Or a simple accounting error. The US Courts are not including the number of fraudulent wire tap orders that have forged signatures of judges. Perhaps because the courts do not have copies of the fraudulent wire tap orders.
Vacant cells reduce revenue. Fully occupancy results in higher revenue, thus higher profit, executive bonuses and increased shareholder value. Thus it's good for everyone to keep the prisons full for maximum profitability.
Law enforcemnt is extremely secretive about Stingray. Why? Their suppliers even require them to sign agreements with extreme conditions. Why?
(Sorry, this is only quasi related to the lack of warrants. But the lack of warrants relates to the secrecy issue.)
1. The wireless network standards were designed when we were still using Windows 3.1.
2. The designers may have considered security, in some sense, but not in a way that can withstand 21st century attacks. The security may be in large part due to obscurity.
3. Stingray is not authorized by the mobile network operators who have not given Stingray any SIMs (subscriber identity module) or other cryptographic keys necessary to access the network. Those network operators have exclusive rights to spectrum which Stingray is subverting.
4. Stingray works by compromising the security of the network. Effectively a genuine hack or intrusion into the network.
5. There may be no effective fix short of redesigning the network.
6. If the mechanism of the hack were generally known, mass chaos could ensue.
7. The network operators are strongly against this but powerless to do anything about it, other than potentially litigate.
8. The secrecy of Stingray is largely due to several factors such as:
A. If the mechanism of the attack became generally known, there could be vast numbers of unauthorized "stingrays" compromising everyone's privacy -- including (OMG!) rich and powerful people!
B. It would be possible for a network of distributed "stingray" clones to disrupt mobile network service by tricking nearby phones to connect to fake networks. What if this were deliberately done during an emergency?
C. The creators / operators of genuine(tm) Stingray devices don't want to be exposed to the potential of litigation for actionable things that Stingray may be doing as part of its operation. Including disrupting networks, stolen proprietary or trade secret information, having compromised individuals into divulging network secrets, keys, etc.
This hypothesis would explain observed evidence about why those who built Stingray want desperately to keep it secret. Please consider. The secrecy is so important, that it leads to:
1. Dismissing or disposing of prosecutions rather than reveal any information about Stingray.
2. Binding agencies and organizations using Stringray to high levels of secrecy, including keeping THE VERY EXISTENCE of Stingray a secret.
3. Outright Brazen Perjury a.k.a. Parallel Construction, which is a euphemism for conspiracy to lie to the court and the defense, concealing discoverable information.
The behavior of those behind Stingray fits this hypothesis. They want to use it "for truth, justice and the corporate way", but are desperately fearful of the secret hack escaping.
Snodwen gave up his comfortable life to expose wrongdoing. It remains to be seen whether he will die of natural causes. Not pardoning Snowden goes way beyond petty.
Abuses of the DMCA are hardly petty. They are deliberate misuses of a draconian law that cause genuine economic damage.
Similarly are abuses of CFAA by prosecutors, except the damage can be imprisonment or worse.
SOPA and similar efforts to destroy the internet are hardly petty.
TechDirt needs a Government Speak translation guide to plain English. I'll start with your "proper channels".
Go Through Proper Channels means... Turn yourself in and go to prison
"Work together" and "Cooperate" menas... Do what the government tells you and act like it was your idea.
Golden Key means... Back Door
Secure Encryption with a Golden Key means... Insecure System with Back Door
Traitor means... Whistleblower
Parallel Construction means... Conspiracy of prosecutors and law enforcement to commit perjury by lying to the court and the defense about what their evidence actually is.
"Don't worry, you'll be well taken care of" menas... You're gonna die
"Shelter in place" menas... Stay off the roads so that the rich and powerful people can escape to safety.
Don't forget that if you use a CRT at night in a dark room, like back in the covered wagon days, a van on the street can capture the glow of the CRT on the wall or ceiling and re-create a fairly decent readable copy of what is on the CRT. It just takes a few guesses at the refresh rate and how many scan lines tall the screen image is.
Another thing. Suppose there is some subject that you are not supposed to see. It is in an area not exposed to public view. But part of the walls of the area are visible to public view. So you could capture the color of the light reflecting on one of those walls visible to the subject. Now suppose you could replace a light source in the secure area with digital projector such as used in a conference room. The projector would, like a flood light, project light upon the subject. But that light is a rectangular array of pixels. And it would illuminate the area, one pixel at a time, at high speed. Now it is possible to capture the reflected light on the wall, from a public area, and re-create what the light source can "see". The recreated image looks as though you "see" it as through the projector (eg "light bulb") as if it were a camera. I'm not sure of the practicality of this, but I know there was a good article about the success of the technique on Slashdot some years ago.
