absolutely fascinating research paper on how a group of college students setup fake P2P clients that did not distribute any illegal content, and were able to frame innocent network devices on the University of Washington campus, such as a group of network printers and a wireless access point.