Sophisticated hackers don't attack in a straight line, ... They weave between sites. If one of these sites strips off the source information and throws it away, there can be a break in the chain for investigators.