Based on my experience, I would recommend that when you fashion your aluminum headwear that you use TWO layers of tin foil rather than just one. This more than doubles the effectiveness. The reason is that a resonance effect develops between the two layers, at exactly double the frequency of the government's invisible brain lasers.
In addition, if you create two antennas on the top instead of one, it further increases the effectiveness by an additional 37 percent.
On the post: Wall Street Is Dreaming Of Megamergers Under Trump -- Including A Verizon-Comcast Super Union
Re:
Make American Corporations Great Again
On the post: Key Congressional Staffers Who Helped Rein In Surveillance Overreach In The 1970s Ask Obama To Pardon Snowden
Re: Re: Translation Guide
Collection Societies are happy to collect payment for music that they don't even actually represent.
On the post: Gap Between Wiretaps Reported By US Courts And Recipient Service Providers Continues To Grow
It's just an Anomaly
On the post: Comcast Takes Heat For Injecting Messages Into Internet Traffic
Re: Re: How big of an issue is this with HTTPS? (TLS)
On the post: Wall Street Is Dreaming Of Megamergers Under Trump -- Including A Verizon-Comcast Super Union
Re:
On the post: Wall Street Is Dreaming Of Megamergers Under Trump -- Including A Verizon-Comcast Super Union
Re: And...
The major difference is that they would govern poorly in different ways.
Given the choice, I would rather have someone sane and level headed in office, even if I like neither choice.
On the post: Wall Street Is Dreaming Of Megamergers Under Trump -- Including A Verizon-Comcast Super Union
Merge all US corporations together
Antiquated words like "Citizen" can be replaced with "Employee".
Voting in the new corporate democracy will be made easier. Employees can turn their votes in to their direct manager.
Just imagine! It will be wonderful!
On the post: Key Congressional Staffers Who Helped Rein In Surveillance Overreach In The 1970s Ask Obama To Pardon Snowden
Re:
On the post: Key Congressional Staffers Who Helped Rein In Surveillance Overreach In The 1970s Ask Obama To Pardon Snowden
Re: Re: Re: Re: THE PUBLIC INTEREST
On the post: Appeals Court Says Warrantless Use Of Stingray Devices Probably OK
Re: Re:
The reason the system is rigged as you describe is related to:
For Profit Prisons!
Vacant cells reduce revenue. Fully occupancy results in higher revenue, thus higher profit, executive bonuses and increased shareholder value. Thus it's good for everyone to keep the prisons full for maximum profitability.
On the post: Appeals Court Says Warrantless Use Of Stingray Devices Probably OK
Re: Re:
FCC approval?
Approval by the network operators who own the spectrum that Stingray is subverting?
Possibly stolen cryptographic keys and/or SIMs? (Subscriber Identity Modules) Other stolen proprietary information in order to make Stingray work?
On the post: Appeals Court Says Warrantless Use Of Stingray Devices Probably OK
Hypothesis about Stingray secrecy
Law enforcemnt is extremely secretive about Stingray. Why? Their suppliers even require them to sign agreements with extreme conditions. Why?
(Sorry, this is only quasi related to the lack of warrants. But the lack of warrants relates to the secrecy issue.)
1. The wireless network standards were designed when we were still using Windows 3.1.
2. The designers may have considered security, in some sense, but not in a way that can withstand 21st century attacks. The security may be in large part due to obscurity.
3. Stingray is not authorized by the mobile network operators who have not given Stingray any SIMs (subscriber identity module) or other cryptographic keys necessary to access the network. Those network operators have exclusive rights to spectrum which Stingray is subverting.
4. Stingray works by compromising the security of the network. Effectively a genuine hack or intrusion into the network.
5. There may be no effective fix short of redesigning the network.
6. If the mechanism of the hack were generally known, mass chaos could ensue.
7. The network operators are strongly against this but powerless to do anything about it, other than potentially litigate.
8. The secrecy of Stingray is largely due to several factors such as:
A. If the mechanism of the attack became generally known, there could be vast numbers of unauthorized "stingrays" compromising everyone's privacy -- including (OMG!) rich and powerful people!
B. It would be possible for a network of distributed "stingray" clones to disrupt mobile network service by tricking nearby phones to connect to fake networks. What if this were deliberately done during an emergency?
