Simple, spoof the hostmask/ip addy and sign on as someone else.
IRC is rather easy to fool, so anything taken from IRC is not going to be much use as evidance. This doesn't mean the log can't be usefull, but I personaly wouldn't count it as trustworthy in any way shape or form.