C. The creators / operators of genuine(tm) Stingray devices don't want to be exposed to the potential of litigation for actionable things that Stingray may be doing as part of its operation. Including disrupting networks, stolen proprietary or trade secret information, having compromised individuals into divulging network secrets, keys, etc.
This hypothesis would explain observed evidence about why those who built Stingray want desperately to keep it secret. Please consider. The secrecy is so important, that it leads to:
1. Dismissing or disposing of prosecutions rather than reveal any information about Stingray.
2. Binding agencies and organizations using Stringray to high levels of secrecy, including keeping THE VERY EXISTENCE of Stingray a secret.
3. Outright Brazen Perjury a.k.a. Parallel Construction, which is a euphemism for conspiracy to lie to the court and the defense, concealing discoverable information.
The behavior of those behind Stingray fits this hypothesis. They want to use it "for truth, justice and the corporate way", but are desperately fearful of the secret hack escaping.
On the post: Activist Appeals Court Decision Stating Public Has No First Amendment Right To Record In Public Areas
Re:
On the post: Your Earbuds Can Be Made Into Microphones With Just A Bit Of Malware
Re: Re: Re:
On the post: Key Congressional Staffers Who Helped Rein In Surveillance Overreach In The 1970s Ask Obama To Pardon Snowden
Re:
. . . and therefore you are ideally suited for public office.
On the post: Key Congressional Staffers Who Helped Rein In Surveillance Overreach In The 1970s Ask Obama To Pardon Snowden
Re: THE PUBLIC INTEREST
Snodwen gave up his comfortable life to expose wrongdoing. It remains to be seen whether he will die of natural causes. Not pardoning Snowden goes way beyond petty.
Abuses of the DMCA are hardly petty. They are deliberate misuses of a draconian law that cause genuine economic damage.
Similarly are abuses of CFAA by prosecutors, except the damage can be imprisonment or worse.
SOPA and similar efforts to destroy the internet are hardly petty.
I could go on.
On the post: Key Congressional Staffers Who Helped Rein In Surveillance Overreach In The 1970s Ask Obama To Pardon Snowden
Translation Guide
Go Through Proper Channels
means...
Turn yourself in and go to prison
"Work together" and "Cooperate"
menas...
Do what the government tells you and act like it was your idea.
Golden Key
means...
Back Door
Secure Encryption with a Golden Key
means...
Insecure System with Back Door
Traitor
means...
Whistleblower
Parallel Construction
means...
Conspiracy of prosecutors and law enforcement to commit perjury by lying to the court and the defense about what their evidence actually is.
"Don't worry, you'll be well taken care of"
menas...
You're gonna die
"Shelter in place"
menas...
Stay off the roads so that the rich and powerful people can escape to safety.
Citizens
means...
Slaves to the 1%.
Any others ?
On the post: Your Earbuds Can Be Made Into Microphones With Just A Bit Of Malware
Re: Re:
Years ago, weren't there devices, like a credit card reader, that connected to the phone only via the headphone jack?
On the post: Your Earbuds Can Be Made Into Microphones With Just A Bit Of Malware
Re: Re: Not the most earth shattering discovery
Don't forget that if you use a CRT at night in a dark room, like back in the covered wagon days, a van on the street can capture the glow of the CRT on the wall or ceiling and re-create a fairly decent readable copy of what is on the CRT. It just takes a few guesses at the refresh rate and how many scan lines tall the screen image is.
Another thing. Suppose there is some subject that you are not supposed to see. It is in an area not exposed to public view. But part of the walls of the area are visible to public view. So you could capture the color of the light reflecting on one of those walls visible to the subject. Now suppose you could replace a light source in the secure area with digital projector such as used in a conference room. The projector would, like a flood light, project light upon the subject. But that light is a rectangular array of pixels. And it would illuminate the area, one pixel at a time, at high speed. Now it is possible to capture the reflected light on the wall, from a public area, and re-create what the light source can "see". The recreated image looks as though you "see" it as through the projector (eg "light bulb") as if it were a camera. I'm not sure of the practicality of this, but I know there was a good article about the success of the technique on Slashdot some years ago.
On the post: Your Earbuds Can Be Made Into Microphones With Just A Bit Of Malware
Re: Re:
Based on my experience, I would recommend that when you fashion your aluminum headwear that you use TWO layers of tin foil rather than just one. This more than doubles the effectiveness. The reason is that a resonance effect develops between the two layers, at exactly double the frequency of the government's invisible brain lasers.
In addition, if you create two antennas on the top instead of one, it further increases the effectiveness by an additional 37 percent.
Next >>